On Thu, Jul 23, 2015 at 07:10:30PM +0200, Eric Rescorla wrote:
> On Thu, Jul 23, 2015 at 7:06 PM, Stephen Farrell <stephen.farr...@cs.tcd.ie>
> wrote:
> 
> > A suggestion - could we remove mention of anything that
> > is not a MUST or SHOULD ciphersuite from the TLS1.3 document
> > and then have someone write a separate draft that adds a
> > column to the registry where we can mark old crap as
> > deprecated?
> >
> > Not sure if it'd work though.
> >
> 
> I'm starting to lean towards this. I don't generally think of TLS 1.3 as a
> vehicle
> for telling people how to configure use of TLS 1.2, and I think it might be
> better
> to move all that stuff out.

The MUST/SHOULD list is presumably:
{ECDHE_RSA,ECDHE_ECDSA,PSK}*{AES-128-GCM,AES-256-GCM,Chacha20-Poly1305}?

(9 ciphersuites)? Or are there some others there as well (of course, if
new signatures appear and get their own ciphersuites, then three of those
too)?


Then what to mark as deprecated? Everything that doesn't work with TLS
1.3 is pretty obvious candidate. Which would mean deprecating TLS 1.0 and
1.1, as all ciphersuites for those get deprecated.


Then I made this table of ciphersuites that work with TLS 1.3:

+---------------+-------+-------+-------+-------+
|               |AESGCM |VANITY |AESCCM |CHACHA |
+---------------+-------+-------+-------+-------+
|DHE_RSA        |Y      |Y      |Y      |P      |
|DHE_DSS        |Y      |Y      |Y      |-      |
|DHE_PSK        |Y      |Y      |-      |-      |
|DHE_anon       |Y      |Y      |Y      |-      |
|ECDHE_RSA      |Y      |Y      |-      |P      |
|ECDHE_ECDSA    |Y      |Y      |Y      |P      |
|ECDHE_PSK      |P      |-      |P      |P      |
|ECDHE_anon     |-      |-      |-      |-      |
|ECDHE_ECIDSA   |-      |-      |-      |-      |
|PSK            |Y      |Y      |Y      |P      |
+---------------+-------+-------+-------+-------+

Legend: - => No active proposal,
        P => active I-D proposes these,
        Y => In registry
        AES-GCM => AES-GCM ciphers
        VANITY => ARIA and CAMELLIA (GCM). SEED doesn't have AEAD.
        AES-CCM => AES-CCM ciphers
        CHACHA => Chacha20-Poly1305.


Comments on some methods:
- DHE_RSA: Uses FFDHE, problematic especially on 1.2 and older.
- DHE_DSS: Virtually nobody uses this or will use this (already removed
  from two major browsers.
- DHE_PSK: IoT type, but I don't think IoT appriciates FFDHE.
- DHE_anon: Anonymous.
- ECDHE_RSA: ECC certs are still much harder to get than RSA.
- ECDHE_anon: Should add if not deprecating anonymous.
- ECDHE_ECIDSA: New signature scheme. Or try merging this with
  ECDHE_ECDSA (requires bit of bending of 1.2 rules).
- PSK: Needed for resumption in TLS 1.3.


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to