I support this change, willing to implement it in the Windows TLS stack. We 
have thousands of customers concerned about increased latencies due to the 
enablement of TLS 1.3. The services they connect to require NIST curves and HRR 
is required to get TLS clients to send appropriate key shares. TLS 1.3 with HRR 
is somewhat higher-latency than TLS 1.2 full handshake, so TLS 1.3 deployment 
causes performance regressions for these customers.

(Of course, TLS key share prediction could override this, when the server's DNS 
record indicates no P256 support. The key share prediction draft can include 
this provision.)

Cheers,

Andrei

-----Original Message-----
From: Peter Gutmann <pgut...@cs.auckland.ac.nz> 
Sent: Wednesday, June 5, 2024 6:54 AM
To: Eric Rescorla <e...@rtfm.com>
Cc: tls@ietf.org
Subject: [EXTERNAL] [TLS]Re: Curve-popularity data?

Eric Rescorla <e...@rtfm.com> writes:

>One more thing: we are finalizing RFC 8446-bis right now, so if there 
>is WG consensus to require that clients offer all MTI curves in the 
>key_shares of their initial CH, then that would be a straightforward text 
>change.

That would fix things, something like saying a client has to provide at least 
one MTI cipher suite/signature/keyex in its client hello.  There's only one MTI 
curve in 8446 so "all MTI curves" isn't a big deal.

Peter.
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to