Thanks.

What sort of errors are we trying to avoid by making sure implementations have 
to check for zeroed padding? Are we really worried some sloppy implementation 
is going to leave it uninitialized in a memory-unsafe language and just encrypt 
an arbitrary block of memory? This was mentioned at some point, and sounds 
really stupid, but planning for the stupid is probably a good idea.


Dave


On Tuesday, September 22, 2015 09:18:53 pm Eric Rescorla wrote:
> "Versions of TLS prior to 1.3 had limited support for padding. This padding
> scheme was selected because it allows padding of any encrypted TLS record
> by an arbitrary size (from zero up to TLS record size limits) without
> introducing new content types. The design also enforces all-zero padding
> octets, which allows for quick detection of padding errors.
> "
> 
> On Tue, Sep 22, 2015 at 4:45 PM, Dave Garrett <davemgarr...@gmail.com>
> wrote:
> 
> > On Tuesday, September 22, 2015 07:27:35 pm Sean Turner wrote:
> > > I’ve gone ahead and posted the minutes/list of decisions to:
> > >
> > >
> > https://www.ietf.org/proceedings/interim/2015/09/21/tls/minutes/minutes-interim-2015-tls-3
> >
> > That has this:
> >
> > > For padding, we reached a very rough consensus to start with the content
> > type followed by all zeros (insert reasons why) over the explicit length
> > option (insert reasons why).  DKG to propose a PR that we'll then fight out
> > on the list.  See PR #253.
> >
> > The "reasons why" that were discussed were not inserted. ;)

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to