Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

crypto/tls: RFC 9266: Channel Bindings for TLS 1.3 support #54103

Open
Neustradamus opened this issue Jul 28, 2022 · 7 comments
Open

crypto/tls: RFC 9266: Channel Bindings for TLS 1.3 support #54103

Neustradamus opened this issue Jul 28, 2022 · 7 comments
Labels
FeatureRequest NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one.
Milestone

Comments

@Neustradamus
Copy link

Neustradamus commented Jul 28, 2022

Can you add the support of RFC 9266: Channel Bindings for TLS 1.3?

Channel Bindings for TLS: https://datatracker.ietf.org/doc/html/rfc5929

Little details, to know easily:

  • tls-unique for TLS =< 1.2
  • tls-server-end-point
  • tls-exporter for TLS = 1.3

Thanks in advance.

@ianlancetaylor
Copy link
Contributor

CC @golang/security @FiloSottile

@cherrymui cherrymui changed the title RFC 9266: Channel Bindings for TLS 1.3 support crypto/tls: RFC 9266: Channel Bindings for TLS 1.3 support Jul 28, 2022
@cherrymui
Copy link
Member

I guess this will be added to the crypto/tls package? What would the support look like? Thanks.

@cherrymui cherrymui added NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one. FeatureRequest labels Jul 28, 2022
@cherrymui cherrymui added this to the Backlog milestone Jul 28, 2022
@Neustradamus
Copy link
Author

Dear all,

I have update the main description about tls-unique, tls-server-end-point, tls-exporter and I have added XEP-0388/XEP-0440/XEP-0474 links.

I think that you have seen the jabber.ru MITM:

@FiloSottile
Copy link
Contributor

RFC 9266, Section 2, says

"tls-exporter" uses Exported Keying Material (EKM), which is already widely exposed by TLS implementations

Indeed, we already support EKM via ConnectionState.ExportKeyingMaterial.

What do you need us to change in crypto/tls?

@morphf
Copy link

morphf commented Jan 29, 2024

Is there an update on this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
FeatureRequest NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one.
Projects
None yet
Development

No branches or pull requests

5 participants