[quicwg/base-drafts] SNI encryption (#795)

Martin Thomson <notifications@github.com> Mon, 25 September 2017 23:45 UTC

Return-Path: <bounces+848413-a050-quic-issues=ietf.org@sgmail.github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56EBC1345FF for <quic-issues@ietfa.amsl.com>; Mon, 25 Sep 2017 16:45:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.019
X-Spam-Level:
X-Spam-Status: No, score=-2.019 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_32=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ydcMHKI_ZbhX for <quic-issues@ietfa.amsl.com>; Mon, 25 Sep 2017 16:45:39 -0700 (PDT)
Received: from o11.sgmail.github.com (o11.sgmail.github.com [167.89.101.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9E2221345FE for <quic-issues@ietf.org>; Mon, 25 Sep 2017 16:45:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com; h=from:reply-to:to:cc:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=hsDboM4/HOu8tZwjB6RXjmq1seg=; b=cFgyiYWNBQfGjqcf vczsm1ewMAHRIDxQZ0Hdgz+UenzWbDXo7nrvkQfrQn73jd3KP8ZO7kxiL/sTQ4DT JbWFN4r01RcpHH4qDLH+xjDDUeSX4HH19/2AMZpD/0xjZ2iHVnf+RC8qFC8v6gd3 o7nSvMMM/jeRnd2+TN2ni4pOr8k=
Received: by filter1073p1mdw1.sendgrid.net with SMTP id filter1073p1mdw1-17417-59C99522-3C 2017-09-25 23:45:38.969493621 +0000 UTC
Received: from github-smtp2a-ext-cp1-prd.iad.github.net (github-smtp2a-ext-cp1-prd.iad.github.net [192.30.253.16]) by ismtpd0004p1iad1.sendgrid.net (SG) with ESMTP id RJtq0BEFQyiYZopzBmgs3g for <quic-issues@ietf.org>; Mon, 25 Sep 2017 23:45:38.908 +0000 (UTC)
Date: Mon, 25 Sep 2017 23:45:39 +0000
From: Martin Thomson <notifications@github.com>
Reply-To: quicwg/base-drafts <reply+0166e4ab2d46447d1a2809e3d4a095dbb75aab60dd210acd92cf0000000115e1572292a169ce0f861fa8@reply.github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <quicwg/base-drafts/issues/795@github.com>
Subject: [quicwg/base-drafts] SNI encryption (#795)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_59c99522c9689_4c243f8488b3cf80772e8"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: martinthomson
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
X-SG-EID: l64QuQ2uJCcEyUykJbxN122A6QRmEpucztpreh3Pak16xoqxrCdnD1GeAclqVdKQMuNpNr6CG9eX1A bI4g5zd855hKA/C3mEsw2Bun0N0IAYCjtn1jg+EA+efmh7p1XPVD8CUPneIn1OEfM4qbM4OIqDJsJz CpCz+TWyE9TcK+vnH0FI7qrk4ay3rtGvFixweFRumyu52lh5e4G4OG2iH4wLFn3/5g9CYx0u21SY8I I=
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/eFJ5C9zFhVFeXSb3Lq5UwToUkE4>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Notification list for GitHub issues related to the QUIC WG <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Sep 2017 23:45:41 -0000

In #794, @hardie observed that the current draft for SNI encryption proposes solutions that are - at best - a poor fit for the current QUIC design.  Do we want to address this problem in the design?

Fixing the problem early might avoid foreclosing on potential solutions in the future.  It's also possible that we could take advantage of the fact that we don't really have a whole bunch of deployment assumptions that we have to work around.

On the other hand, it might also be really, really hard.  It's not like we haven't already tried to find a solution for TLS over TCP.

FWIW, I don't think that we get to resolve #794 until we have at least had a discussion about this issue.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/quicwg/base-drafts/issues/795