Jacob Appelbaum wrote:
> On 12/2/15, Martin Rex <m...@sap.com> wrote:
>>
>> So your client will have to know a-priori, out-of-band or be configured
>> to TLSv1.3-only in order to avoid using a TLSv1.2-compatible ClientHello
>> with cleartext SNI.
> 
> I think that is false. One could easily use the "cleartext" SNI field
> and insert an encrypted value. A hash of the name would be a simple
> example but not a secure example, of course.

No you can NOT do this (in TLSv1.2 and earlier), because it is entirely
backwards-incompatible.

Server-side SNI can even be implemented completely outside of the TLS
protocol stack (that is how I implemented it).


> 
> To the point about TLS 1.2 vs TLS 1.3: Legacy clients will be less
> secure

That is a myth.

>
> and in ways that will only become worse over time. We should
> remember that TLS 1.3, while not yet finished or deployed, is a future
> legacy protocol.

TLSv1.3 is looking more and more like a future market failure to me,
worse than IPv6.


-Martin

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to