On Wed, Jan 4, 2023 at 9:37 AM Kristijan Sedlak <xpeperm...@gmail.com>
wrote:

> Got it.
>
> 1. So we should not try to support DTLS and CTLS at the same time. As you
> say, it’s a breaking change. so it’s better to have two "dedicated"
> implementations.
>

In general, I would expect cTLS implementations to be part of a codebase
that also implements TLS and DTLS, roughly like a third protocol variant.


> 2. You’ve mentioned profile_ids of 4 bytes being "well known”.  We wait
> for IANA to open a new registry for this, right?
>

The draft specifies the initial registry contents, so we can use that in
addition to the null profile and "long" custom profiles.


>
> Thanks.
>
> K
>
>
> On 4 Jan 2023, at 15:07, Ben Schwartz <bem...@google.com> wrote:
>
> Coalescing threads.
>
> On Wed, Jan 4, 2023 at 6:09 AM Kristijan Sedlak <xpeperm...@gmail.com>
> wrote:
>
>> CTLS looks interesting.
>>
>> 1. Is it too early for us developers to start working on implementations?
>
>
> Now is a great time to start on an implementation!
>
> 2. Is this the way where UDP-based TLS is going in general or is it just
>> yet another experiment built for specific use cases and is not intended for
>> general use? Will cTLS be the new dTLS?
>
>
> cTLS is not limited to UDP.  However, for both UDP-like and TCP-like use
> cases, cTLS represents a breaking change compared to TLS and DTLS.  As
> such, it cannot be deployed via a transparent upgrade like TLS 1.x and DTLS
> 1.x.  Use is limited to cases where the client knows in advance that the
> server supports a specific cTLS profile (and the benefits of cTLS have been
> judged to justify the additional complexity).
>
>  Can we expect long-term support from IETF?
>>
>
> The IETF doesn't really provide "support", just documentation.  However,
> if cTLS does become a "Proposed Standard", it is likely to remain so for
> many years.
>
> On Wed, Jan 4, 2023 at 6:12 AM Kristijan Sedlak <xpeperm...@gmail.com>
> wrote:
> ...
>
>> The spec states that a client needs to inform the server about the
>> profile it is planning to use (profile_id in the record's header). Does
>> this mean that endpoints should all share the same knowledge about
>> available profiles or is there a predefined list of profiles provided by
>> IETF?
>
>
> profile_ids of 4 bytes and less are "well known", and must be registered
> with IANA.  Note that this registry can expand over time, so neither party
> can assume that the other party understands a profile_id just because it is
> registered, as the other party might have last been updated before the
> profile_id was registered.
>
> Longer profile_ids are not subject to registration, and may have different
> meanings in different contexts.
>
>
>> How will the profile system work on the open internet?
>
>
> I see cTLS being used in three different ways:
>
> 1. By private arrangement, like an embedded device whose firmware includes
> a particular profile.
> 2. By standards action, like in a future version of QUIC that specifies a
> cTLS profile to use for the embedded TLS handshake
> 3. By negotiation.  For example, two WebRTC peers could negotiate a cTLS
> profile during connection setup.
>
> This specification only covers #1.  The other two paths will require
> additional standards work, but that work will probably only happen once we
> have some implementation experience with cTLS.
>
>
>

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to