Skip to content

Commit

Permalink
Script updating gh-pages from 836d35e. [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
ID Bot committed Jul 4, 2024
1 parent 57bd663 commit 9addc37
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 14 deletions.
19 changes: 9 additions & 10 deletions hannestschofenig-patch-1/draft-rosomakho-tls-ech-keylogfile.html
Original file line number Diff line number Diff line change
Expand Up @@ -10,12 +10,12 @@
This document specifies an extension to the SSLKEYLOGFILE format to support the logging of information about Encrypted Client Hello (ECH) related secrets. Two new labels are introduced, namely ECH_SECRET and ECH_CONFIG, which log the Hybrid Public Key Encryption (HPKE)-derived shared secret and the ECHConfig used for the ECH, respectively.
This extension aims to facilitate debugging of TLS connections employing ECH.
" name="description">
<meta content="xml2rfc 3.21.0" name="generator">
<meta content="xml2rfc 3.22.0" name="generator">
<meta content="encrypted client hello" name="keyword">
<meta content="sslkeylog" name="keyword">
<meta content="draft-rosomakho-tls-ech-keylogfile-latest" name="ietf.draft">
<!-- Generator version information:
xml2rfc 3.21.0
xml2rfc 3.22.0
Python 3.12.3
ConfigArgParse 1.7
google-i18n-address 3.1.0
Expand All @@ -25,9 +25,8 @@
platformdirs 4.2.2
pycountry 22.3.5
PyYAML 6.0.1
requests 2.31.0
requests 2.32.3
setuptools 69.5.1
six 1.16.0
wcwidth 0.2.13
-->
<link href="draft-rosomakho-tls-ech-keylogfile.xml" rel="alternate" type="application/rfc+xml">
Expand Down Expand Up @@ -1027,11 +1026,11 @@
<thead><tr>
<td class="left">Internet-Draft</td>
<td class="center">SSLKEYLOGFILE Extension for Encrypted Cl</td>
<td class="right">June 2024</td>
<td class="right">July 2024</td>
</tr></thead>
<tfoot><tr>
<td class="left">Rosomakho</td>
<td class="center">Expires 26 December 2024</td>
<td class="center">Expires 5 January 2025</td>
<td class="right">[Page]</td>
</tr></tfoot>
</table>
Expand All @@ -1044,12 +1043,12 @@
<dd class="internet-draft">draft-rosomakho-tls-ech-keylogfile-latest</dd>
<dt class="label-published">Published:</dt>
<dd class="published">
<time datetime="2024-06-24" class="published">24 June 2024</time>
<time datetime="2024-07-04" class="published">4 July 2024</time>
</dd>
<dt class="label-intended-status">Intended Status:</dt>
<dd class="intended-status">Informational</dd>
<dt class="label-expires">Expires:</dt>
<dd class="expires"><time datetime="2024-12-26">26 December 2024</time></dd>
<dd class="expires"><time datetime="2025-01-05">5 January 2025</time></dd>
<dt class="label-authors">Author:</dt>
<dd class="authors">
<div class="author">
Expand Down Expand Up @@ -1100,7 +1099,7 @@ <h2 id="name-status-of-this-memo">
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."<a href="#section-boilerplate.1-3" class="pilcrow"></a></p>
<p id="section-boilerplate.1-4">
This Internet-Draft will expire on 26 December 2024.<a href="#section-boilerplate.1-4" class="pilcrow"></a></p>
This Internet-Draft will expire on 5 January 2025.<a href="#section-boilerplate.1-4" class="pilcrow"></a></p>
</section>
</div>
<div id="copyright">
Expand Down Expand Up @@ -1182,7 +1181,7 @@ <h2 id="name-introduction">
<a href="#section-1" class="section-number selfRef">1. </a><a href="#name-introduction" class="section-name selfRef">Introduction</a>
</h2>
<p id="section-1-1">Debugging protocols with TLS can be difficult due to encrypted communications. Analyzing these messages in diagnostic and debug tools requires inspecting the encrypted content. Various TLS implementations have informally adopted a file format to log the secret values generated by the TLS key schedule, aiding in this analysis.<a href="#section-1-1" class="pilcrow"></a></p>
<p id="section-1-2">In many implementations, the file that the secrets are logged to is specified in an environment variable named "SSLKEYLOGFILE". <span>[<a href="#I-D.ietf-tls-keylogfile" class="cite xref">I-D.ietf-tls-keylogfile</a>]</span> standardizes this format. With the introduction of <span>[<a href="#I-D.ietf-tls-esni" class="cite xref">I-D.ietf-tls-esni</a>]</span> additional secrets are derived during the handshake to encrypt the ClientHello message using Hybrid Public Key Encryption (HPKE) <span>[<a href="#RFC9180" class="cite xref">RFC9180</a>]</span>. This document extends the SSLKEYLOGFILE format to also offer support for the ECH extension to enable debugging aof ECH-enabled connections. The proposed extension can also be used with all protocols that support ECH, including TLS 1.3 <span>[<a href="#RFC8446" class="cite xref">RFC8446</a>]</span>, DTLS 1.3 <span>[<a href="#RFC9147" class="cite xref">RFC9147</a>]</span> and QUIC <span>[<a href="#RFC9000" class="cite xref">RFC9000</a>]</span><span>[<a href="#RFC9001" class="cite xref">RFC9001</a>]</span>.<a href="#section-1-2" class="pilcrow"></a></p>
<p id="section-1-2">In many implementations, the file that the secrets are logged to is specified in an environment variable named "SSLKEYLOGFILE". <span>[<a href="#I-D.ietf-tls-keylogfile" class="cite xref">I-D.ietf-tls-keylogfile</a>]</span> standardizes this format. With the introduction of <span>[<a href="#I-D.ietf-tls-esni" class="cite xref">I-D.ietf-tls-esni</a>]</span> additional secrets are derived during the handshake to encrypt the ClientHello message using Hybrid Public Key Encryption (HPKE) <span>[<a href="#RFC9180" class="cite xref">RFC9180</a>]</span>. This document extends the SSLKEYLOGFILE format to also offer support for the ECH extension to enable debugging of ECH-enabled connections. The proposed extension can also be used with all protocols that support ECH, including TLS 1.3 <span>[<a href="#RFC8446" class="cite xref">RFC8446</a>]</span>, DTLS 1.3 <span>[<a href="#RFC9147" class="cite xref">RFC9147</a>]</span> and QUIC <span>[<a href="#RFC9000" class="cite xref">RFC9000</a>]</span><span>[<a href="#RFC9001" class="cite xref">RFC9001</a>]</span>.<a href="#section-1-2" class="pilcrow"></a></p>
</section>
</div>
<div id="conventions-and-definitions">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,8 @@

Transport Layer Security Y. Rosomakho
Internet-Draft Zscaler
Intended status: Informational 24 June 2024
Expires: 26 December 2024
Intended status: Informational 4 July 2024
Expires: 5 January 2025


SSLKEYLOGFILE Extension for Encrypted Client Hello (ECH)
Expand Down Expand Up @@ -56,7 +56,7 @@ Status of This Memo
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."

This Internet-Draft will expire on 26 December 2024.
This Internet-Draft will expire on 5 January 2025.

Copyright Notice

Expand Down Expand Up @@ -104,7 +104,7 @@ Table of Contents
during the handshake to encrypt the ClientHello message using Hybrid
Public Key Encryption (HPKE) [RFC9180]. This document extends the
SSLKEYLOGFILE format to also offer support for the ECH extension to
enable debugging aof ECH-enabled connections. The proposed extension
enable debugging of ECH-enabled connections. The proposed extension
can also be used with all protocols that support ECH, including TLS
1.3 [RFC8446], DTLS 1.3 [RFC9147] and QUIC [RFC9000][RFC9001].

Expand Down

0 comments on commit 9addc37

Please sign in to comment.