In article <b08c7a20-6949-4776-18d8-58f4c6e39...@netmagic.com> you write:
>-=-=-=-=-=-
>
>One comment.  Perhaps some caution might be advised in light of the 
>antitrust court order in /Trueposition v. Ericsson/. Ref. Order in Case 
>No. 2:11-cv-4574, (U.S. E.D. Pa, 14 Jul 2014).

That's a single page dismissing 3GPP from the case.  Really?

https://ia800306.us.archive.org/15/items/gov.uscourts.paed.426719/gov.uscourts.paed.426719.296.0.pdf

R's,
John





>On 2020-03-06 7:02 PM, John Mattsson wrote:
>> Hi,
>>
>> I am happy to report that 3GPP just took the decision to forbid support of 
>> MD5 and SHA-1, as well as all non-AEAD and non-PFS cipher suites in
>TLS. The changes apply to all Rel-16 3GPP systems that use TLS and DTLS, which 
>are quite many.
>>
>> 3GPP had already mandaded support of TLS 1.3, forbidden support of TLS 1.1, 
>> and mandated minimum key lengths of 2048 for RSA/FFDH and 255 for
>ECC. 3GPP will likely mandate support of DTLS 1.3 soon after it has been 
>published.
>>
>> I hope this inspire other organisations to do the same.
>>
>> The changes [2][3] were approved today and an updated complete version of 
>> the new 3GPP TLS profile can be found here [1]. Any comments or
>suggestions on the 3GPP TLS profile are very welcome.
>>
>> Cheers,
>> John
>>
>>
>> [1] 
>> https://github.com/EricssonResearch/CBOR-certificates/raw/master/3GPP%20TLS%20Profile%206%20march%202020.pdf
>>
>> [2] http://www.3gpp.org/ftp/TSG_SA/WG3_Security/TSGS3_98e/Docs/S3-200332.zip
>>
>> [3] 
>> https://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_98e/Inbox/Drafts/draft_S3-200333-r1.doc

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to