On Tue, Nov 7, 2017 at 4:25 PM, Watson Ladd <watsonbl...@gmail.com> wrote:

> On Tue, Nov 7, 2017 at 4:05 PM, Jana Iyengar <j...@google.com> wrote:
> > FWIW: In my experience middleboxes don't ossify based on what the spec
> says,
> > they ossify based on what they see on the wire. So, if common
> > implementations send CCS in a particular way, that's what will get ---
> and,
> > I'll argue, what has gotten --- ossified. I also agree with David and
> Eric
> > that compatibility mode shouldn't be required because QUIC doesn't need
> it.
>
> What does compatibility mode mean here?


It means:

1. Send the fake session_id
2. Send a bunch of spurious CCS values.


If we end up with having two
> slightly different versions of TLS 1.3, one that looks more like TLS
> 1.2 and the other that does not, that doesn't seem like a good thing
> to me.
>

Well, the idea is that this is a purely local decision by one side.

-Ekr


> My understanding is we already have ossification here and the debate
> is what to do about it.
>
>
> --
> "Man is born free, but everywhere he is in chains".
> --Rousseau.
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to