On 5/1/20 12:27 PM, Ned Freed wrote:

IMO RFC7525 and this new draft both suffer from dubious assumptions and
make poor recommendations because of those assumptions.  In particular,
there are many cases for which using an old version of TLS is suboptimal
and it shouldn't be considered as secure, but it may still be better
than deprecating old versions of TLS that might be the only ones
supported by the peer.

Whether or not to ban SSL v2 and v3 is a tough call, but not for the reasons given in RFC 7525. Yes, these are weak mechanisms, but in the absence of other
considerations weak is better than no security at all.

However, because of the way the negotations work supporting all of these stuff simultaneously has proven to be difficult to get right. The fact that these old versions can cause interop failures with later versions is arguably sufficient
cause for a MUST NOT.

If we can enumerate those specific cases, and explain why they're MUST NOTs, that seems like it would be a Good Thing.

People do not always have the luxury of upgrading their clients and
servers to versions that support the recent TLS.    Some legacy hardware
has firmware that cannot be upgraded because no upgrades are
available.   Service providers do not always have the leverage to insist
that their customers upgrade, or the luxury of abandoning customers. etc.

Shorter version: Once again the IETF is letting the best be the enemy of the
good.

I have often observed tendencies in thinking about security that seem to result in poor choices.

One is to assume that every application acts like the web, for example: A human interacting with a UI on the client side, who is in the loop, and who can react to security negotiation failures and make informed decisions.

Another is to treat "secure" as a binary value, without even considering that different users quite reasonably have different threat models.

(Anytime someone whom I don't have calibrated claims something is "secure", a red flag goes up.   At that point I generally ask them to tell me what threats they have identified and what they've done to address them.   Then I'll have a better idea of what they mean.  A few people can answer such questions, but most go into infinite page fault, or worse, just start trying to pile on more BS.   And then I know to treat the system as insecure.)

So in summary, either I don't support adoption of this draft, or I
support adoption of this draft only to the extent that it can be
significantly changed.

AFAICT the draft hasn't been updated beyond what RFC 7525 says, so I'm
going to wait and see what those updates say before I decide if I can
support the change.

Yeah, I'm not entirely clear on the right way to go about this: is it to adopt the document with the understanding that significant changes are expected, or is it better to start with a new draft?

Keith


_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to