*   Expressly reacting to the viability of continuing to use TLS1.2 forever.

Nobody has said that, you are arguing a strawman.


  *   Industry groups will force us to use newer versions
  *   Policy standards will evolve in similar fashions.
  *   Likely there will be regulatory mandates in many of the marketplaces and 
business segments that large Enterprises participate in.

None of those even require TLS 1.2 yet, and it is a decade old.  Do you think 
any of them will jump from 1.1 to 1.3?  What timetable do you think that will 
happen?  A decade?  Five years?


  *   Software Products and Applications will attempt to remain current and 
will eventually sunset support for older protocol versions

Again, what timetable do you think that will happen?


  *   Business Partners or Government agency customers may require TLS1.3.

“May.”  Do you have any indication that this is a requirement?  Government 
tends to work either far in advance (like NIST post-quantum crypto) or to track 
industry.


  *   Internal Security Teams may require TLS1.3, at some point in the future.  
  And they should!    And why should we NOT want  and be able to utilize TLS 
1.3 with it’s updated and enhanced capabilities.  We DO WANT THIS!   We just 
still need to run our networks and businesses and are badly wanting to work 
with the Working Group to assure our use cases can be accommodated, if at all 
possible.

Your use-cases can be accommodated.  You just need to spend some more money on 
server-side runtimes and key management.  Instead, you propose to force all 
clients into a weaker security posture.  I am sorry to be harsh, but as I 
explained in email messages yesterday, if you force clients to indicate that 
they are willing to have traffic be intercepted, then any middlebox can 
categorize, and deny or subvert, such traffic.  Again, don’t think of just 
national-scale adversaries, but your ISP or IP-in-airplane provider.

The proposal fundamentally changes the way TLS works.  And with the posted 
use-cases, it seems completely obvious to me that it *weakens* the protection 
afforded to the general population.

I believe I know why people want this now. They are worried that if TLS 1.3 
goes out without something like this, then the market (standard widely 
available browsers) will not implement it. Let me assure you that this isn’t an 
issue. The extension would *never ever* make it to the MUST state, and the 
browsers would be unlikely to ever implement it anyway.

I have an alternate strategy proposal.  Configure your servers to only use TLS 
1.2 or earlier, probably for at least five years. During that time, modify the 
server-side and analysis tools to record and use the extra key material you’ll 
need for TLS 1.3.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to