Adam Roach wrote: > draft-ietf-tls-ecdhe-psk-aead-04: No Objection > > ---------------------------------------------------------------------- > COMMENT: > ---------------------------------------------------------------------- > > I agree with EKR's discuss -- specifying semantics for these ciphersuites > with TLS 1.0 and 1.1 is a material change, and the proposed mechanism (in > which servers are encouraged to infer 1.2 support even in the absence of > explicit indication) is a bit baffling.
It encourages (but does not require) servers to infer 1.2 support from _very_explicit_ information: the offering of TLSv1.2-only TLS ciphersuites is the very same TLS ClientHello handshake message. We know since rfc5746 that the most reliable scheme to indicate support for certain TLS protocol features is a cipher suite value. It is far from rocket science to infer support for 1.2 from 1.2-only cipher suite codepoints in ClientHello.cipher_suites. I just realized that I suggested removal of a description of client behaviour that can, and should remain in the document (I'm sorry): A client MUST treat the selection of these cipher suites in combination with a version of TLS that does not support AEAD (i.e., TLS 1.1 or earlier) as an error and generate a fatal 'illegal_parameter' TLS alert. -Martin _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls