Re: Last Call: draft-hoffman-tls-master-secret-input (Additional

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Nicolas Williams wrote:
> 
> On Wed, Apr 21, 2010 at 10:27:03AM -0700, The IESG wrote:
> > The IESG has received a request from an individual submitter to consider 
> > the following document:
> > 
> > - 'Additional Master Secret Inputs for TLS '
> >    <draft-hoffman-tls-master-secret-input-01.txt> as a Proposed Standard
> 
> I support publication of draft-hoffman-tls-master-secret-input-01.txt as
> a Proposed Standard.

I'm fine with the "technology" in tls-master-secret-input.

It is a kind of inverse to TLS extractor/exporters and GSS_prf,
i.e. for cryptographically binding the TLS session to some other
information (secret or public) and provides a more rigid binding
than the gssapi channel_bindings facility (one that can not be ignored).

I have some nits with the text in section 1 and 2 because of the
lax terminology around randomness combined with the reference to
"(TLS) extensions with master secret input".

The document should carefully distinguish between data that
is merely unique and non-predictable, but public and fully known
to every observer and data that is "secret randomness" aka entropy.

There is no entropy in unique, non-predictable, _published_ data.

-Martin
_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]