It seems like there's some confusion here. ECH is an extension to TLS that is still under development (and now nearly final). Use of ECH is optional in TLS 1.3. Any entity that can control the TLS version in use also has the ability to disable ECH, so allowing TLS 1.3 does not require an administrator to permit ECH.
--Ben Schwartz ________________________________ From: Paul Vixie <p...@redbarn.org> Sent: Tuesday, July 23, 2024 4:01 PM To: Paul Wouters <p...@nohats.ca> Cc: Tommy Jensen <jensen.tho...@microsoft.com>; Ben Schwartz <bem...@meta.com>; dnsop <dnsop@ietf.org>; Damick, Jeffrey <jdam...@amazon.com>; Engskow, Matt <mengs...@amazon.com>; Jessica Krynitsky <jess.krynit...@microsoft.com> Subject: Re: [DNSOP] Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt -- P Vixie On Tuesday, July 23, 2024 12:52:28 PM PDT Paul Wouters wrote: > On Jul 23, 2024, at 12:09, Paul Vixie <paul=40redbarn....@dmarc.ietf.org> wrote: > > Making TLS 1.2 available as a fallback is vital. Many secure private edge > > networks will never allow TLS 1.3 because of ECH. > > You can do TLS 1.3 without ECH ? if an endpoint wants TLS 1.3 with ECH, there's no way to negotiate them down to TLS 1.3 without ECH. there is a way to negotiate them down to TLS 1.2. > Making a weaker version of TLS mandatory would be unwise, unless it’s to > give more time for migration away from it. migration for military, government, and many corporate networks can't happen. for reasons of law, regulation, or policy, they must see the client hello before they can decide whether to block the flow. "just secure your devices" can't work due to the way the supply chain works. the only alternative will be to block outbound entirely and force all traffic through a non-intercepting proxy. ietf knew this, but RFC 8890 forbade us to consider it. i was a dissenter. the fact that you refer to TLS 1.2 as "weaker" may indicate a preference that we mandate a technology that often _cannot_ be used even those the alternative ("effective mandate") will be a technology (explicit proxy) which is in fact weaker than TLS 1.2. we should not argue from talking points. don't put it in terms of migration. just recommend that fallback be allowed. 50 years from now, smarter people than us can think of a better way forward. as things are today, secure private edge networks including military, government, and many commercial networks, will not allow TLS 1.3 to be used. paul
_______________________________________________ DNSOP mailing list -- dnsop@ietf.org To unsubscribe send an email to dnsop-le...@ietf.org