Re: [TLS] TLS 1.3 and vendor strings?

Yuhong Bao <yuhongbao_386@hotmail.com> Fri, 22 May 2015 03:17 UTC

Return-Path: <yuhongbao_386@hotmail.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56AFE1A909C for <tls@ietfa.amsl.com>; Thu, 21 May 2015 20:17:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.66
X-Spam-Level:
X-Spam-Status: No, score=-0.66 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sdR1Z_HT3oo1 for <tls@ietfa.amsl.com>; Thu, 21 May 2015 20:17:46 -0700 (PDT)
Received: from BLU004-OMC1S9.hotmail.com (blu004-omc1s9.hotmail.com [65.55.116.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D5FE81A9096 for <tls@ietf.org>; Thu, 21 May 2015 20:17:45 -0700 (PDT)
Received: from BLU177-W50 ([65.55.116.9]) by BLU004-OMC1S9.hotmail.com over TLS secured channel with Microsoft SMTPSVC(7.5.7601.22751); Thu, 21 May 2015 20:17:44 -0700
X-TMN: [odrM5G/6nAGt32EGT5fEuXO6rWDPzYtC]
X-Originating-Email: [yuhongbao_386@hotmail.com]
Message-ID: <BLU177-W502DADC2C15027558AEDB2C3C00@phx.gbl>
From: Yuhong Bao <yuhongbao_386@hotmail.com>
To: "noloader@gmail.com" <noloader@gmail.com>, "tls@ietf.org" <tls@ietf.org>
Date: Thu, 21 May 2015 20:17:44 -0700
Importance: Normal
In-Reply-To: <CAH8yC8ma-+3XjG9w2Q6Dz41-T_w8L_gpzAybRH5h=H5YVHJudA@mail.gmail.com>
References: <CAH8yC8ma-+3XjG9w2Q6Dz41-T_w8L_gpzAybRH5h=H5YVHJudA@mail.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginalArrivalTime: 22 May 2015 03:17:44.0732 (UTC) FILETIME=[DEE6ADC0:01D0943D]
Archived-At: <http://mailarchive.ietf.org/arch/msg/tls/_a-ja5m6IrjKjk3L1YL_VxICwr8>
Subject: Re: [TLS] TLS 1.3 and vendor strings?
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 May 2015 03:17:47 -0000

In this case, the pre-10.8.4 versions of OS X lost marketshare pretty quickly, I think by now it is less than 0.1% now.

----------------------------------------
> Date: Thu, 21 May 2015 22:46:33 -0400
> From: noloader@gmail.com
> To: tls@ietf.org
> Subject: [TLS] TLS 1.3 and vendor strings?
>
> Are there any plans to support free form vendor strings?
>
> The use case is similar to Apple's buggy ECDHE-ECDSA SecureTransport
> for OS X 10.8 and iOS 7.
>
> In this case, OpenSSL had to jump through a number of hoops to
> identify the potentially affected clients via fingerprinting.
> Fingerprinting was not precise, and it potentially captured unaffected
> clients when Apple patched at OS X 10.8.4 and iOS 7.0.3. That is, an
> OS X 10.8.5 or iOS 7.0.4 client would potentially be identified as
> buggy even though it was patched.
>
> Or is there another way to handle the occasional implementation bug like this?
>
> (And to be clear: patching is not always an option. Apple is not like
> Microsoft or Linux. Rather, they left a number of hosts unpatched for
> the ECDHE-ECDSA bug; and did the same with CVE-2015-1130 (Goto Fail);
> and did the same with CVE-2015-1130 (Hidden Backdoor)).
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls