Re: [TLS] Implicit ACKs in post-handshake

Hanno Becker <Hanno.Becker@arm.com> Thu, 23 April 2020 21:23 UTC

Return-Path: <Hanno.Becker@arm.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0E383A13F2 for <tls@ietfa.amsl.com>; Thu, 23 Apr 2020 14:23:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=RF21Qr5p; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=RF21Qr5p
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oC_SQ-PH74UT for <tls@ietfa.amsl.com>; Thu, 23 Apr 2020 14:23:06 -0700 (PDT)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2075.outbound.protection.outlook.com [40.107.22.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3200C3A13F1 for <tls@ietf.org>; Thu, 23 Apr 2020 14:23:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rr2oV/uxmDIMjOP/QGzWFfp8g/6yRIzsAZmvgSwbyKw=; b=RF21Qr5pMXmH9E9ERQePPH6z4eop7K3vzMfk/FINp/BapK5h361CMVgP6XoS3Eyfja0vRsBDaJeyZd9uM7b097Xe0aEdyF1IiRzJx58dvXpS5ijWG+rsggKGRayvtYKj/kkAY0ExHh0Y9DTO9MJwfc864tAqTLUQKd3JGAjLmLQ=
Received: from AM6P194CA0071.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:84::48) by DBBPR08MB4555.eurprd08.prod.outlook.com (2603:10a6:10:cb::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2921.29; Thu, 23 Apr 2020 21:23:03 +0000
Received: from AM5EUR03FT046.eop-EUR03.prod.protection.outlook.com (2603:10a6:209:84:cafe::c1) by AM6P194CA0071.outlook.office365.com (2603:10a6:209:84::48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2937.13 via Frontend Transport; Thu, 23 Apr 2020 21:23:03 +0000
Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT046.mail.protection.outlook.com (10.152.16.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2937.19 via Frontend Transport; Thu, 23 Apr 2020 21:23:03 +0000
Received: ("Tessian outbound 43fc5cd677c4:v53"); Thu, 23 Apr 2020 21:23:02 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 48dff7dba696f958
X-CR-MTA-TID: 64aa7808
Received: from 4c30b2f6b037.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 349A3207-0189-472C-84FF-C038C3CBF465.1; Thu, 23 Apr 2020 21:22:57 +0000
Received: from EUR01-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 4c30b2f6b037.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 23 Apr 2020 21:22:57 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kVUKJ0MMPDew58uZitp0omF3x4+IVXs7NIaca7YkqNpbPBXVWDbzJRSuEMv7AzrNdV8D0++r5/QtX/Hm8ex8cECuQDvTBLQ43JRgK151/X0BljrIwmBhmF2Eyw8DHe7gY1+wu/P0vMYv8YJ4O9qj+b9GLmE3dV2ZUvlV6HR+qvveLXuajWMzKmvVLAvKQRnkT28JKZT3OSWPTDINSEYWfO922pg5oAn/oEvjLNbNf7dtVtOdwd14tcNS2Xsv/kj7kLxX4Sa6OOxUelVOCVV5o6qEQT9K1XdNgGl+SlALf81kKuz2SD3qHHrrUB/ah8lG+GDMk93U/O7xYTBnH/7wSw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rr2oV/uxmDIMjOP/QGzWFfp8g/6yRIzsAZmvgSwbyKw=; b=jQ6PwUgFw3l5/LCOXyO7neh5LsIdrsZpRALkp0FyK51U+2kKdQtyqzEJWVeLzuPcVZR25mNPs7s6VlASTDC5TVCsF8RoD4J96E65KTmRu/AU2F3ZiIsngL0sUS3ixOXr96V1hCvhO6OdDnn1W/0ARwx4EEGcDkpHCf4IsmBXGZ+vMFKZOyB+RZa2vbbvwAlF1qkJRge+4+mSsUquFuqHcD7CsG0EEMelhYBcgCeNtDFOoP8XB34WrlyL4CFnziRkffp1Vime/htxVX2HB7dHZGJ02DME9WkdUVwKcVmMEQM5cfP8ayv1M5CHi2VzI+5tOWmfXiL9K2rDjAB2+/x57Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rr2oV/uxmDIMjOP/QGzWFfp8g/6yRIzsAZmvgSwbyKw=; b=RF21Qr5pMXmH9E9ERQePPH6z4eop7K3vzMfk/FINp/BapK5h361CMVgP6XoS3Eyfja0vRsBDaJeyZd9uM7b097Xe0aEdyF1IiRzJx58dvXpS5ijWG+rsggKGRayvtYKj/kkAY0ExHh0Y9DTO9MJwfc864tAqTLUQKd3JGAjLmLQ=
Received: from AM6PR08MB3318.eurprd08.prod.outlook.com (2603:10a6:209:45::15) by AM6PR08MB3685.eurprd08.prod.outlook.com (2603:10a6:20b:6f::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2921.29; Thu, 23 Apr 2020 21:22:56 +0000
Received: from AM6PR08MB3318.eurprd08.prod.outlook.com ([fe80::1579:b7d9:f543:200d]) by AM6PR08MB3318.eurprd08.prod.outlook.com ([fe80::1579:b7d9:f543:200d%5]) with mapi id 15.20.2937.012; Thu, 23 Apr 2020 21:22:56 +0000
From: Hanno Becker <Hanno.Becker@arm.com>
To: Eric Rescorla <ekr@rtfm.com>, "<tls@ietf.org>" <tls@ietf.org>
Thread-Topic: [TLS] Implicit ACKs in post-handshake
Thread-Index: AQHWGbC15u+KRnP0Uk2OoxM6jRtSIaiHNaG6
Date: Thu, 23 Apr 2020 21:22:55 +0000
Message-ID: <AM6PR08MB331828BC62552C177CEE4D369BD30@AM6PR08MB3318.eurprd08.prod.outlook.com>
References: <CABcZeBOjajk44mASbVZ1O-gYyh54B-TsHxV2iVaAXdqUgmB5kQ@mail.gmail.com>
In-Reply-To: <CABcZeBOjajk44mASbVZ1O-gYyh54B-TsHxV2iVaAXdqUgmB5kQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: spf=none (sender IP is ) smtp.mailfrom=Hanno.Becker@arm.com;
x-originating-ip: [217.140.99.251]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 12d370a5-07fe-43df-2910-08d7e7cc81a7
x-ms-traffictypediagnostic: AM6PR08MB3685:|DBBPR08MB4555:
X-Microsoft-Antispam-PRVS: <DBBPR08MB4555FBB61E8CAA8C9AD539B99BD30@DBBPR08MB4555.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:9508;OLM:10000;
x-forefront-prvs: 03827AF76E
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR08MB3318.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(10009020)(4636009)(396003)(366004)(346002)(136003)(376002)(39860400002)(81156014)(66946007)(86362001)(110136005)(316002)(2906002)(8936002)(53546011)(478600001)(52536014)(7696005)(8676002)(66476007)(64756008)(71200400001)(6506007)(19627405001)(55016002)(66446008)(66556008)(76116006)(33656002)(5660300002)(186003)(26005)(9686003)(491001); DIR:OUT; SFP:1101;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: nqbuVLofi8x/Z6aYSTwlBE13nRVJcZYgCA1T5SMDrAIJTYI4Kn6YjwZgh3AObwSuKkdY5F02xngkA0E2I59NR73W58+GzyVVWcHoz8zUCacHsxBBR6+mShCY+pCX91Vayr3tI8yPvx5TRYBFKv3qsbVwOrvDnR6vBeLtrozoX7mw4YCMaZPFzOtnlqPDAPVVjCizPZ2fmQUd9YvHYlRdH3+NVHOax51ipsuPZA7vpg68Eye8GbYkGYgJSxZiYp7u3SGqGNouioS8wRlMATONcEYkefkP7bGXNgEKNcXQ89ihgTRfiDChisGXDNidcPX8/fDzMfh/WuPiLYrOnQk8pg6c08VCuN0hweQSA1yZ2UT01UCeKEEPcX/XaRDGk/0ha+OFCUeMSm1HPFDE2NNE9LKeH7bF0pgoPKkuvFDmB+RSRbHWEuCMCWWC/fmR1sTzUpJKkBH1MX3itW1KCo9tDqMz4Urr3XLgo+VaOhikTvI=
x-ms-exchange-antispam-messagedata: l3mM2Z7fQTDMi5hsxBpARs4ueRlvE+98C/tJ8gBmJd66hXwR9vd6PFr0WfIaYPVrLp70QYLJx2faqqVVlYgB7bgoTwF96j7ItjLch3WJh/ZZMSDGLAKcebfBe9eL4LtCB0hVNT0WSPIc+M0FC90Oxw==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM6PR08MB331828BC62552C177CEE4D369BD30AM6PR08MB3318eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3685
Original-Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Hanno.Becker@arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT046.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:; SFS:(10009020)(4636009)(346002)(39860400002)(136003)(396003)(376002)(46966005)(9686003)(26005)(356005)(186003)(8936002)(55016002)(33656002)(82310400002)(8676002)(5660300002)(81156014)(82740400003)(36906005)(110136005)(478600001)(81166007)(336012)(7696005)(316002)(19627405001)(53546011)(70586007)(86362001)(70206006)(47076004)(52536014)(6506007)(2906002)(491001); DIR:OUT; SFP:1101;
X-MS-Office365-Filtering-Correlation-Id-Prvs: 2c05363c-3997-4ee3-2fb8-08d7e7cc7d7a
X-Forefront-PRVS: 03827AF76E
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Apr 2020 21:23:03.0025 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 12d370a5-07fe-43df-2910-08d7e7cc81a7
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4555
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/GKmc28RT5EBe6a7oObvkYdDJbsw>
Subject: Re: [TLS] Implicit ACKs in post-handshake
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Apr 2020 21:23:10 -0000

Hi Ekr,

Do you see some simplifications resulting from this?

On first thought I'd think that since implementations are already able to handle implicit
ACKs, it doesn't come at extra cost to allow their use for post-HS client-auth, too.

In contrast, it seems that if the client's Certificate message no longer
implicitly acknowledges the CertificateRequest, there's need to explicitly
explain the state machine transition upon receipt of the Certificate message
prior to receiving an ACK for the CertificateRequest.

Overall I feel that there is no need for change here, but I might miss something.

Best,
Hanno

________________________________
From: TLS <tls-bounces@ietf.org> on behalf of Eric Rescorla <ekr@rtfm.com>
Sent: Thursday, April 23, 2020 9:48 PM
To: <tls@ietf.org> <tls@ietf.org>
Subject: [TLS] Implicit ACKs in post-handshake

Hi folks,

As I was going through the ACK clarifications, I noticed that we were
requiring explicit ACKs for everything other than post-handshake
client auth, where we allow implicit ACK. This obviously works,
but given that (1) we expect explicit ACK from the client if there
is a user-consent delay and (2) it's the only one, what would people
think of using implicit ACKs only for the handshake itself.

-Ekr


IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.