Hi,

Thanks for that interesting explanation.

I just learned about another TLS 1.3 "intolerance" issue that people
deploying it should be aware of: It seems some servers don't consider
TLS 1.3 cipher suites as "safe" for HTTP/2 and this breaks connections:
https://bugzilla.mozilla.org/show_bug.cgi?id=1488240#c39

While HTTP/2 is not necessarily the focus of this group I wonder what
that means, how HTTP/2 implementations should be made future proof and
if there can be a GREASE-like mechanism for it.
Whitelisting "safe" ciphers seems to be a bad idea and almost
inevitably will lead to more trouble in the future.

-- 
Hanno Böck
https://hboeck.de/

mail/jabber: ha...@hboeck.de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to