[TLS]Re: Adoption Call for draft-davidben-tls-key-share-prediction

2024-05-07 Thread Bas Westerbaan
I support adoption, and am happy to review.

On Sat, May 4, 2024 at 12:05 AM Joseph Salowey  wrote:

> This is a working group call for adoption
> for draft-davidben-tls-key-share-prediction.  This document was presented
> at IET 118 and has undergone some revision based on feedback since then.
> The current draft is available here:
> https://datatracker.ietf.org/doc/draft-davidben-tls-key-share-prediction/.
> Please read the document and indicate if and why you support or do not
> support adoption as a TLS working group item. If you support adoption
> please, state if you will help review and contribute text to the document.
> Please respond to this call by May 20, 2024.
>
> Thanks,
>
> Joe, Deidre, and Sean
> ___
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS]HTTPS-RR and TLS

2024-05-07 Thread David Benjamin
[changing the subject since I expect this to mostly be a tangential
discussion]

On Sat, May 4, 2024, 09:12 Stephen Farrell 
wrote:

> I hope, as the WG are processing this
> [draft-davidben-tls-key-share-prediction], we consider what,
> if anything, else could be usefully added to HTTPS RRs
> to make life easier.
>

Actually, I think one thing that could help is one of your drafts! One
barrier with trying to use HTTPS RR for TLS problems is keeping the DNS and
TLS sides in sync on the server deployment. Prior to ECH, this hasn't been
done before, so I wouldn't expect any deployments to have a robust path
from their TLS configuration to their DNS records.

draft-ietf-tls-wkech seems like a good model for this, but it is currently
written specifically for ECH. What are your thoughts on generalizing that
document to cover other cases as well?
https://github.com/sftcd/wkesni/issues/14

We might also think about the extension model for that document. Does each
SvcParamKey opt into use with the document, with its own JSON key and text
describing how to map it, or should we just use the presentation syntax and
import it all en masse? (I'm not sure. The latter would certainly be less
work for new SvcParamKeys, but I'm not sure what the implications would be
of the DNS frontend picking up SvcParamKeys it doesn't understand. Then
again, we seem to have happily imported basically all the existing keys
anyway.)

David
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org