I respect your opinion here. I thought the behavior would be that clients
actually didn’t negotiate much, so they wouldn’t downgrade.

But maybe that is unrealistic.

thanks,
Rob

On Mon, Oct 24, 2022 at 19:28 Eric Rescorla <e...@rtfm.com> wrote:

>
>
> On Mon, Oct 24, 2022 at 7:17 PM Rob Sayre <say...@gmail.com> wrote:
>
>> Is removing HRR on the table?
>>
>
> No, I don't think so. It performs an important function. Moreover, the
> intent of this
> revision to TLS 1.3 was to clarify 8446, and this would be a major (and
> breaking!)
> change.
>
>
>
>> Maybe just opening a new socket would suffice?
>>
>
> I don't see that this would help.
>
> 1. It would not be clear to the client what it had to do to provide an
> acceptable CH.
> 2. Without some sort of HRR-like coupling, it would allow downgrade
> attacks.
>
> -Ekr
>
>
>
>> thanks,
>> Rob
>>
>> On Mon, Oct 24, 2022 at 13:08 Eric Rescorla <e...@rtfm.com> wrote:
>>
>>> Hi Folks,
>>>
>>> I have just published draft-ietf-tls-rfc8446bis-05, with
>>> the following changes:
>>>
>>> * Update the extension table (Issue 1241)
>>> * Clarify user_canceled (Issue 1208)
>>> * Clarify 0-RTT cache side channels (Issue 1225)
>>> * Require that message reinjection be done with the current hash.
>>>   Potentially a clarification and potentially a wire format
>>>   change depending on previous interpretation (Issue 1227)
>>>
>>> I landed a few current PRs without review. If people think I handled
>>> these incorrectly or mis-merged, please flag that.
>>>
>>> This includes most of the outstanding issues and PRs.
>>> The following remain:
>>>
>>> PRS
>>> 1275 -- Clarifying unsolicited extensions
>>>         [Waiting for review from Kaduk]
>>> 1270 -- The impact of excessive key updates
>>>         [Working on text with MT]
>>> 1269 -- A new error for invalid tickets
>>>         [see below]
>>> 1231 -- Update in light of RFC 8773
>>>         [I missed this, but will get to it on my next pass]
>>>
>>>
>>> SUBSTANTIVE ISSUES
>>> 1223, 1224 -- Revising the HRR rules
>>> 1278 -- There are no entries in the table for which TLS 1.3
>>>         messages token binding goes in.
>>>
>>>
>>> As preview of our discussion in London.
>>>
>>> I believe I can handle 1275, 1270, and 1231 at the editorial
>>> level.
>>>
>>> I believe we should not land 1269. As noted in the issue there is
>>> already an unknown_psk_identity, which captures this. I propose to
>>> close this issue.
>>>
>>> We need to agree on what appears in the table for token binding.
>>> I think this is mechanical. MT? DavidBen? Andrei?
>>>
>>>
>>> This leaves us with 1223 and 1224. I agree that the HRR semantics
>>> are a little confusing, but we don't seem to be making much
>>> progress on revising them and given that 8446 is already
>>> out, I think we should just publish this revision and then
>>> if people get energy to address this issue we can do so later.
>>>
>>>
>>> -Ekr
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> TLS mailing list
>>> TLS@ietf.org
>>> https://www.ietf.org/mailman/listinfo/tls
>>>
>>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to