Re: [TLS] Padding extension and 0-RTT

2016-10-30 Thread Eric Rescorla
On Sun, Oct 30, 2016 at 2:13 PM, Martin Thomson wrote: > On 31 October 2016 at 06:58, Eric Rescorla wrote: > > I'm ambivalent on this. OTOH, you're technically right, but OTOH it's > just > > one more conditional to save a few bytes (you need padding to exist > anyway), > > and if you're doing 0

Re: [TLS] Padding extension and 0-RTT

2016-10-30 Thread Martin Thomson
On 31 October 2016 at 06:58, Eric Rescorla wrote: > I'm ambivalent on this. OTOH, you're technically right, but OTOH it's just > one more conditional to save a few bytes (you need padding to exist anyway), > and if you're doing 0-RTT, you're about to send a lot more bytes anyway. 0-RTT happens wh

Re: [TLS] Padding extension and 0-RTT

2016-10-30 Thread Eric Rescorla
I'm ambivalent on this. OTOH, you're technically right, but OTOH it's just one more conditional to save a few bytes (you need padding to exist anyway), and if you're doing 0-RTT, you're about to send a lot more bytes anyway. -Ekr On Sun, Oct 30, 2016 at 12:52 PM, David Benjamin wrote: > Soun

Re: [TLS] Padding extension and 0-RTT

2016-10-30 Thread David Benjamin
Sounds reasonable. One concern is the F5 bug's failure mode was a timeout rather than an error, so, if you take away padding, the allowance in C.3 will not save heterogenous deployments where some servers do 1.3 and some are old F5 servers. But given we're talking about a straight-up server bug no

[TLS] Padding extension and 0-RTT

2016-10-30 Thread Martin Thomson
(Trivial optimization warning) Just perusing my draft and noticed that NSS pads a 0-RTT handshake, which is not that surprising given that it's fairly beefy (it will get even larger in -18). Since a 0-RTT handshake will break servers that don't at least superficially understand TLS 1.3, maybe we