Sent from my mobile device

> On Sep 26, 2019, at 9:02 AM, Salz, Rich <rs...@akamai.com> wrote:
> 
> These are excellent points.  Perhaps they can be squeezed into 
> https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprecate/  ?  
> It's been waiting 90 days, a brief reset might not hurt :)
> 
This would not be a brief reset and I’d prefer not to see them combined into 
the existing draft with WG agreement.

With RFC7525, TLSv1.2 can be configured to be secure.  I see the points made, 
but don’t see the urgency as obsolete is different from depreciation.

I think encouraging implementation of TLSv1.3 is good and important, but are 
there other ways besides deprecation?

NIST has pushed back their date for US government organizations to have a plan 
to support TLSv1.3, what’s the driver to get ahead of that?

A vulnerability would speed things up, but I do hope that does not happen.

Best regards,
Kathleen 

> On 9/26/19, 8:18 AM, "John Mattsson" 
> <john.mattsson=40ericsson....@dmarc.ietf.org> wrote:
> 
>    Hi,
> 
>    Hopefully, we have learned some lessons from the TLS 1.0 and TLS 1.1 
> deprecation. TLS 1.0 and TLS 1.1 are (to cite Martin Thomson) broken in a 
> myriad subtle ways and should according to me optimally have been deprecated 
> years ago.
> 
>    3GPP mandated support of TLS 1.2 in Rel-13 (2015) but could at that time 
> not forbid use of TLS 1.1 as that would potentially break interoperability 
> with some Rel-12 nodes (that had TLS 1.2 as should support). The lesson 3GPP 
> learned from this was the need to as early as possible mandate support of new 
> protocol versions. With TLS 1.3, 3GPP took action early and TLS 1.3 support 
> was mandated for network nodes in Rel-15 (2018) and for mobile phones in 
> Rel-16 (2019).
> 
>    At some point in time we will want to deprecate TLS 1.2. To enable that, 
> TLS 1.3 support should be mandated or encouraged as much as possible. I would 
> like to avoid a situation where we want to deprecate TLS 1.2 but realize that 
> it cannot be done because some implementations only support TLS 1.2. How can 
> IETF enable smoother and faster deprecations in the future? The browser 
> industry has a decent track record of algorithm deprecation and I hope to 
> soon see the following warning in my browser:
> 
>    “TLS 1.2 is obsolete. Enable TLS 1.3 or later.”
> 
>    Other industries have less stellar track records of algorithm deprecation.
> 
>    How can IETF be more pro-active regarding deprecations in the future? In 
> the best of words, nobody should be surprised when IETF deprecates a protocol 
> version or algorithm. NIST and similar organizations in other countries have 
> the practice to long time in advance publish deadlines for security levels, 
> algorithms, and protocol versions. Can the IETF do something similar, not 
> just for TLS but in general? For TLS, there are several things to deprecate, 
> in addition to MD5 and SHA-1, also PKCS1-v1_5, RSA-2048, 224-bit ECC, 
> ffdhe2048, and non-recommended cipher suites (Static RSA, CBC, DH, NULL, 
> etc.) should be deprecated in the future.
> 
>    Cheers,
>    John
> 
>    _______________________________________________
>    TLS mailing list
>    TLS@ietf.org
>    https://www.ietf.org/mailman/listinfo/tls
> 
> 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to