One comment.  Perhaps some caution might be advised in light of the antitrust court order in /Trueposition v. Ericsson/. Ref. Order in Case No. 2:11-cv-4574, (U.S. E.D. Pa, 14 Jul 2014).

--amr

On 2020-03-06 7:02 PM, John Mattsson wrote:
Hi,

I am happy to report that 3GPP just took the decision to forbid support of MD5 
and SHA-1, as well as all non-AEAD and non-PFS cipher suites in TLS. The 
changes apply to all Rel-16 3GPP systems that use TLS and DTLS, which are quite 
many.

3GPP had already mandaded support of TLS 1.3, forbidden support of TLS 1.1, and 
mandated minimum key lengths of 2048 for RSA/FFDH and 255 for ECC. 3GPP will 
likely mandate support of DTLS 1.3 soon after it has been published.

I hope this inspire other organisations to do the same.

The changes [2][3] were approved today and an updated complete version of the 
new 3GPP TLS profile can be found here [1]. Any comments or suggestions on the 
3GPP TLS profile are very welcome.

Cheers,
John


[1]https://github.com/EricssonResearch/CBOR-certificates/raw/master/3GPP%20TLS%20Profile%206%20march%202020.pdf

[2]http://www.3gpp.org/ftp/TSG_SA/WG3_Security/TSGS3_98e/Docs/S3-200332.zip

[3]https://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_98e/Inbox/Drafts/draft_S3-200333-r1.doc

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to