Benjamin Kaduk <ka...@mit.edu> wrote:

>> That does not surprise me, but I think that is part of the problem. These
>> things should mainly be decided by the TLS working group.
>
>How?  Just by publishing BCPs, or is the TLS WG also supposed to (e.g.)
>watch IETF LCs and complain about use of old protocol versions?

Just by publishing BCPs and standard track documents. Watching out for old 
protocol versions in other WG’s is not really the TLS WG’s job. Hopefully, 
everybody in the security area complain if they see use of obsolete versions or 
weak algorithms.

>> "New implementations and deployments MUST include support of the new 
>> version".
>>
>> If this is not clearly defined somewhere, I think it needs to be specified. 
>> If it is >specified somewhere, IETF needs to make sure to follow apply it.
>
>Even supposing everyone agrees on this, there seem to be some fencepost
>issues surrounding "new".  Is a protocol "new" when it gets published as an
>RFC, or at WGLC, or even earlier?  I have been pretty laid-back until now
>about requiring things coming in front of the IESG to pick up TLS 1.3,
>since for the most part they were in progress (including implementations)
>before TLS 1.3 implementations were readily available in production-grade
>form.  It's about time to tighten up on that, since it's been over a year
>since RFC 8446, but I'm not sure I fully understand where you want us to
>fall across these boundary conditions.

I fully agree. There are several boundary conditions here and any best practice 
can probably not be summarized on a single line. Tightening up requirement of 
new drafts to support TLS 1.3 now seems about right. There could probably still 
be exceptions, but they would have to be well motivated. 

/John

-----Original Message-----
From: Benjamin Kaduk <ka...@mit.edu>
Date: Friday, 4 October 2019 at 02:11
To: John Mattsson <john.matts...@ericsson.com>
Cc: Stephen Farrell <stephen.farr...@cs.tcd.ie>, Sean Turner <s...@sn3rd.com>, 
Sean Turner via Datatracker <nore...@ietf.org>, "tls-cha...@ietf.org" 
<tls-cha...@ietf.org>, IESG Secretary <iesg-secret...@ietf.org>, "TLS@ietf.org" 
<tls@ietf.org>
Subject: Re: [TLS] Publication has been requested for 
draft-ietf-tls-oldversions-deprecate-05

    On Wed, Oct 02, 2019 at 02:45:08PM +0000, John Mattsson wrote:
    > Hi,
    > 
    > Sean Turner wrote:
    > > "You can change the text, but I do not believe it will change the 
implementations."
    > 
    > I would much rather have a future proof RFC that forbids negotiation of 
DTLS 1.0 with the knowledge that some implementations will temporary violate 
that, than having an RFC that long time in the future allows negotiation and 
use of DTLS 1.0.
    > 
    > 
    > Eric Rescorla wrote:
    > > "result of some pretty extensive discussion and compromising in rtcweb"
    > 
    > That does not surprise me, but I think that is part of the problem. These
    > things should mainly be decided by the TLS working group.
    
    How?  Just by publishing BCPs, or is the TLS WG also supposed to (e.g.)
    watch IETF LCs and complain about use of old protocol versions?
    
    > Draft-ietf-rtcweb-security-arch mandated DTLS 1.0 until Nov 2018. That is
    > half a year after the "Deprecating TLSv1.0 and TLSv1.1" draft was
    > submitted and almost 7 years after DTLS 1.0 was made obsolete.
    
    Mandating (D)TLS 1.0 is not going to get past the IESG in 2018.  We can
    (and are) try to better communicate our expectations for this sort of thing
    to the WGs, but it seems unrealistic to expect a 100% success rate from
    them, since it's usually not the WG's core competency.  (See also
    
https://protect2.fireeye.com/url?k=81062a4c-dd8ff05c-81066ad7-0cc47ad93e2a-1e749b7aef6efcb8&q=1&u=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Fwgchairs%2Fdfe_5obSQm7YK7JzVbmc-MbXNmU
 .)
    
    > 
    > No matter what is done in this particular case, I think the important 
thing to discuss is how we avoid drafts that only support obsolete versions of 
TLS/DTLS in the future. According to my understanding of the comments in the 
thread "Lessons learned from TLS 1.0 and TLS 1.1 deprecation", both me, 
Kathleen Moriarty, and Martin Thomson understands obsoleted as:
    > 
    > "New implementations and deployments MUST include support of the new 
version".
    > 
    > If this is not clearly defined somewhere, I think it needs to be 
specified. If it is specified somewhere, IETF needs to make sure to follow 
apply it.
    
    Even supposing everyone agrees on this, there seem to be some fencepost
    issues surrounding "new".  Is a protocol "new" when it gets published as an
    RFC, or at WGLC, or even earlier?  I have been pretty laid-back until now
    about requiring things coming in front of the IESG to pick up TLS 1.3,
    since for the most part they were in progress (including implementations)
    before TLS 1.3 implementations were readily available in production-grade
    form.  It's about time to tighten up on that, since it's been over a year
    since RFC 8446, but I'm not sure I fully understand where you want us to
    fall across these boundary conditions.
    
    -Ben
    

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to