Hiya,

On 10/11/2020 03:44, Joseph Salowey wrote:
Based on interest and support expressed at IETF 108, this email starts the
call for adoption of draft-vvv-tls-cross-sni-resumption. The draft can be
found here:


    https://tools.ietf.org/html/draft-vvv-tls-cross-sni-resumption-00


This adoption call will run until November 30, 2020. Please indicate
whether or not you would like to see this draft adopted.

I'd be more in the "not yet" bracket for this. As Martin
mentions this'd seem to create a possibly attractive way
to do more tracking, so I think we ought try understand
how that might fit into the wider set of new things (e.g.
the HTTPS RRtype) before adopting.

One concern is that this mechanism plus some minimal cert
trickery such as having a single name present in many certs
could result in large scale cross domain tracking if say the
owner of "use-us-to-track-em.example.com" enabled anyone in
their (advertising) network to pass ACME checks as needed,
for that name.

While that kind of trickery ought be visible via CT, I'm not
sure we could depend on the web PKI to ensure it'd not
happen.

Cheers,
S.



Note that this is
an adoption call for the draft as a starting point towards solving the
problem of resumption across SNI values. The final mechanism may certainly
change depending on related efforts, e.g., draft-ietf-tls-tlsflags.


Thanks,


Sean, Chris and Joe


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Attachment: OpenPGP_0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to