пт, 26 июл. 2024 г. в 09:55, Aleksandar Lazic <al-hapr...@none.at>:

> Hi.
>
> On 2024-07-25 (Do.) 23:22, Илья Шипицин wrote:
> >
> >
> > чт, 25 июл. 2024 г. в 22:00, Илья Шипицин <chipits...@gmail.com
> > <mailto:chipits...@gmail.com>>:
> >
> >
> >
> >     чт, 25 июл. 2024 г. в 14:27, William Lallemand <wlallem...@irq6.net
> >     <mailto:wlallem...@irq6.net>>:
> >
> >         On Wed, Jul 03, 2024 at 11:51:21PM +0200, William Lallemand
> wrote:
> >          > > aws-lc implements chacha20_poly1305 in a different way than
> QuicTLS.
> >          > > and if that gap is eliminated, it will be a good point to
> declare
> >         aws-lc as
> >          > > a recommended QUIC lib.
> >          > >
> >          > > if we compare aws-lc against openssl-1.1 (not quictls), it
> is indeed
> >          > > matches (maybe except some niche features like async)
> >          > >
> >          >
> >          > BoringSSL, LibreSSL, and AWS-LC uses the EVP_AEAD API,
> basically we
> >         would need
> >          > to use EVP_aead_chacha20_poly1305() instead of
> >         EVP_chacha20_poly1305(), and
> >          > EVP_aead_chacha20_poly1305() instead of EVP_chacha20() and
> uses the
> >         EVP_AEAD
> >          > functions. IMHO this is not a huge change and this is doable,
> we just
> >         need to
> >          > invest some time on it.
> >          >
> >          > Regards,
> >
> >         FYI I just push some patches that implements the
> CHACHA20_POLY1305 for
> >         QUIC with AWS-LC.
> >
> >
> >     nice, it passes chacha20 test!
> >
> >         We now handle with AWS-LC for QUIC:
> >         - TLS_AES_128_GCM_SHA256
> >         - TLS_AES_256_GCM_SHA384
> >         - TLS_CHACHA20_POLY1305_SHA256
> >
> >         The TLS_AES_128_CCM_SHA256 cipher is not implemented by AWS-LC,
> and is
> >         disabled by default in a lot of stack anyway.
> >
> >
> > next point: 0-RTT
>
> Sorry for the stupid questions but as I don't maintain any QUIC based apps
> I'm
> curious if this really makes any differences compared to "normal" requests.
>
> How often is this really used in the real world setup?
> Have anybody seen any real benefit for users out there with 0-RTT?
>

very beneficial
Introducing Zero Round Trip Time Resumption (0-RTT) (cloudflare.com)
<https://blog.cloudflare.com/introducing-0-rtt/>


>
> > according to haproxy/include/haproxy/openssl-compat.h at master ·
> > haproxy/haproxy (github.com)
> > <
> https://github.com/haproxy/haproxy/blob/master/include/haproxy/openssl-compat.h#L117-L119
> >
> > 0-RTT support depends on SSL_OP_NO_ANTI_REPLAY (which is not defined for
> AWS-LC)
> >
> > thus it is not possible to satisfy that condition
> >
> > haproxy/src/quic_ssl.c at master · haproxy/haproxy (github.com)
> > <https://github.com/haproxy/haproxy/blob/master/src/quic_ssl.c#L765-L772
> >
> >
> > AWS-LC (inherited from BoringSSL) supports 0-RTT in its own way not
> compatible
> > with QuicTLS ((
> >
> >
> >         Regards,
> >
> >         --
> >         William Lallemand
>
> Regards
> Alex
>

Reply via email to