I opened a PR to update the document to mark the static DH client
certificate types as SHOULD NOT -
https://github.com/tlswg/draft-deprecate-obsolete-kex/pull/15/files

The basic change is the addition of the following in Section 2

"In addition, to avoid the use of non-ephemeral Diffie Hellman, clients
SHOULD NOT use use and server SHOULD NOT accept certificates with fixed DH
parameters. These certificate types are rsa_fixed_dh, dss_fixed_dh,
rsa_fixed_ecdh and ecdsa_fixed_ecdh. These values only apply to TLS
versions of 1.2 and below."


On Tue, Apr 23, 2024 at 11:03 AM Rob Sayre <say...@gmail.com> wrote:

> On Tue, Apr 23, 2024 at 8:35 AM David Benjamin <david...@chromium.org>
> wrote:
>
>> I'll add that if we're wrong and someone *does* need these, it is all
>> the more important that we communicate our intentions! The current
>> situation is that we have effectively deprecated this by not adding a way
>> to use those certificates in TLS 1.3, but we forgot to say so. A
>> hypothetical deployment relying on these certificates would be unable to
>> migrate to TLS 1.3, but may not realize it yet if they're slow to upgrade.
>>
>
> It's not hypothetical. I found relatively recent manuals describing how to
> configure them. I didn't read the source code, it was right there in the
> web page documentation.
>
> I agree with what David says, and I can't really see why anyone would
> object if someone wants to do the work.
>
> thanks,
> Rob
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to