This paragraph refers to the anti-downgrade mechanism described in 4.1.3.

-Ekr


On Wed, Nov 9, 2016 at 6:56 AM, Roel Peeters <roel.peet...@esat.kuleuven.be>
wrote:

> Hi Dave,
>
> We are wondering because of this piece of text from the RFC EDITOR just
> above paragraph 4.1.4 on Hello Retry Request:
>
> RFC EDITOR: PLEASE REMOVE THE FOLLOWING PARAGRAPH Implementations of draft
> versions (see Section 4.2.1.1) of this specification SHOULD NOT implement
> this mechanism on either client and server. A pre-RFC client connecting to
> RFC servers, or vice versa, will appear to downgrade to TLS 1.2. With the
> mechanism enabled, this will cause an interoperability failure.
> Best,
> Roel
>
> On 8 Nov 2016, at 22:26, Dave Garrett <davemgarr...@gmail.com> wrote:
>
> On Tuesday, November 08, 2016 09:55:36 am Roel Peeters wrote:
>
> we are also wondering whether or not the Hello Retry Request will be
> included or omitted in the standard. Leaving it out will make TLS 1.3
> vulnerable again to downgrade attacks ...
>
>
> Why are you wondering about this? HRR is in the specification and there
> has been no discussion to remove it.
>
>
> Dave
>
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to