Oh, never mind, presumably you're referring to the proposal in this thread.


> On Mar 9, 2021, at 4:47 PM, Carrick Bartle 
> <cbartle891=40icloud....@dmarc.ietf.org> wrote:
> 
>> The proposal on the table is to deprecate FFDHE. 
> 
> Sorry, the title of the document is incorrect and will be changed. The actual 
> proposal is not to deprecate FFDHE but to deprecate FFDH and prohibit key 
> reuse for FFDHE.
> 
> 
>> On Mar 9, 2021, at 1:04 PM, Viktor Dukhovni <ietf-d...@dukhovni.org> wrote:
>> 
>> On Tue, Mar 09, 2021 at 11:29:40AM -0800, Carrick Bartle wrote:
>> 
>>>> Because there are still many TLS (non-web) implementations that don't
>>>> do ECDHE.
>>> 
>>> I'm confused: if those implementations don't do ECDHE, what's wrong
>>> with prohibiting the way it's used?
>> 
>> The proposal on the table is to deprecate FFDHE.  If the software stack
>> has no ECDHE, and only has FFDHE, it would then have to resort to RSA
>> key exchange.
>> 
>>>>  * In practice security improves more when you raise the ceiling,
>>>>    rather the floor.
>>> 
>>> This sort of suggests that we should never deprecate anything, ever, no?
>> 
>> No, rather it suggests that *before* we deprecate, we first work to get
>> everyone to use stronger options, and then, crisis situations aside,
>> wait for the long tail to effectively peter out.  Then deprecate, once
>> it is clear that it is mostly a formality.
>> 
>> The difficult question is how to handle situations where the long tail
>> is mostly invisible to the IETF community, i.e. happens on isolated
>> networks, that use (and may be audited against) our standards, but don't
>> show up in Internet surveys, ...  It may then be hard to know when to
>> declare to declare victory.  I don't have a good answer for that.
>> This is where Peter Gutmann et. al., may be able to help.
>> 
>> Deprecation is not always easy, and we don't always the desired outcome.
>> 
>> I hear that in Germany operators of some services are expected to
>> operate their systems in accordance with "state of the art" practices
>> (I guess BCP).  This may allow a distinction between "tolerable" and
>> "best practice", where things we might deprecate would no longer be
>> "best practice", but are still within the standard, and expected
>> to interoperate if implemented by both (all relevant) parties.
>> 
>> So short of deprecation, one might say that the legacy algorithms:
>> 
>>   * Are not recommended.
>>   * Can't be expected to be widely implemented
>>   * Should only be used when the preferred choices
>>     are not available.
>> 
>> Which is not nearly as strong as "MUST NOT", which is what I take
>> deprecation to mean.  Am I wrong about the intended meaning of
>> "deprecation"?
>> 
>> -- 
>>  Viktor.
>> 
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
> 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to