First they have to go through this vulnerability search dance with TLS-1.1 and 
achieve a reasonably complete move to TLS-1.2.

Regards,
Uri

Sent from my iPhone

> On Oct 22, 2017, at 16:49, Steve Fenter <steven.fente...@gmail.com> wrote:
> 
> The main problem with not addressing the TLS visibility issue now is that no 
> one knows when a vulnerability will be discovered in TLS 1.2 that forces 
> enterprises to upgrade to TLS 1.3. We've had guarantees that TLS 1.2 and the 
> RSA key exchange are going to be fine for 5 to 10 years, but nobody knows 
> that, particularly in today's security environment. I've also learned that 
> getting a solution in place through the IETF is a multi-year process, and 
> then vendor adoption time has to be added on top of that.  Enterprises don't 
> want to be caught in a position where a vulnerability is forcing us to 
> upgrade, and we are starting at ground zero on a multi-year process to 
> restore TLS visibility. We have to get out in front of this problem so we're 
> not caught unprepared.
> 
> Sent from my iPad
> 
>> On Oct 20, 2017, at 11:57 AM, "Salz, Rich" <rs...@akamai.com> wrote:
>> 
>> 
>> 
>>   So it sounds like we are in agreement that continuing to use TLS 1.2 is 
>> not a viable long term  alternative.  
>> 
>> 
>> Long-term is a subjective term, and using it can lead to misunderstandings.
>> 
>> Based on current and previous actions around SSL and TLS versions, you can 
>> use TLS 1.2 for at least five, likely at least 10, years.
>> 
>> 
>> 
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
> 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to