From a real-world perspective, I agree — if servers choose to negotiate 
deprecated protocols, they should at least use the anti-downgrade mechanisms 
we've built. In terms of spec consistency, it feels very odd to have 2119 
requirements that only apply if you choose to violate the requirements we've 
already stated. So it's a 6919-esque MUST NOT (BUT WE KNOW YOU WILL).

RFC8996 acknowledges that there will be a delay between publication of the BCP 
and implementation of the deprecation in the real world; "Adopting the 
practices recommended by this document for any systems that need to communicate 
with the aforementioned class of systems will cause failure to interoperate. 
[Consider the trade-off] when deciding how quickly to adopt the recommendations 
specified in this document." I can certainly understand making a similar 
acknowledgement here, but perhaps stronger language warning such 
implementations that they're straying off the beaten path is useful.

Regardless, this is a non-blocking comment, and I'll defer to you, the WG, and 
the responsible AD on exactly how to balance this.
________________________________
From: Eric Rescorla <e...@rtfm.com>
Sent: Monday, June 2, 2025 11:35 AM
To: Mike Bishop <mbis...@evequefou.be>
Cc: The IESG <i...@ietf.org>; draft-ietf-tls-rfc8446...@ietf.org 
<draft-ietf-tls-rfc8446...@ietf.org>; tls-cha...@ietf.org 
<tls-cha...@ietf.org>; tls@ietf.org <tls@ietf.org>; s...@sn3rd.com 
<s...@sn3rd.com>
Subject: Re: Mike Bishop's No Objection on draft-ietf-tls-rfc8446bis-12: (with 
COMMENT)

Thanks.

It might help to start with some background. While it's true that the IETF
has deprecated TLS versions prior to TLS 1.2, we also know that there
are many sites which support TLS 1.0 and TLS 1.1. [0]

We would still like those implementations to perform anti-downgrade, despite
violating this other MUST. So, I don't think that treating this as a historical
requirement is the right answer.

-Ekr


[0] https://www.ssllabs.com/ssl-pulse/





On Mon, Jun 2, 2025 at 7:40 AM Mike Bishop 
<mbis...@evequefou.be<mailto:mbis...@evequefou.be>> wrote:
Sorry, I should have quoted it. It's 
https://tlswg.org/tls13-spec/draft-ietf-tls-rfc8446bis.html#section-4.1.3-11 in 
the editor's copy:

[RFC8996<https://tlswg.org/tls13-spec/draft-ietf-tls-rfc8446bis.html#RFC8996>] 
and Appendix 
E.5<https://tlswg.org/tls13-spec/draft-ietf-tls-rfc8446bis.html#backward-compatibility-security>
 forbid the negotiation of TLS versions below 1.2. However, server 
implementations which do not follow that guidance MUST set the last 8 bytes of 
their ServerHello.random value to the bytes:

  44 4F 57 4E 47 52 44 00

Appendix E.5 states that versions below 1.2 "MUST NOT be negotiated for any 
reason," yet this text then has a MUST-level requirement applying exclusively 
to server implementations which ignore the MUST NOT.
________________________________
From: Eric Rescorla <e...@rtfm.com<mailto:e...@rtfm.com>>
Sent: Friday, May 30, 2025 10:54 AM
To: Mike Bishop <mbis...@evequefou.be<mailto:mbis...@evequefou.be>>
Cc: The IESG <i...@ietf.org<mailto:i...@ietf.org>>; 
draft-ietf-tls-rfc8446...@ietf.org<mailto:draft-ietf-tls-rfc8446...@ietf.org> 
<draft-ietf-tls-rfc8446...@ietf.org<mailto:draft-ietf-tls-rfc8446...@ietf.org>>;
 tls-cha...@ietf.org<mailto:tls-cha...@ietf.org> 
<tls-cha...@ietf.org<mailto:tls-cha...@ietf.org>>; 
tls@ietf.org<mailto:tls@ietf.org> <tls@ietf.org<mailto:tls@ietf.org>>; 
s...@sn3rd.com<mailto:s...@sn3rd.com> <s...@sn3rd.com<mailto:s...@sn3rd.com>>
Subject: Re: Mike Bishop's No Objection on draft-ietf-tls-rfc8446bis-12: (with 
COMMENT)

Thank you for comments. I have made a PR to address most of these comments:

https://github.com/tlswg/tls13-spec/pull/1385

I am a bit unsure about one comment. Can you point to the offending text for the
comment below:


The language around the SCSV for pre-1.2 values feels odd. You MUST NOT
negotiate older versions, but if you do anyway, you MUST do it this way? I
would shift this to a description of how clients and servers were required to
behave prior to this revision of 1.3 at most.
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to