On Fri, Aug 19, 2016 at 2:35 PM Geoffrey Keating <geo...@geoffk.org> wrote:

> Peter Gutmann <pgut...@cs.auckland.ac.nz> writes:
>
> > The problem is that 7919 doesn't say "I want to do DHE, if possible
> > with these parameters", it says "I will only accept DHE if you use
> > these parameters, otherwise you cannot use DHE but must drop back to
> > RSA".  Talk about cutting off your nose to spite your face, you'd
> > have to have rocks in your head to want to break your implementation
> > like that.
>
> Actually, my problem with the RFC is the reverse.  If you have an
> implementation which won't accept certain DH groups, and those are
> extremely common in legacy software (1024-bit, for example), there's
> no way to stop those legacy implementations ignoring the extension and
> choosing DH, which you will then have to reject, doubling connection
> establishment time.
>
> So Apple's client still has DH off.
>
> However I don't see a helpful solution to this; the obvious thing is
> to have a new ciphersuite, but it's hard to see how that would be
> worth the effort if it requires new implementations and ECDHE is
> already standardised and already implemented in many places.
>

TLS 1.3 will resolve this with the new cipher suite negotiation, but I
agree this makes the specification basically undeployable with TLS 1.2.
This issue also got brought up here:
https://www.ietf.org/mail-archive/web/tls/current/msg18697.html

Barring unforeseen problems, Chrome will also lose DH in the next release.
We certainly could not deploy this without the separate cipher suite
numbers. But I can't imagine Chrome deploying it with the separate cipher
suite numbers either for the same reason as Geoffrey. It does not seem
worth bothering when ECDHE is already widely deployed.

David
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to