On 07/07/2023 17:42, Salz, Rich wrote:
I would love to get feedback from the working group on whether the draft is 
worth developing further.
I read your document [1] and found it very interesting.

Thanks Rich!

I found the handling of extensions complicated, although I admit to reading 
that part very quickly.

How much simpler would things be if the identifier were just a SHA256 hash of 
the CA, perhaps truncated?  You send an array of (url, timestamp) as an 
extension, and then the server just sends the digest of its cert chain, perhaps 
even its own cert.

So this draft is doing two different things: building the dictionaries in a fair way and then specifying how to use them as part of the existing TLS Certificate Compression extension. Implementations only care about the second part which only involves a bit of string substitution and a call to ZStd. They don't have to know or care about how the dictionaries were built or do any new kind of negotiation.

I don't follow your comment about the handling of extensions, the code doing the compression and decompression isn't aware of what an extension is or handling them specially, its just swapping strings.  In order to compress the larger strings which issuers add to end entity certificates (e.g. OCSP & CRL URLs, practice statements), the dictionary does include some extensions made by each issuer, but these are just concatenated binary strings.

Best,
Dennis


_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to