On Tue, 2017-11-07 at 16:32 -0800, Eric Rescorla wrote: > > > On Tue, Nov 7, 2017 at 4:25 PM, Watson Ladd <watsonbl...@gmail.com> > wrote: > > On Tue, Nov 7, 2017 at 4:05 PM, Jana Iyengar <j...@google.com> > > wrote: > > > FWIW: In my experience middleboxes don't ossify based on what the > > spec says, > > > they ossify based on what they see on the wire. So, if common > > > implementations send CCS in a particular way, that's what will > > get --- and, > > > I'll argue, what has gotten --- ossified. I also agree with David > > and Eric > > > that compatibility mode shouldn't be required because QUIC > > doesn't need it. > > > > What does compatibility mode mean here? > > It means: > > 1. Send the fake session_id > 2. Send a bunch of spurious CCS values. > > > > If we end up with having two > > slightly different versions of TLS 1.3, one that looks more like > > TLS > > 1.2 and the other that does not, that doesn't seem like a good > > thing > > to me. > > Well, the idea is that this is a purely local decision by one side.
Which increases the cost of TLS1.3 implementation and testing by introducing different handshake state machines. Why not negotiate that CCS addition with an extension and have it defined outside the TLS 1.3 spec? I understand the concerns of the browser "community" on being 100% backwards compatible with middle boxes, but the TLS1.3 standard is more than just browsers. If 100% compatibility is required, there is a very simple solution, use TLS 1.2. regards, Nikos _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls