On Tue, May 7, 2024 at 8:07 AM David Benjamin <david...@chromium.org> wrote:
>
> [changing the subject since I expect this to mostly be a tangential 
> discussion]
>
> On Sat, May 4, 2024, 09:12 Stephen Farrell <stephen.farr...@cs.tcd.ie> wrote:
>>
>> I hope, as the WG are processing this 
>> [draft-davidben-tls-key-share-prediction], we consider what,
>> if anything, else could be usefully added to HTTPS RRs
>> to make life easier.
>
>
> Actually, I think one thing that could help is one of your drafts! One 
> barrier with trying to use HTTPS RR for TLS problems is keeping the DNS and 
> TLS sides in sync on the server deployment. Prior to ECH, this hasn't been 
> done before, so I wouldn't expect any deployments to have a robust path from 
> their TLS configuration to their DNS records.
>
> draft-ietf-tls-wkech seems like a good model for this, but it is currently 
> written specifically for ECH. What are your thoughts on generalizing that 
> document to cover other cases as well?
> https://github.com/sftcd/wkesni/issues/14
>
> We might also think about the extension model for that document. Does each 
> SvcParamKey opt into use with the document, with its own JSON key and text 
> describing how to map it, or should we just use the presentation syntax and 
> import it all en masse? (I'm not sure. The latter would certainly be less 
> work for new SvcParamKeys, but I'm not sure what the implications would be of 
> the DNS frontend picking up SvcParamKeys it doesn't understand. Then again, 
> we seem to have happily imported basically all the existing keys anyway.)

The one reason I could see this being a problem is that the HTTPS RR
RFC specifies per-key wire format encodings. If we use presentation
format and import it all en masse we need to deal with what happens
when the DNS infrastructure doesn't understand a ScvParamKey. If we
encoded wire format somehow in the JSON, people making these would be
sad. But I like the idea of extending this mechanism vs. making a new
one.

Sincerely,
Watson

>
> David
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org



-- 
Astra mortemque praestare gradatim

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to