On Tue, Apr 28, 2020 at 1:41 AM tom petch <daedu...@btconnect.com> wrote:
> One requirement that was raised in the later stages of the work on TLS 1.3 > related to audit, and was raised, I think, by representatives of the > finance industry; the WG rejected the requirement. It's worth noting that to the extent that this is a requirement, it is already violated by any installation which is compliant with RFC 7525. The auditing techniques in question depend un using static RSA cipher suites, but 7525 https://tools.ietf.org/rfcmarkup?doc=7525#section-4.1 *already* prohibits those at the SHOULD level and requires forward that forward secure cipher suites be implemented and preferred at the MUST level: o Implementations SHOULD NOT negotiate cipher suites based on RSA key transport, a.k.a. "static RSA". Rationale: These cipher suites, which have assigned values starting with the string "TLS_RSA_WITH_*", have several drawbacks, especially the fact that they do not support forward secrecy. o Implementations MUST support and prefer to negotiate cipher suites offering forward secrecy, such as those in the Ephemeral Diffie- Hellman and Elliptic Curve Ephemeral Diffie-Hellman ("DHE" and "ECDHE") families. Rationale: Forward secrecy (sometimes called "perfect forward secrecy") prevents the recovery of information that was encrypted with older session keys, thus limiting the amount of time during which attacks can be successful. See Section 6.3 for a detailed discussion. > Since then, I have seen suggestions on the TLS and other lists, and in the > press, about the development of alternative protocols to meet the > requirements that TLS 1.3 does not. Yes, I'm aware of at least one of those efforts (eTLS), however so far it seems to have only minimal adoption. At least in the Web environment, I am unaware of any browser or server which is interested in implementing it. -Ekr
_______________________________________________ Uta mailing list Uta@ietf.org https://www.ietf.org/mailman/listinfo/uta