TLS@IETF124

Monday, November 3, 2025 @ 22:00-00:00 UTC

Note Well
Scribe: Rich Salz, fixes from Dierdre

WG Status (20min) - Chairs

Working Group Drafts

See the slides for more detail about each of these.

Usama: how can you compromise application key but not long-term (E.g.,
certificate's) key? Why is only the latter in the trusted execution
environment? Yaroslav: I think it's a separate attack. Draft does not
talk about long-term credential. Paul: original pre-master secret is.
Seems to be a terminology mis-use, please open an issue so we can fix
it.

Viktor: did you think of a minimum number of bytes before doing EKU?
Yaroslav: we did look at it, there's no consistency. Viktor: if the
memory dump is during idle time and quick, could impersonate a party.
Dierdre: is that what post-compromise promises? Yaroslav: we'll update
security considerations.

Dennis: Seems a conflict with IANA registry you need to negotiate
ability to send additional messages. Yaroslav: no strong opinion,
registry doesn't cost much, experience shows not having one has caused
problems.

Yaroslav: have also noticed some TLS stacks are half-duplex, that's an
implementation issue we'll document.

Deirdre: FATT is reviewing.

Sean: propose doing WGLC and then wait for implementations.

WEDNESDAY
Administrivia (5min)

Note Well
Scribe: Mike Ounsworth, Chris I.

Working Group Drafts
The Datagram Transport Layer Security (DTLS) Protocol Version 1.3
(30min)

Eric Rescorla
draft-ietf-tls-rfc9147bis

PaulW [individual]: Replay detection sucks for performance; IPSEC is
discussing a way to turn it off.

MT: I'm concerned about not being able to send an ACK to a DTLS 1.2
client. But we're supposed to be able to throw away garbage, right? IE
if you're a DTLS 1.3 stack, just always send an ACK and hope that the
other end ignores stuff it doesn't support. We'd of course need to
convince ourselves that all existing 1.2 stacks ignore erroneous 1.2
data correctly.

ekr: not sure, didn't occur to me when thinking about this. this could
be handled as a unknown record type.

DavidBen: our stack might not handle unexpected ACKs. I'll have to go
check.

PaulW [individual]: IKEv2 has some similar mechanisms, for throwing
away garbage and retransmiting missing packets. Turn out some
connections cannot complete the handshake.

ekr: Not sure if the handshake would fail; describes how mechanism is
supposed to work.

deirdre [individual]: didn't SSH also have a bug similar to
unencrypted seq #s. should not do this.

No objections in the room to not adding nvidia's request of unecrypted
seq #s.

Turner to file issue for ekr to check errata on v1.3 / v1.2; ekr will
process.

Non-Working Group Drafts (5min)
PEM file format for ECH

Stephen Farrell
draft-farrell-tls-pemesni

Yaroslav: can this allow you to have multiple ECH Configs?

Stephen: this allows you to have multiple configs, but only one ECH
private key.

MT: if you want multiple keys, you can have multiple files. It is fairly
straightforward to combine ECH configs.

Usama: There was an extensive formal analysis. Was this change re-run
through formal analysis?

Deirdre: this is just a file format, does not break formal analysis of
the protocol/change TLS or ECH key schedule or cryptographic design.
Formal analysis not needed.

ekr: Are these separable? Can you have ECH config w/out the private key.

Stephen: yes, you can have 0 private keys.

Authenticated ECH Config Distribution and Rotation (25min)

Nick Sullivan
draft-sullivan-tls-signed-ech-updates

Stephen: He supports the effort, keeping working.

MT: I don't see the indirection via a public_name as something that
provides useful features, only more risk.
Nick: the server is selecting the public name, exclusively; you're
talking about the outter name in the SNI; which is different. (did I get
that right?) We're stuck with the public name based auth system for now
because that's how the system is built.

David Adrian: Supportive of getting rid of outer SNI; but are people
going to deploy this?
Nick: Yes, Cloudflare.
David: Google has issues with deploying this already, this update
doesn't solve Google's problems. Do we need this?
Nick: Not necessarily making deployment easier; but does make updates
and management easier.

Chris Patton: "I'm good". (the comment was about TOFU and how you trust
the ECHConfig on first use if the DNS is not DNSSEC-signed. Nick: but
that's how ECH works)
[I didn't capture it, because the comment worked out to be about
existing ECH, not the draft.]

Christian Huitema: struggling with how to do initial trust, especially
in a multi-CDN deployment, how to resolve the trust there?

Dennis Jackson: Multi-CDN deployments of ECH is non-trivial. Also, there
were comments about retry configs and recoverability with RPK. I just
wanted to say that this draft doesn't really change anything from how it
works today.

ekr: Have you talked to any CA's about issuing this type of cert?
Nick: no.
ekr: This is why you end up with IP binding and its an issue, especially
when you get to multi-CDN. Likely to prefer the RPK thing, but open to
being swayed for PKIX. The DNS overrides what you see from a server, and
that's the update.
Nick: that's right.

Alessandro Ghedini: if selecting 1-method, then RPK would be his choice.

BONUS PRESENTATION
Service Affinity Solution based on TLS
Aijun Wang

ekr: TLS is not the right layer for this; should be in the application
layer. If TLS was the right layer, this mechanism is not good.
Aijun: if we do it in the TLS layer, we can apply it to lots of
applications
ekr: right, but that's still broken. the applications get a weird state
of some packets delivered, some packets not delivered and the
application does know what has happened.
Aijun: QUIC has something similar.
ekr: but QUIC has a mechanism to reestablish the state of that
connection; TCP has to reastablish connection.

mt: superficially like QUIC's preferred handshake mechanism; but its not
complete. If that has http, you would do a redirect and change from an
anycast to direct IP address. The application above is seeing a TCP
connection break, and then packets start coming again.
aijun: Can you send to list. want the palo alto team to help.