On Sun, Oct 14, 2018 at 1:38 AM Hanno Böck <ha...@hboeck.de> wrote:

> Hi,
>
> Thanks for that interesting explanation.
>
> I just learned about another TLS 1.3 "intolerance" issue that people
> deploying it should be aware of: It seems some servers don't consider
> TLS 1.3 cipher suites as "safe" for HTTP/2 and this breaks connections:
> https://bugzilla.mozilla.org/show_bug.cgi?id=1488240#c39


FWIW, I think this may have just been a defect in one provider .



> While HTTP/2 is not necessarily the focus of this group I wonder what
> that means, how HTTP/2 implementations should be made future proof and
> if there can be a GREASE-like mechanism for it.
> Whitelisting "safe" ciphers seems to be a bad idea and almost
> inevitably will lead to more trouble in the future.
>

HTTP/2 was pretty careful to phrase this as a black list of unsafe ciphers,
so while I agree that whatever happened here was bad, I'm not quite
sure how RFC 7540 could have been written to make it less likely...

-Ekr


-- 
> Hanno Böck
> https://hboeck.de/
>
> mail/jabber: ha...@hboeck.de
> GPG: FE73757FA60E4E21B937579FA5880072BBB51E42
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to