Re: [TLS] weird DHE params p length in TLSv1.2

2023-10-18 Thread M K Saravanan
one correction: > cipher suite used: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f) It is actually TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e) On Tue, 17 Oct 2023 at 13:55, M K Saravanan wrote: > Hi, > > I found a weird packet capture of DHE key exchange. > > C --> S > TLSv1.2 > cipher suite u

Re: [TLS] weird DHE params p length in TLSv1.2

2023-10-18 Thread David Benjamin
If I recall, TLS 1.2 was ambiguous on this point, so it's unclear what the sender is expected to do. I believe there were some implementations that expected a fixed-width public key (which would have been the better option to pick, but we don't have a time machine), so zero-padding on send is prud

Re: [TLS] New Internet Draft: The qpack_static_table_version TLS extension

2023-10-18 Thread Mike Bishop
I don't know that the assumption that it starts as a re-ordering is going to be valid. Certainly we have at least one instance (the erratum you reported, Rory!) where we've found something in a static table that's simply invalid; I'd expect we drop that line in any versioned update, even if we h

[TLS] Closing out final ECH issues

2023-10-18 Thread Christopher Wood
Hi folks, As promised at the last IETF meeting, we're working to close out all open issues on the ECH draft so that we can move this specification forward. Most of the editorial issues have been resolved. The list that remains is non-editorial. The list is as follows: - Handshake-level vs reco