On 4/19/21 1:45 PM, Matt Joras wrote:
Hi,

Note that there is a TLS feature which reduces the crypto (TLS) data
needed to be sent during the handshake considerably, resumption. The
vast majority of QUIC connections in our deployment (and TCP + TLS for
that matter) are resumed. In a typical resumed connection the total
crypto data transferred is around 500 bytes in both directions.
Resumption is also less CPU intensive on the server than a fresh
handshake.

There is always an opportunity for using DNS features in a clever way
to improve things. I would say though that the complexity, especially
since it introduces out-of-band dependencies, makes it a hard sell for
someone to implement and explore without a really compelling reason
(i.e. data showing that there is a huge opportunity). Resumption makes
this particular concern a non-issue for most real world connections
and has other positive benefits.

Well, the overall point of my post was that it would be interesting to run an experiment and that Google, MS and Apple would be in a good position to do that. Out of  all of this I found out that Google doesn't DNS sign their zone which is a little shocking. But it's sort of hard to call DNS "out of band" since it's needed for A/AAAA records and as my flow showed the TLSA record could be requested at the same time as the A/AAAA lookup which would on average not stall the handshake (and of course, RR's are cached). If you wanted to be really clever, the TLSA RR could be stapled to the name lookup too.

When I was looking this over with Wireshark it sure seemed like it was mostly doing a 5 message handshake, but it was hard to make a lot of sense because... encrypted.

Mike, i'll check out TLS resume though

Reply via email to