[TLS] Re: [DNSOP] Re: Re: Re: Re: AD review draft-ietf-tls-svcb-ech

2024-10-08 Thread Eric Rescorla
I agree that you can't trust a resolver that you only know about from ADD. -Ekr On Tue, Oct 8, 2024 at 8:31 AM Paul Wouters wrote: > I agree with your points. Our only difference of opinion seems to be about > how much one should trust a TRR. > I still prefer to need to trust them the least po

[TLS] Re: [EXTERNAL] Re: Consensus Call: early code point request for draft-ietf-tls-key-share-prediction

2024-10-08 Thread Eric Rescorla
I'm OK with a code point assignment so that people can test this out. I don't think we're at the point where we know the draft won't change. -Ekr On Wed, Sep 25, 2024 at 2:36 PM Bas Westerbaan wrote: > If we want a new name, then I propose kex_hint — keyshare is a DH concept. > I'm happy with

[TLS] TLS WG GH Repo Updates

2024-10-08 Thread Sean Turner
Thanks to Yaroslav and Hannes for moving over the repo for the following repos: -ech-keylogfile: https://github.com/tlswg/draft-ietf-tls-ech-keylogfile -extended-key-update: https://github.com/tlswg/tls-key-update I also went ahead and update the weekly summary to include these and a lot of ot

[TLS] Re: [DNSOP] Re: Re: Re: Re: AD review draft-ietf-tls-svcb-ech

2024-10-08 Thread Paul Wouters
I agree with your points. Our only difference of opinion seems to be about how much one should trust a TRR. I still prefer to need to trust them the least possible, meaning I would want DNSSEC validation to at least detect tampering at the TRR. With more ECH deployed, and less visibility of SNI, th