On 5/1/20 6:48 PM, Eric Rescorla wrote:
On Thu, Apr 30, 2020 at 7:59 PM Keith Moore
<mo...@network-heretics.com <mailto:mo...@network-heretics.com>> wrote:
People do not always have the luxury of upgrading their clients and
servers to versions that support the recent TLS. Some legacy
hardware
has firmware that cannot be upgraded because no upgrades are
available. Service providers do not always have the leverage to
insist
that their customers upgrade, or the luxury of abandoning
customers. etc.
Somewhat tangentially from the topic at hand: if you are running a
piece of hardware that cannot upgrade its TLS stack at all, you quite
likely have a number of serious unpatched vulnerabilities, and should
reconsider whether it is safe to have that hardware attached to the
Internet. Of course, you might be running some ESR software where you
can only take security releases, in which case this does not apply.
Quite often the issue is not the hardware, but the lack of support. In
my experience, many appliances with IP interfaces have no long-term
support to fix security issues, because (for various reasons) there's no
revenue stream to support it, and there was never any plan to provide
long-term support. But the problem is even deeper than that -
customers expect to pay for the product up front and little if anything
for ongoing support. Even if the vendor wanted to sell the long term
support contract there's little chance that the customer would pay for
it. (I'm thinking industrial markets here, but consumer hardware often
has similar issues.)
(And sometimes the compilers, linkers, etc. needed to build a new
version of the device firmware are not easily found, and sometimes those
tools don't run on newer operating systems, so upgrading these platforms
can be much more complicated than just updating the source code and
recompiling.)
I also think it's odd that there are recommendations like this
that say
"don't support TLS x.y" but say nothing about not supporting
cleartext
for protocols that still have a cleartext mode. Even SSL 1.0 is
probably better than cleartext (at least from a security
perspective, if
not from a support burden perspective) as long as it's not trusted
to be
secure.
While perhaps technically true, for the reasons above I believe this
to be irrelevant: TLS 1.2 is nearly 12 years old. At this point, any
implementation which does not support it should be presumed to be
insecure regardless of our opinion on the specific protocols it supports.
I agree that such devices are likely insecure, but there are still
devices in service that only speak TLS 1.0 or 1.1. Are we going to
insist that no standards-conforming peer programs should be able to
communicate with them? (I fully agree that new standards-conforming
peer programs should not label such connections as "secure")
Keith
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta