Expressly reacting to the viability of continuing to use TLS1.2 forever.

As a network person,  this sounds a little like suggesting that if we feel 
there are operational  shortcomings in IPv6,  then we should just plan to stay 
with IPv4, forever.
And that approach may even be viable for the short term or in isolated 
situations.
But for the longer term using TLS1.2 is likely to have the following issues for 
Enterprises:

  *   Industry groups will force us to use newer versions
  *   Policy standards will evolve in similar fashions.
  *   Likely there will be regulatory mandates in many of the marketplaces and 
business segments that large Enterprises participate in.
  *   Software Products and Applications will attempt to remain current and 
will eventually sunset support for older protocol versions
  *   Business Partners or Government agency customers may require TLS1.3.
  *   Internal Security Teams may require TLS1.3, at some point in the future.  
  And they should!    And why should we NOT want  and be able to utilize TLS 
1.3 with it’s updated and enhanced capabilities.  We DO WANT THIS!   We just 
still need to run our networks and businesses and are badly wanting to work 
with the Working Group to assure our use cases can be accommodated, if at all 
possible.
  *   And thinking further ahead,  what would be the extended proposed 
strategy,  when TLS 1.4 (or whatever comes next),  is finalized.        
Adopting such a “Stay with the old product forever”  would seem to be 
tantamount to hoping that TLS 1.3 (and 1.4, etc.),  never get deployed.   For 
VERY Security focused industries,  such as healthcare and finance,  this is 
directly opposite of what we want, need and support.   We need security 
protocols to continue to evolve, improve and become as effective as possible,  
but they need to move forward with the understanding  that operational 
perspectives are important as well.




From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Salz, Rich
Sent: Friday, October 20, 2017 9:44 AM
To: Darin Pettis <dpp.e...@gmail.com<mailto:dpp.e...@gmail.com>>; 
tls@ietf.org<mailto:tls@ietf.org>
Subject: Re: [TLS] Publication of draft-rhrd-tls-tls13-visibility-00


  *   The question has been raised: "Why address visibility now?"   The answer 
is that it is critical that the visibility capability is retained.  It is 
available today through the RSA key exchange algorithm.  We understand that the 
issue was raised late and have fallen on the preverbal sword for being late to 
the party but the issue is real.  That is where the "rhrd" draft has come from. 
 A way to retain that visibility capability but with a newer and more secure 
protocol.

You achieve your needs right now by sharing the origin’s RSA key with your 
debugging agents.  You can achieve the same needs in TLS 1.3 by keeping that 
architecture, although more information must be shared.  This preserves the 
architecture and becomes “just” implementation.  This has been brought up 
before.

The first draft showed how to do this purely on the server side.  Some members 
of the WG rose up and wanted explicit opt-in. The new draft does that.  In 
retrospect, it turns out that opt-in is worse, mainly that there is no way to 
guarantee that this does not “escape” onto the public Internet. This makes 
sense, if you require opt-in from the client, then it is not surprising that, 
other entities besides the two parties engaged in the TLS protocol could, well, 
*require* clients to opt-in.  As I and others have tried to show in email 
exchangers with Paul, this is a fundamental change to the nature of how TLS is 
used.

Finally, as has also been mentioned, nobody is preventing you from keeping your 
servers at TLS 1.2 or earlier.  TLS 1.2 was defined by RFC 5246 in 2008. A 
decade later, PCI-DSS is only ‘strongly encouraging’ TLS 1.2; the actual 
requirement is TLS 1.1! Why should we expect that TLS 1.3 will happen any 
faster?

You have not made your case.



The information contained in this communication is highly confidential and is 
intended solely for the use of the individual(s) to whom this communication is 
directed. If you are not the intended recipient, you are hereby notified that 
any viewing, copying, disclosure or distribution of this information is 
prohibited. Please notify the sender, by electronic mail or telephone, of any 
unintended receipt and delete the original message without making any copies.
 
 Blue Cross Blue Shield of Michigan and Blue Care Network of Michigan are 
nonprofit corporations and independent licensees of the Blue Cross and Blue 
Shield Association.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to