> On 22 Oct 2015, at 9:26 PM, Watson Ladd <watsonbl...@gmail.com> wrote:
> 
> 
> On Oct 22, 2015 2:20 PM, "Salz, Rich" <rs...@akamai.com 
> <mailto:rs...@akamai.com>> wrote:
> >
> > > If we (okay, not "we", library implementors) require explicit application 
> > > opt-
> > > in to TLS 1.3, the adoption rate is probably not going to be very good.  
> > > So, yes,
> > > I think applications should start using TLS 1.3 without any changes.
> >
> > And what about 0RTT?  Removed support for some crypto?  Various other 
> > semantic changes?
> 
> If you don't enable 0RTT support and ignore removed crypto, what breaks? Most 
> apps don't use renegotiation anyway?
> >
> > What you're really saying is "just like it always used to be, just better."
> >
> > And I want a pony.
> 
> Most applications want a simple API that hides all the complexities of TLS. 
> If OpenSSL had done that, then it would be easy to see how enabling 1.2 won't 
> cause problems for those apps which said "you take care of it”.
> 
That is true only if your application’s client component and server component 
are using the same library. That is not guaranteed in a protocol. Specifically 
that is not the case with the web.

There are some version intolerant servers out there that will choke on seeing a 
TLS 1.3 ClientHello. If the client uses some library (like OpenSSL) and you 
upgrade to OpenSSL 1.2.0 that has TLS 1.3. All of the sudden your application 
is broken. On the web this means that some websites don’t work.  Do you live 
with the application being sometimes broken?  Do you make some downgrade dance? 
Hard question, and one that the application needs to answer. 

In any library it’s a major problem if an API call fails in the new version of 
the library where it would succeed in the old version. In a library 
implementing a protocol this could happen because of the network, because of 
middleboxes implementing their own version of “sanity” on the traffic, or 
because of peers that might have a different interpretation of the previous 
standard.

Yoav

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to