On Mon, May 29, 2017 at 7:59 PM, Anatol Belski <a...@php.net> wrote:

> Hi,
>
> >       I'd really prefer if this RFC targeted current patch branches. I
> see
> > minimal BC impact from the change (issues may only arise when
> communicating
> > with broken TLS implementations), while *not* making the change is
> effectively
> > a BC break as more servers stop supporting TLS 1.0.
> >
>
> >       For the lifetime of the 7.0 and 7.1 releases, it appears much more
> likely
> > to me that there will be more servers not supporting TLS 1.0 than servers
> > supporting only TLS 1.0 *and* having a broken version negotiation
> > implementation.
> >
> Nikita, IMHO there's too much uncertainty. It's not, that TLS 1.2 and co
> is not supported at all. Basically, it is an app responsibility and issues
> that which we should not try to fix. Real world is not going easy with the
> changes of this kind. There are still and will be both that change rapidly
> and those that stay longer. The linked doc from the original thread
> https://blog.pcisecuritystandards.org/migrating-from-ssl-and-early-tls,
> originally posted 2015, talks about "extending the migration completion
> date to 30 June 2018 for transitioning from SSL and TLS 1.0 to a secure
> version of TLS". Well, ...
>
> The issue I see to proceed this way into stable is, that the reliable
> stats are missing and unlikely to get. The only info for now is the
> original report, that *some* servers switched to TLS 1.2 only, and that
> there are policy changes in payment card industry which recommends an
> upgrade already for two years. From another point, I spoke to some
> arbitrary companies and individuals I could reach, where the situation is
> not different from "moving slow". Fe a company with up to 10-20 employs
> still has to support old encryption protocols, because a switch would mean
> they would have to throw away a half of their current hardware. It can ofc
> go different depending on the industry branch, where to see is even sectors
> like payment things go quite sluggish. Not telling it's a good situation,
> but kinda usual.
>
> We didn't have a policy about default TLS versions till now, so a change
> like that might be unexpected, depending on what OpenSSL wants to do under
> the hood. Perhaps, regarding such a policy, we could say, that any PHP.next
> whatsoever should support the latest available TLS version by default. An
> app can always use an explicit TLS scheme if required, or it can upgrade
> PHP.
>
> >
> > Same here, but Anatol suggested releasing this with PHP 7.2 first and if
> nobody
> > complains, backport it to PHP 7.1 and 7.0.
> >
> Well, it was said before the patch was changed to touch ssl:// as well. In
> the current approach, yes for 7.2 for sure. Otherwise, at least 7.0 is
> already nearly half its lifetime old, so a controversial change like this
> is probably too late without a good reason.
>
>
I agree with Anatol. I don't think we should backport those changes.
Especially for the tls:// changes that have a real BC (yes there are server
that hang when 1.2 is negotiated and I have experienced it). That said I
think it's good for 7.2!

Regards

Jakub

Reply via email to