home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.misc      General topics about computers not cover      21,759 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 20,386 of 21,759   
   Richard Kettlewell to Grant Taylor   
   Re: [LINK] Calling time on DNSSEC?   
   05 Dec 24 08:46:37   
   
   From: invalid@invalid.invalid   
      
   Grant Taylor  writes:   
   > On 12/3/24 23:49, Lawrence D'Oliveiro wrote:   
   >> It can’t be.   
   >   
   > Sure it can.   
   >   
   >> TLS cannot start encryption on HTTP until it gets a cert that   
   >> identifies the server.   
   >   
   > The TLS connection is fully established and fully encrypted *BEFORE*   
   > any HTTP is sent /through/ /the/ /inside/ /of/ /said/ /TLS/   
   > connection.   
      
   ESNI and ECH seem to work by publishing a separate provider key. There   
   might be good reasons for that design in the context of TLS though it’s   
   not how I’d have done it, given a clean sheet.   
      
   In the abstract the purpose of a certificate in TLS-like protocols is to   
   provide the key used to sign the key exchange process. With (EC)DH or   
   ML-KEM there’s no inherent reason that has to be delivered in the   
   unencrypted part of the protocol; it might add another round trip to   
   session setup but so would gathering completely separate keys as in   
   ESNI/ECH, if I’ve understood them correctly.   
      
   With RSA key exchange that wouldn’t be true, but that’s out of favor for   
   TLS these days anyway.   
      
   --   
   https://www.greenend.org.uk/rjk/   
      
   --- SoupGate-DOS v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca