I'm a big fan of the idea of a very strict qualification suite, as well, to
try to head off some of these problems before (faulty) implementations
proliferate.

Hackathon?

Kyle
On Jun 7, 2016 2:00 AM, "Peter Gutmann" <pgut...@cs.auckland.ac.nz> wrote:

> Dave Garrett <davemgarr...@gmail.com> writes:
>
> >Also, as with any new system, we now have the ability to loudly stress to
> TLS
> >1.3+ implementers to not screw it up and test for future-proofing this
> time
> >around.
>
> I think that's the main contribution of a new mechanism, it doesn't really
> matter whether it's communicated as a single value, a list, or interpretive
> dance, the main thing is that there needs to be a single location where the
> version is given (not multiple locations that can disagree with each other
> as
> for TLS < 1.3), and the spec should include a pseudocode algorithm for
> dealing
> with the version data rather than just "implementations should accept
> things
> that look about right".
>
> Peter.
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to