https://github.com/tlswg/tls13-spec/pull/508

David Benjamin has suggested moving the downgrade sentinel to the end of
the server random to avoid breaking tlsdate. This seems reasonable, as the
only real argument against is that conformant TLS 1.3 servers will have
only 20 bytes of entropy when doing TLS 1.2 compat (if they put the time in
the top 32 bytes), as opposed to 24 if they randomize the first 32 bytes.
OTOH, those bytes will be more unique over time (because they are
guaranteed not to repeat for a very long time after the second has passed),
so intuitively this seems like a wash.

Barring any objections I'll merge this PR on Wednesday

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to