On Thu, Jul 13, 2023 at 03:03:15PM +0200, Hubert Kario wrote:

> And in general, it's far better to use FFDHE kex with legacy client
> than RSA.  Getting RSA right is very hard, using ephemeral secrets for
> FFDHE is trivial and recommended practice already.

Indeed, though I agree that TLS applications should prefer ECDHE key
exchange over FFDHE key exchange, I hold that requiring non-support
is counterproductive.

As a data point, here's a negotiated cipher suite breakdown from SMTP
servers that have DANE TLSA records:

  30746     TLS 1.3 with AES256GCM-SHA384
   2192     TLS 1.2 with ECDHE-RSA-AES256GCM-SHA384
    426     TLS 1.2 with ECDHE-ECDSA-AES256GCM-SHA384
    153     TLS 1.2 with ECDHE-RSA-AES128GCM-SHA256
    115     TLS 1.2 with ECDHE-ECDSA-AES128GCM-SHA256
     96     TLS 1.3 with AES128GCM-SHA256
     71     TLS 1.3 with CHACHA20POLY1305-SHA256
     71     TLS 1.2 with DHE-RSA-AES256GCM-SHA384
     25     TLS 1.2 with DHE-RSA-CHACHA20POLY1305-SHA256
     15     TLS 1.2 with ECDHE-RSA-AES256CBC-SHA384
      5     TLS 1.0 with DHE-RSA-AES256-SHA1
      4     TLS 1.2 with ECDHE-RSA-AES256CBC-SHA
      3     TLS 1.2 with RSA-AES256GCM-SHA384
      3     TLS 1.2 with DHE-RSA-AES128GCM-SHA256
      2     TLS 1.2 with ECDHE-RSA-CHACHA20POLY1305-SHA256
      1     TLS 1.2 with DHE-RSA-AES256-SHA1

Without any "MUST NOT"s, already TLS 1.3 dominates, and by far the bulk
of TLS 1.2 connections are using ECDHE.

What benefit do we expect from forcing weaker security (RSA key exchange
or cleartext in the case of SMTP) on the residual servers that don't do
either TLS 1.3 or ECDHE?

So long as we "raise the ceiling" we reap most of the benefit, and if
the handshake is downgrade resistant, raising the floor isn't always a
win.

-- 
    Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to