*   The ultimate goal is to simplify adoption of ECH for both developers of 
TLS software and implementers
Understood; I do not question the goals of the authors.


  *   Without a standard approach to troubleshooting every developer has to 
build an individual set of bespoke troubleshooting tools.
The troubleshooting approach used in this I-D is more invasive than it needs to 
be. Troubleshooting can be accomplished in a number of ways, including 
logs/traces that do not disclose all TLS-protected data.


  *   We tried to keep wording in line with the keylogfile draft - for instance 
in the applicability statement it is worded that "this mechanism MUST NOT be 
used in a production system".
That’s nice, but in practice this does not prevent abuse of the feature. I 
would rather SSLKEYLOGFILE was documented by the SW vendors who choose to 
implement it, in a repository outside of the IETF. I understand I’m in the 
rough on this.

Cheers,

Andrei

From: Yaroslav Rosomakho <yrosomakho=40zscaler....@dmarc.ietf.org>
Sent: Thursday, July 25, 2024 10:12 AM
To: Andrei Popov <andrei.po...@microsoft.com>
Cc: TLS List <tls@ietf.org>
Subject: Re: [⚠️] [TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension 
file for ECH

You don't often get email from 
yrosomakho=40zscaler....@dmarc.ietf.org<mailto:yrosomakho=40zscaler....@dmarc.ietf.org>.
 Learn why this is important<https://aka.ms/LearnAboutSenderIdentification>
Thank you for the feedback, Andrei.

Yes, it is intended to stay on the informational track as an extension to 
draft-ietf-tls-keylogfile-02. We tried to keep wording in line with the 
keylogfile draft - for instance in the applicability statement it is worded 
that "this mechanism MUST NOT be used in a production system". Happy to add 
stronger wording if that helps.

The ultimate goal is to simplify adoption of ECH for both developers of TLS 
software and implementers. Without a standard approach to troubleshooting every 
developer has to build an individual set of bespoke troubleshooting tools. 
Ability to inspect ECH negotiation in off the shelf tools such as Wireshark 
during development or tests would significantly help adoption.


Best Regards,
Yaroslav

On Thu, Jul 25, 2024 at 9:31 AM Andrei Popov 
<Andrei.Popov=40microsoft....@dmarc.ietf.org<mailto:40microsoft....@dmarc.ietf.org>>
 wrote:
I do not support adoption, because I believe the IETF should not standardize 
tools and techniques for decrypting TLS-protected data.
It is harder for a TLS implementer to reject requests for IETF-blessed 
functionality.

(As long as this remains on the Informational track, I believe it's somewhat 
less harmful.)

Cheers,

Andrei

-----Original Message-----
From: Sean Turner <s...@sn3rd.com<mailto:s...@sn3rd.com>>
Sent: Thursday, July 25, 2024 9:16 AM
To: TLS List <tls@ietf.org<mailto:tls@ietf.org>>
Subject: [EXTERNAL] [TLS]Adoption call for SSLKEYLOG Extension file for ECH

At the IETF 120 TLS session there was interest in adopting the SSLKEYLOG 
Extension file for ECH I-D 
(https://datatracker.ietf.org/doc/draft-rosomakho-tls-ech-keylogfile/). This 
message starts a two-weekl call for adoption. If you support adoption and are 
willing to review and contribute text, please send a message to the list. If 
you do not support adoption of this I-D, please send a message to the list and 
indicate why. This call will close on 8 August 2024.

Thanks,
Sean
_______________________________________________
TLS mailing list -- tls@ietf.org<mailto:tls@ietf.org>
To unsubscribe send an email to tls-le...@ietf.org<mailto:tls-le...@ietf.org>

_______________________________________________
TLS mailing list -- tls@ietf.org<mailto:tls@ietf.org>
To unsubscribe send an email to tls-le...@ietf.org<mailto:tls-le...@ietf.org>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to