TLS | Y. Nir |
Internet-Draft | DellEMC |
Intended status: Standards Track | March 27, 2019 |
Expires: September 28, 2019 |
A Flags Extension for TLS 1.3
draft-nir-tls-tlsflags-01
A number of extensions are proposed in the TLS working group that carry no interesting information except the 1-bit indication that a certain optional feature is supported. Such extensions take 4 octets each. This document defines a flags extension that can provide such indications at an average cost of 1.5 bits each. More precisely, it provides up to 64 such indications in a fixed-size, 12-octet extension.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 28, 2019.
Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
Since the publication of TLS 1.3 ([RFC8446]) there have been several proposal for extensions to this protocol, where the presence of the content-free extension in both the ClientHello and either the ServerHello or EncryptedExtensions indicates nothing except either support for the optional feature or an intent to use the optional feature. Examples:
This document proposes a single extension called tls_flags that can enumerate such flag extensions and allowing both client and server to indicate support for optional features in a concise way.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.
The term "flag extension" is used to denote an extension where the extension_data field is zero-length in all cases and the presence of the extension denotes either support for some feature or the intent to use that feature.
The term "flag-type feature" denotes an options TLS 1.3 feature the support for which is negotiated using a flag extension, whether that flag extension is its own extension or a value in the extension defined in this document.
This document defines the following extension code point:
enum { ... tls_flags(TBD), (65535) } ExtensionType;
This document also defines the data for this extension as a 64-bit bit string, allowing for the encoding of up to 64 optional features.
struct { uint64 flags; } FlagExtensions;
Note that this document does not define any particular bits for this string. That is left to the protocol documents such as the ones in the examples from the previous section. Such documents will have to define which bit to set to show support, and the order of the bits within the bit string shall be enumerated in network order: bit zero is the high-order bit of the first octet as the flags field is transmitted.
A client that supports this extension and also supports at least one of the flag-type features that use this extension SHALL send this extension with the flags field having bits set only for those extensions that it supports.
A server that supports this extension and also supports at least one of the flag-type features that use this extension and that were declared by the ClientHello extension SHALL send this extension with the intersection of the flags it supports with the flags declared by the client. The intersection operation MAY be implemented as a bitwise AND. The server may need to send two tls_flags extensions, one in the ServerHello and the other in the EncryptedExtensions message. It is up to the document for the specific feature to determine whether support should be acknowledged in the ServerHello or the EncryptedExtensions message.
IANA is requested to assign a new value from the TLS ExtensionType Values registry:
IANA is also requested to create a new registry under the TLS namespace with name "TLS Flags" and the following fields:
The policy for this shall be "Specification Required" as described in [RFC8126].
The extension described in this document provides a more concise way to express data that could otherwise be expressed in individual extensions. It does not send in the clear any information that would otherwise be sent encrypted, nor vice versa. For this reason this extension is neutral as far as security is concerned.
The idea for writing this was expressed at the mic during the TLS session at IETF 104 by Eric Rescorla.
The current bitwise formatting was suggested on the mailing list by Nikos Mavrogiannopoulos.
[RFC2119] | Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997. |
[RFC8174] | Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017. |
[RFC8446] | Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018. |
[I-D.ietf-tls-tls13-cert-with-extern-psk] | Housley, R., "TLS 1.3 Extension for Certificate-based Authentication with an External Pre-Shared Key", Internet-Draft draft-ietf-tls-tls13-cert-with-extern-psk-00, February 2019. |
[I-D.sy-tls-resumption-group] | Sy, E., "TLS Resumption across Server Name Indications for TLS 1.3", Internet-Draft draft-sy-tls-resumption-group-00, March 2019. |
[RFC8126] | Cotton, M., Leiba, B. and T. Narten, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 8126, DOI 10.17487/RFC8126, June 2017. |
Version -01 replaced the enumeration of 8-bit values with a 64-bit bitstring.
Version -00 was a quickly-thrown-together draft with the list of supported features encoded as an array of 8-bit values.