I'd suggest we also deprecate TLS 1.2 TLS_DHE_*, even when ephemeral:

- The construction is broken. The leak itself in the Raccoon attack comes
from TLS 1.2 removing leading zeros. We can't change the meaning of the
existing code points, so any fix there would involve dropping them.

- It lacks group negotiation, which makes it very difficult to migrate away
from small groups. At least in the web, it's already no longer supported by
most implementations.
https://groups.google.com/a/chromium.org/g/blink-dev/c/AAdv838-koo/m/bJv17voIBAAJ
https://bugzilla.mozilla.org/show_bug.cgi?id=1496639
https://weakdh.org/

On Mon, Mar 8, 2021 at 12:52 PM Carrick Bartle <cbartle891=
40icloud....@dmarc.ietf.org> wrote:

> Agreed. I'll change the title to reflect that.
>
> > On Mar 8, 2021, at 7:33 AM, Martin Thomson <m...@lowentropy.net> wrote:
> >
> > Well overdue.  We should do this.
> >
> > The title "Deprecating FFDH(E) Ciphersuites in TLS" doesn't seem to
> match the document content.  I only see static or semi-static DH and ECDH
> key exchange being deprecated (in the document as non-ephemeral).
> >
> > _______________________________________________
> > TLS mailing list
> > TLS@ietf.org
> > https://www.ietf.org/mailman/listinfo/tls
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to