On Wed, Jul 12, 2023 at 12:40:13PM -0400, Sean Turner wrote:

> > On Jul 11, 2023, at 13:52, Salz, Rich <rs...@akamai.com> wrote:
> > 
> >> This email starts the working group last call for "Deprecating Obsolete 
> >> Key Exchange Methods in TLS 1.2” I-D, located here:
> > 
> >> .  https://datatracker.ietf.org/doc/draft-ietf-tls-deprecate-obsolete-kex
> > 
> > Three minor issues and a question.
> > 
> > Consider saying once, early.in the document, that this does not
> > address TLS 1.0 and TLS 1.1 as they were already deprecated.
> 
> This appears in s2:
> 
> Note that TLS 1.0 and 1.1 are deprecated by [RFC8996]
> and TLS 1.3 does not support FFDH [RFC8446].

And section 3:

    
https://www.ietf.org/archive/id/draft-ietf-tls-deprecate-obsolete-kex-02.html#section-3

    Clients MUST NOT offer and servers MUST NOT select FFDHE cipher
    suites in TLS 1.2 connections. This includes all cipher suites
    listed in the table in Appendix C. (Note that TLS 1.0 and 1.1 are
    deprecated by [RFC8996].) FFDHE cipher suites in TLS 1.3 do not
    suffer from the problems presented in Section 1; see [RFC8446].
    Therefore, clients and servers MAY offer FFDHE cipher suites in TLS
    1.3 connections.

Note that at least in Postfix (opportunistic STARTTLS), this advice will
be ignored.  FFDHE will remain supported in TLS 1.2, with ECDHE
preferred when offered by the client:

    https://tools.ietf.org/html/rfc7435

The default group used by the server is either a compiled-in 2048-bit
group or one of the groups from appendix of RFC7919 built-in to OpenSSL.
There are zero reports of clients that can't handle 2048-bit groups (as
opposed to 1024).  Point "3" in the introduction may be outdated w.r.t.
to current practice.

-- 
    Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to