In an attempt to close the loop here, I've pushed a new PR version with a
64-bit sentinel with the final byte being 00 for TLS 1.2 and 01 for TLS
1.3. If anyone strongly objects to this construction, please raise your
hand now.

Otherwise, I plan to merge this on Wednesday.

https://github.com/tlswg/tls13-spec/pull/284

-Ekr



On Mon, Oct 19, 2015 at 10:05 AM, Martin Thomson <martin.thom...@gmail.com>
wrote:

> On 19 October 2015 at 08:08, Eric Rescorla <e...@rtfm.com> wrote:
> > overloading the time field
> > lowers the risk of false positives because we can choose a sentinel that
> > will never
> > collide with a conformant TLS 1.2 ServerHello. By contrast, a sentinel in
> > the
> > randomly generated portion always has a 2^{-n} chance of collision.
>
> Yes, this is right.  The marginal gain is that the proportion of
> servers that generate a time here are immune to collisions.  If
> servers all servers did that, we wouldn't have to worry about
> collisions at all. Unfortunately, we do know that some generate random
> values.
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to