[TLS] Re: 【Reply to the comments after the presentation in Montreal】RE: Re: FW: New Version Notification for draft-wang-tls-service-affinity-00.txt

Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de> Sat, 03 January 2026 23:42 UTC

Return-Path: <muhammad_usama.sardar@tu-dresden.de>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id BCCBFA2042D5; Sat, 3 Jan 2026 15:42:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.397
X-Spam-Level:
X-Spam-Status: No, score=-4.397 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=tu-dresden.de
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LCRP5xCz7RZ3; Sat, 3 Jan 2026 15:42:04 -0800 (PST)
Received: from mailout3.zih.tu-dresden.de (mailout3.zih.tu-dresden.de [141.30.67.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 8DF6DA2042CB; Sat, 3 Jan 2026 15:42:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=tu-dresden.de; s=dkim2022; h=Content-Type:In-Reply-To:From:References:CC:To :Subject:MIME-Version:Date:Message-ID:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=N7vn385S8b9qJ3VtbPYPo1ppy1oI7E4wXnMDqPjxbt0=; b=XT2iouWC+YVVwaJXKXeM5mIwDe gX72Pp+m0yDUM/L0tz32Zb2gBi5JQkHxTPGWlfpXleqUMd9oiTCqh93Ykvj03Y0BoC98INIaLWolS IHvYf9boTbyh6fn8MgEa6mKixrJ332nZxUn3h0moU6Zpg52wMUE3HaVIXGjEMdnsfOe49WWD+B71L 7SRv/esBgkc+CsD3cME6on7kpJ0cT3zeuAPjY3YgKV6G3fhP3v4a7CXFi0leXjXkluJrWy7tSF3Ow ZBU9iAkF+wXDzojRHvPpB6Gp/zDzkX6QTu0gPEZUZEi5iijACf+oam5WmQ00LHgbQtWCznEBl+gRe vSD9lUkA==;
Received: from msx-t422.msx.ad.zih.tu-dresden.de ([172.26.35.139] helo=msx.tu-dresden.de) by mailout3.zih.tu-dresden.de with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <muhammad_usama.sardar@tu-dresden.de>) id 1vcBFz-00F36b-0Y; Sun, 04 Jan 2026 00:42:03 +0100
Received: from [10.12.5.228] (141.76.13.149) by msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.35; Sun, 4 Jan 2026 00:41:40 +0100
Message-ID: <697fc51f-b711-441a-8764-a6672c750095@tu-dresden.de>
Date: Sun, 04 Jan 2026 00:41:39 +0100
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: Eric Rescorla <ekr@rtfm.com>
References: <000001dc7615$cf415b70$6dc41250$@tsinghua.org.cn> <CABcZeBM=59id8msEU2i=qQXiwNKZnHTBAJ85zmEKD8USQF5z_w@mail.gmail.com> <004e01dc7974$957ebab0$c07c3010$@tsinghua.org.cn> <CABcZeBPgw0Fsz0QyD6T2Q8CoZcWbXQS_ptoTqNfbBGydawdVRw@mail.gmail.com> <86ae6048-7584-4fcc-947a-270865c2e2d9@tu-dresden.de> <CABcZeBPzeLRB+iamwhYMGYf6iEjHsYEKkB=UZxDEVgZk+xFvWg@mail.gmail.com>
Content-Language: en-US
From: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
In-Reply-To: <CABcZeBPzeLRB+iamwhYMGYf6iEjHsYEKkB=UZxDEVgZk+xFvWg@mail.gmail.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-512"; boundary="------------ms090104010207060902040900"
X-ClientProxiedBy: MSX-L422.msx.ad.zih.tu-dresden.de (172.26.34.142) To msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139)
X-TUD-Virus-Scanned: mailout3.zih.tu-dresden.de
Message-ID-Hash: VRKC3NMSYPAIGCSYAAW5DQEC6VJHC3CL
X-Message-ID-Hash: VRKC3NMSYPAIGCSYAAW5DQEC6VJHC3CL
X-MailFrom: muhammad_usama.sardar@tu-dresden.de
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Aijun Wang <wangaijun@tsinghua.org.cn>, tls@ietf.org, draft-wang-tls-service-affinity@ietf.org, Mohit Sahni <msahni@paloaltonetworks.com>, Aijun Wang <wangaj3@chinatelecom.cn>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: 【Reply to the comments after the presentation in Montreal】RE: Re: FW: New Version Notification for draft-wang-tls-service-affinity-00.txt
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/lA9uGd8IExBE5YdQ0Kql2lXL6lk>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

On 03.01.26 21:59, Eric Rescorla wrote:

> On Sat, Jan 3, 2026 at 11:51 AM Muhammad Usama Sardar 
> <muhammad_usama.sardar@tu-dresden.de> wrote:
>
>     I am trying to follow this thread. I am not sure in what sense
>     both of you are using "TLS layer". It occurs 3x in RFC8446bis-14
>     but is never defined. It is also not defined in this draft. Does
>     it refer to handshake and record protocols of TLS? Or does it
>     refer to everything that is implemented as part of the TLS
>     library? or something else?
>
> In this context, it refers to the stuff defined in RFC 8446, which has 
> an implicit interface at the bottom to some reliable delivery protocol 
> and at the top to the application layer.
If at the top it is to application layer, then what exactly is "HTTP 
layer" and "REST API layer" in one of your emails, since the draft does 
not mention that. Could you please point me to the relevant RFCs/specs 
for understanding these layers in the sense you are using them and your 
ladder diagrams?
> For the purpose of this discussion you can read "TLS layer" as "TLS".
Thanks, that's very helpful.
>
>     In general, what is "TLS layer" in QUIC for example?
>
> Yes, QUIC breaks some of the TLS abstraction boundaries, but that's 
> not relevant in this case, which is about application protocols over TLS.
I don't see why QUIC is irrelevant here because the draft does 
explicitly cite QUIC. It seems to omit a single step in QUIC but does 
not seem to put QUIC out of scope. So I believe my question still stands.
>
>     On 30.12.25 15:40, Eric Rescorla wrote:
>>     I don't know what you mean by "The same session identifier".
>
>     I think it could refer to a key derived from Main Secret.
>
> Perhaps, but as noted in my previous email, I'd like to hear Aijun 
> explain the protocol he has in mind.
Noting a strange blender of TLS 1.2 and TLS 1.3 in the draft (which I 
think I have pointed out before), I can imagine authors are not much 
into TLS. So it was intended to help them. I don't see why such a key 
would not be an option.
>
>>     Yes. I said exactly this, but again, they're not always going to be
>>     implemented correctly, and that's largely OK because most
>>     connections don't fail.
>
>     You have presented this argument a couple of times but I don't
>     think it's a good one. I believe nothing in this world is
>     "/always/ going to be implemented correctly", including TLS itself
>     which has 1000+ related CVEs currently.
>
> I don't see the relevance of this point.

The relevance of my point here is that your ask seems quite unrealistic 
to me even with formal analysis. I can do the formal analysis for them 
to gain more confidence that it's not breaking anything but nothing can 
ever reach the point of "/always/ going to be implemented correctly".

> We take the environment as we find it, and try to avoid making changes 
> that break things even if other parts of the environment have defects. 
> For example, we went to a huge amount of effort to avoid having TLS 
> 1.3 fail with existing middleboxes.

Sure, but how is it relevant to the ask for "/always/ going to be 
implemented correctly"? Are you claiming that after this huge effort, 
you now have the guarantee that it's "/always/ going to be implemented 
correctly"?

Authors, could you please update the draft to TLS 1.3 and add all the 
relevant references for me to help you out?

-Usama