[TLS] Re: 【Reply to the comments after the presentation in Montreal】RE: Re: FW: New Version Notification for draft-wang-tls-service-affinity-00.txt

Aijun Wang <wangaijun@tsinghua.org.cn> Sun, 04 January 2026 01:42 UTC

Return-Path: <wangaijun@tsinghua.org.cn>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 08964A209DDE for <tls@mail2.ietf.org>; Sat, 3 Jan 2026 17:42:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: 0.803
X-Spam-Level:
X-Spam-Status: No, score=0.803 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e2usfr4A3fHZ for <tls@mail2.ietf.org>; Sat, 3 Jan 2026 17:42:15 -0800 (PST)
Received: from mail-m8212.xmail.ntesmail.com (mail-m8212.xmail.ntesmail.com [156.224.82.12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id E3F3DA209DCC for <tls@ietf.org>; Sat, 3 Jan 2026 17:42:12 -0800 (PST)
Received: from LAPTOP09T7970K (unknown [219.142.69.75]) by smtp.qiye.163.com (Hmail) with ESMTP id 2f626682e; Sun, 4 Jan 2026 09:42:03 +0800 (GMT+08:00)
From: Aijun Wang <wangaijun@tsinghua.org.cn>
To: '【外部账号】 Eric Rescorla' <ekr@rtfm.com>
References: <000001dc7615$cf415b70$6dc41250$@tsinghua.org.cn> <CABcZeBM=59id8msEU2i=qQXiwNKZnHTBAJ85zmEKD8USQF5z_w@mail.gmail.com> <004e01dc7974$957ebab0$c07c3010$@tsinghua.org.cn> <CABcZeBPgw0Fsz0QyD6T2Q8CoZcWbXQS_ptoTqNfbBGydawdVRw@mail.gmail.com>
In-Reply-To: <CABcZeBPgw0Fsz0QyD6T2Q8CoZcWbXQS_ptoTqNfbBGydawdVRw@mail.gmail.com>
Date: Sun, 04 Jan 2026 09:42:09 +0800
Message-ID: <011601dc7d1b$57b5bf30$07213d90$@tsinghua.org.cn>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0117_01DC7D5E.65D8FF30"
X-Mailer: Microsoft Outlook 16.0
Content-Language: zh-cn
Thread-Index: AQI7N+UrCa4wrDE8olUN5ROrNp4g5AJ9CNDCAQXilJYCcnx2BbRUFPgg
X-HM-Tid: 0a9b86ab29b703a2kunm5a7d577b2d5c85
X-HM-MType: 10
X-HM-Spam-Status: e1kfGhgUHx5ZQUpXWQgPGg8OCBgUHx5ZQUlOS1dZFg8aDwILHllBWSg2Ly tZV1koWUFKTEtLSjdXWS1ZQUlXWQ8JGhUIEh9ZQVkZSRlMVhgZS01DSB0YSUNJTlYeHw5VEwETFh oSFyQUDg9ZV1kYEgtZQVlJSkJVSk9JVU1CVUxOWVdZFhoPEhUdFFlBWU9LSFVKS0hKSkJMVUpLS1 VKQktLWQY+
Message-ID-Hash: HBAXCKQOHJN6MHN7NJ7GA6FWCH7NCYJT
X-Message-ID-Hash: HBAXCKQOHJN6MHN7NJ7GA6FWCH7NCYJT
X-MailFrom: wangaijun@tsinghua.org.cn
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: tls@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: 【Reply to the comments after the presentation in Montreal】RE: Re: FW: New Version Notification for draft-wang-tls-service-affinity-00.txt
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/z2xttjs1MFdDiLCDqsj3y_llKEY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

Hi, Eric:

 

What we want to is similar with “Resumption and Pre-Shared Key(PSK)” that is described in https://datatracker.ietf.org/doc/html/rfc8446#section-2.2

>From this section, we can know the application layer will not aware such session resumption, TLS layer handles all the procedure. Right?

 

What you described in previous examples can all happen in the resumption process, and the application layer should have their own additional confirmation/retry logic.

 

For the mentioned draft(https://datatracker.ietf.org/doc/draft-wang-tls-service-affinity/), the additional exchange signals are to transfer the new server address securely after the initial connection.

What’s the client and server need do is to correlate the corresponding cryptographic context to the new underlying TCP connection.

 

Do you have any suggestions to make the above intension more clearly in https://datatracker.ietf.org/doc/draft-wang-tls-service-affinity/?

 

 

 

From: forwardingalgorithm@ietf.org [mailto:forwardingalgorithm@ietf.org] On Behalf Of 【外部账号】 Eric Rescorla
Sent: Tuesday, December 30, 2025 10:41 PM
To: Aijun Wang <wangaijun@tsinghua.org.cn>
Cc: tls@ietf.org; draft-wang-tls-service-affinity@ietf.org; Mohit Sahni <msahni@paloaltonetworks.com>; Aijun Wang <wangaj3@chinatelecom.cn>
Subject: Re: [TLS] Re: 【Reply to the comments after the presentation in Montreal】RE: Re: FW: New Version Notification for draft-wang-tls-service-affinity-00.txt

 

 

 

On Tue, Dec 30, 2025 at 2:10 AM Aijun Wang <wangaijun@tsinghua.org.cn <mailto:wangaijun@tsinghua.org.cn> > wrote:

Hi, Eric:

 

Contrary to your conclusions, I think the application layer and TLS/TCP layer should(already) have their own mechanisms to assure the data integrity,

 

Yes, which might or might not work correctly, because they are rarely tested.

 

there is no necessary to consider them again at the protocol layer, we need just some guidance for the implementation of client/server sides themselves.

If there is data arrival during the switchover, the internal implementation logic is the application layer will call the api of TLS/TCP to send some data, with the same session identifier.

 

I don't know what you mean by "The same session identifier". There is no concept in TLS that two different TCP connections are somehow the same conceptual flow of data. PSK identifiers solely identify keys.

 

 


In this case, the client doesn't know what has happened. You need
mechanisms either at the HTTP layer--or more typically at the REST API
layer--to do the right thing, which might be an idempotency layer
combined with client-side retransmit.  This is all just a
straightforward application of the end-to-end argument, and there's no
real way around it as long as systems might asynchronously fail, but
it's also a source of defects (think about how many times sites tell
you not to press the submit button twice) because these mechanisms may
not have been exercised or tested. For instance, if the server is high
reliability and the client just assumes that anything it sent works,
that will be good enough a very large fraction of the time, but not if
the server has a high failure rate.

 

[WAJ] From the example, we can know each application has its own confirmation mechanism, because most of them are asynchronous. 

The application knows there will be possibilities that the server crash, or the underlay connection broken.

 

Yes. I said exactly this, but again, they're not always going to be

implemented correctly, and that's largely OK because most

connections don't fail. You're talking about making an exceptional

condition routine.

 

 

Unfortunately, these transaction semantics only exist at the HTTP
layer, not the TLS layer, so the TLS layer has no way of knowing to
wait for the 200 OK, it just knows that the client sent some data, but
not whether that reflects an outstanding request or something else;
recall that TLS doesn't even know about the HTTP request/response
semantics, because it's just a dumb pipe.

[WAJ] TLS needn’t aware the 200 OK signal, it is the job of application layer.

TLS/TCP needs only transmit the data from the application layer correctly to other side.

 

So you're saying that in the example above, the TLS layer ought to inform

the HTTP layer that the connection has failed and trust the HTTP layer

to retry in a safe fashion? 

 

  

In your email, you suggest that the client ought to:

1. Wait for the server's TCP ACK of all transmitted data, with the
implied semantics being that once the message is ACKed it will be
reliably delivered to the server, not just to the TCP stack.

[WAJ] No. I emphasize only the TCP ACK and the TCP stack. Not the application stack. That is to say, receiving the TCP ACK doesn’t represent the application layer ACK.


2. Buffer any data it receives form the cleint while waiting for the
ACK and retransmit it on the new connections.

[WAJ] Buffer any data it receives, but can’t transmit immediately during the switchover process, not waiting for the application ACK.

 

I don't understand what you're saying here. Can you please provide:

 

1. A concrete description of what you believe the rules that the

TLS stack should be following.

2. New versions of my ladder diagrams that show what you believe the correct

behavior is.

 

-Ekr