I am also against adoption.

I would not be against a draft that made deployment recommendations, if RFC 9325 was considered insufficient. (Although I don't like the idea of suggesting that TLS 1.2 without support for quantum-resistant cryptography is a recommended long-term solution.) However, as others have noted, this draft is not making deployment recommendations, it is specifying a new extension that signals the use of a slightly modified version of TLS 1.2. I also agree that not adopting this draft does not prevent people from using it, let alone continuing to use TLS 1.2.

Even if I thought the idea of having an extension to signal the use of a slightly modified version of TLS 1.2 were a good idea, I believe there is another reason that it would be best for this WG not to adopt the draft. If the draft were adopted by the WG, then it would need to be open for the WG to make technical changes to it. However, Peter indicated in 2018 [0] that the extension defined in draft-gutmann-tls-lts had been in use since 2016. It would be contrary to the goal of this draft to suggest that those who have been using it since 2016 should not modify their implementations to align with changes made by the WG. It would also be inappropriate to adopt it as a WG document, especially as a standards track document, and then effectively declare that no technical changes can be made.

[0] https://mailarchive.ietf.org/arch/msg/tls/q7up_-tJH3ysD5Xip1mKGtTLKbg/

On 11/5/24 1:45 PM, Eric Rescorla wrote:
I am against adoption.

As Nick and Watson note, this is not just a profile of TLS 1.2 but is rather a set of negotiated with a new extension code point, i.e., it's effectively a new version of TLS with as yet only lightly analyzed security properties. We already have a new version of TLS which has been heavily analyzed and widely deployed, namely TLS 1.3.

There's nothing stopping people deploying this if they want to and in fact there is already a code point assigned. However, the TLS WG should not take up this work.

-Ekr

On Tue, Nov 5, 2024 at 1:21 PM Arnaud Taddei <arnaud.taddei=40broadcom....@dmarc.ietf.org> wrote:

    I do support the adoption of this draft.

    This draft is a very good product and the details and care that
    this draft exhibits is in itself a testimony of someone who has a
    real production experience, is realistic and pragmatic.

    There is a big difference between
    patching an endpoint to a variation of TLS1.2 which is meant to
    work in a ’TLS1.2 designed environment”
    Vs
    patching an endpoint to TLS1.3 in an environment that was ’TLS1.2
    designed environment’

    If the organisation that needs to manage a security risk is given
    a choice of
    1) Patch to TLS-LTS
    2) Patch to TLS1.3

    Any risk manager is going to ask the qualification of the
    implications on both and the result will be that 1) will be far
    less intrusive and risky than 2)

    Moreover the bench-test platform that the solution needs to go
    through to prove its production readiness may not be able to
    support TLS1.3 at all.

    Not adopting this draft leaves only one choice to any customer
    with no guarantees that the patching to TLS1.3 will work in its
    TLS1.2 designed end-to-end environment at a manageable time, cost
    and ‘go to production’ or ‘go to market’ time, and risk.

    Worse, it could have unanticipated consequences like breaking
    compliancy to regulations, to safety and I can just imagine how it
    could move the risks from bits and bytes to blood and flesh.

    My 0.02 Swiss francs

    *Arnaud Taddei*
    Global Security Strategist | Enterprise Security Group

    *mobile:* +41 79 506 1129
    Geneva, Switzerland
    arnaud.tad...@broadcom.com | broadcom.com <http://broadcom.com>

    On 5 Nov 2024, at 19:48, Nick Harper <i...@nharper.org> wrote:

    I understand the stated goal of this draft to be to provide a way
    for hard-to-update endpoints to keep using TLS 1.2 in a
    secure way. The idea of a document that describes how to safely
    deploy TLS 1.2 sounds like a good idea, e.g. "use only these
    cipher suites, require EMS and RI, etc". This draft is not that.

    This draft makes changes to the TLS handshake protocol, which
    undermines the goal of supporting hard-to-update endpoints. The
    two changes made to the protocol are also addressed by RFC 8446.
    If endpoints need to be updated to support TLS-LTS, it would make
    more sense to update them to support TLS 1.3 than TLS-LTS.

    The rationale section (3.7) of the draft presents two reasons for
    using TLS-LTS over TLS 1.3. The first is the slow deployment
    cadence of a new protocol. LTS requires a change to the protocol
    and deployment of that new change, no different from 1.3. The
    second reason is fear of the unknown in 1.3: "TLS 1.3 is an
    almost entirely new protocol. As such, it rolls back the 20 years
    of experience that we have with all the things that can go wrong
    in TLS". The 20 years of all the things that can go wrong in TLS
    were due to unsound cryptographic decisions. The research and
    analysis that found those 20 years of issues was applied to the
    design of 1.3 to avoid making the same mistakes. 1.3 doesn't roll
    back that experience, and we now have over 8 years of experience
    with 1.3.

    I do not support adoption of the draft in this format. If the
    draft made no changes to the TLS 1.2 protocol and were deployable
    only through configuration changes (e.g. a fixed list of cipher
    suites and extensions), I would probably support it.

    On Tue, Nov 5, 2024 at 11:02 AM Salz, Rich
    <rsalz=40akamai....@dmarc.ietf.org> wrote:

        I strongly support adoption.

        I do not understand why anyone would be opposed to the IETF
        making deployment recommendations. I can understand why
        someone might be bothered by the impliciation that *THIS ONE
        WAY* is the only way to get long-term support, especially if
        it's seen to contradict our encouragement of TLS 1.3. But
        that is an editorial issue that can be easily fixed.

        I would like to see this adopted, a short change cycle, and
        then advanced in the same cluster with our TLS 1.2 is frozen
        document.

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to