Rob Sayre say...@gmail.com wrote: "Is there some data behind this?
I agree with Rob, it would be interesting to get some data on why webrtc need to continue to negotiate and use DTLS 1.0. It would also be interesting to know for how long time webrtc plans to continue negotiate and use DTLS 1.0. EAP-TLS also have legacy devices that do not support TLS 1.2 and in practice some EAP servers will probably continue to negotiate TLS 1.1 for a while. Still, the EMU WG agreed that the upcoming BCP forbidding use and negotiation of TLS 1.1 was the right thing to do as it puts increased pressure on implementations to improve. Cheers, John From: Rob Sayre <say...@gmail.com> Date: Friday, 4 October 2019 at 16:58 To: Eric Rescorla <e...@rtfm.com> Cc: Cullen Jennings <flu...@iii.ca>, "TLS@ietf.org" <tls@ietf.org>, Sean Turner via Datatracker <nore...@ietf.org>, IESG Secretary <iesg-secret...@ietf.org>, "tls-cha...@ietf.org" <tls-cha...@ietf.org>, John Mattsson <john.matts...@ericsson.com>, Benjamin Kaduk <ka...@mit.edu> Subject: Re: [TLS] Publication has been requested for draft-ietf-tls-oldversions-deprecate-05 On Fri, Oct 4, 2019 at 9:48 PM Eric Rescorla <e...@rtfm.com<mailto:e...@rtfm.com>> wrote: On Fri, Oct 4, 2019 at 7:43 AM Rob Sayre <say...@gmail.com<mailto:say...@gmail.com>> wrote: On Fri, Oct 4, 2019 at 9:08 PM Cullen Jennings <flu...@iii.ca<mailto:flu...@iii.ca>> wrote: I do not think you have consensus for that change to WebRTC - it was discussed extensively. ... While that may be true, readers of this list might want to read a rationale, rather than just the results of a negotiation. Is there a rationale somewhere? It seems strange to put DTLS 1.0 (based on TLS 1.1) into new documents. A few points. 1. It doesn't pull it in. There's no reference and there's just an informative statement. Shouldn't there be an informative reference? 2. There is a rationale. In fact, the relevant text pretty much is all rationale. All Implementations MUST support DTLS 1.2 with the TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 cipher suite and the P-256 curve [FIPS186<https://tools.ietf.org/html/draft-ietf-rtcweb-security-arch-20#ref-FIPS186>]. Earlier drafts of this specification required DTLS 1.0 with the cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, and at the time of this writing some implementations do not support DTLS 1.2; endpoints which support only DTLS 1.2 might encounter interoperability issues. Yes, I read this section and I was wondering what the rationale was for the text: "endpoints which support only DTLS 1.2 might encounter interoperability issues." Is there some data behind this? I'm not suggesting a change in the draft without more information, but I do wonder how the WG came to agree on this text. thanks, Rob
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls