Hi Ekr,

Do you see some simplifications resulting from this?

On first thought I'd think that since implementations are already able to 
handle implicit
ACKs, it doesn't come at extra cost to allow their use for post-HS client-auth, 
too.

In contrast, it seems that if the client's Certificate message no longer
implicitly acknowledges the CertificateRequest, there's need to explicitly
explain the state machine transition upon receipt of the Certificate message
prior to receiving an ACK for the CertificateRequest.

Overall I feel that there is no need for change here, but I might miss 
something.

Best,
Hanno

________________________________
From: TLS <tls-boun...@ietf.org> on behalf of Eric Rescorla <e...@rtfm.com>
Sent: Thursday, April 23, 2020 9:48 PM
To: <tls@ietf.org> <tls@ietf.org>
Subject: [TLS] Implicit ACKs in post-handshake

Hi folks,

As I was going through the ACK clarifications, I noticed that we were
requiring explicit ACKs for everything other than post-handshake
client auth, where we allow implicit ACK. This obviously works,
but given that (1) we expect explicit ACK from the client if there
is a user-consent delay and (2) it's the only one, what would people
think of using implicit ACKs only for the handshake itself.

-Ekr


IMPORTANT NOTICE: The contents of this email and any attachments are 
confidential and may also be privileged. If you are not the intended recipient, 
please notify the sender immediately and do not disclose the contents to any 
other person, use it for any purpose, or store or copy the information in any 
medium. Thank you.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to