[TLS]Re: Adoption Call for draft-davidben-tls-key-share-prediction

2024-05-21 Thread Joseph Salowey
There is consensus to adopt this draft as a working group item. I'll work with the authors to migrate to the official repository and submit an updated draft. On Tue, May 21, 2024 at 11:23 AM Eric Rescorla wrote: > These are all fair points, and it's possible we don't need to do anything > with

[TLS]Re: Adoption Call for draft-davidben-tls-key-share-prediction

2024-05-21 Thread Eric Rescorla
These are all fair points, and it's possible we don't need to do anything with the transcript. I don't think we need to resolve this before adoption, I just wanted to make sure that I said something now to make sure people weren't surprised later. -Ekr On Tue, May 21, 2024 at 6:46 AM David Benj

[TLS]Re: Adoption Call for draft-davidben-tls-key-share-prediction

2024-05-21 Thread David Benjamin
Servers using DNSSEC won't help unless the client only honors the hint over DNSSEC, and we do not live in a universe where DNSSEC succeeded to the point that that's remotely viable. I think that too can be discussed in detail post adoption, but I think such a change would negate the value of this

[TLS]Re: Adoption Call for draft-davidben-tls-key-share-prediction

2024-05-21 Thread A A
In my opinion, to prevent downgrade attack, server MUST or SHOULD using DNSSEC when announcing DNS record.21.05.2024, 21:48, "David Benjamin" :Off the cuff, folding it into the transcript sounds tricky, since existing TLS servers won't know to do it, and, as with any other DNS hints, we need to acc

[TLS]Re: Adoption Call for draft-davidben-tls-key-share-prediction

2024-05-21 Thread David Benjamin
Off the cuff, folding it into the transcript sounds tricky, since existing TLS servers won't know to do it, and, as with any other DNS hints, we need to accommodate the DNS being out of sync with the server. It'll also be more difficult to deploy due to needing changes in the TLS stack and generall

[TLS]Re: Adoption Call for draft-davidben-tls-key-share-prediction

2024-05-21 Thread Eric Rescorla
I agree that it's attractive to be able to hint in the HTTPS RR, but I'm less sure about addressing the basic insecurity of the DNS channel with the approach this draft takes. I don't have a complete thought here, but what if we were to somehow fold the hint into the handshake transcript? I suppose

[TLS]Re: Adoption Call for draft-davidben-tls-key-share-prediction

2024-05-07 Thread Bas Westerbaan
I support adoption, and am happy to review. On Sat, May 4, 2024 at 12:05 AM Joseph Salowey wrote: > This is a working group call for adoption > for draft-davidben-tls-key-share-prediction. This document was presented > at IET 118 and has undergone some revision based on feedback since then. > T

[TLS]Re: Adoption Call for draft-davidben-tls-key-share-prediction

2024-05-06 Thread David Benjamin
This document does not make any changes to the DNS queries made. It merely adds a parameter to the existing HTTPS-RR/SVCB record, with pre-existing rules on who queries it and when, and describes how TLS can use it. The interaction between HTTPS-RR and proxies is complex and all already covered by