In section 5.1 of RFC8995, we say:

>   Use of TLS 1.3 (or newer) is encouraged.  TLS 1.2 or newer is
>   REQUIRED on the Pledge side.  TLS 1.3 (or newer) SHOULD be available
>   on the Registrar server interface, and the Registrar client
>   interface, but TLS 1.2 MAY be used.  TLS 1.3 (or newer) SHOULD be
>   available on the MASA server interface, but TLS 1.2 MAY be used.

and in section 5.4:

>   Use of TLS 1.3 (or newer) is encouraged.  TLS 1.2 or newer is
>   REQUIRED.  TLS 1.3 (or newer) SHOULD be available.

In TLS 1.3, the "SNI" is mandatory.
In TLS 1.2, SNI is defined at: 
https://datatracker.ietf.org/doc/html/rfc6066#section-3
and it's not mandatory, but it's highly recommended, and all browsers
implement it today, and so one can depend upon it being present at the server
side.

Without SNI, each HTTPS tenant needs it's own IP address.
In IPv6, this isn't a big deal.  In IPv4, it is.
TLS has been a justification to ask for multiple IPv4 in the past, but this
is not flying as often anymore.

I guess that I regret we did not write:

>   Use of TLS 1.3 (or newer) is encouraged.  TLS 1.2 or newer (with RFC6066
>   SNI support) is REQUIRED.  TLS 1.3 (or newer) SHOULD be available.

I don't know if is worth an errata.


--
Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima

Reply via email to