<inline>
----- Original Message -----
From: Eric Rescorla e...@rtfm.com
Sent: 01/05/2020 22:45:35


On Tue, Apr 28, 2020 at 1:41 AM tom petch <daedu...@btconnect.com> wrote:

One requirement that was raised in the later stages of the work on TLS 1.3 
related to audit, and was raised, I think, by representatives of the finance 
industry; the WG rejected the requirement. 


It's worth noting that to the extent that this is a requirement, it is already 
violated by any installation which is compliant with RFC 7525. The auditing 
techniques in question depend un using static RSA cipher suites, but 7525 
https://tools.ietf.org/rfcmarkup?doc=7525#section-4.1 *already* prohibits those 
at the SHOULD level and requires forward that forward secure cipher suites be 
implemented and preferred at the MUST level:


   o  Implementations SHOULD NOT negotiate cipher suites based on RSA
      key transport, a.k.a. "static RSA".

      Rationale: These cipher suites, which have assigned values
      starting with the string "TLS_RSA_WITH_*", have several drawbacks,
      especially the fact that they do not support forward secrecy.

   o  Implementations MUST support and prefer to negotiate cipher suites
      offering forward secrecy, such as those in the Ephemeral Diffie-
      Hellman and Elliptic Curve Ephemeral Diffie-Hellman ("DHE" and
      "ECDHE") families.

      Rationale: Forward secrecy (sometimes called "perfect forward
      secrecy") prevents the recovery of information that was encrypted
      with older session keys, thus limiting the amount of time during
      which attacks can be successful.  See Section 6.3 for a detailed
      discussion.

<tp>
Yes and it is a SHOULD not a MUST.  If audit cannot take place, then it is 
easier for bad actors to use the technology be they pursuant of fraud, 
terrorism or whatever.  I think that concerns about the bad behaviour that the 
Internet facilitates is growing and we may get pushback on the IETF at large.  
I see TLS 1.3 as emphasising privacy at a time when the world at large is 
waking up to the abuses that that enables.

As others have said, beyond adding a 'bis' this I-D seems devoid of anything 
new and so, to me, seems too risky to adopt.  It is a blank slate.

---
New Outlook Express and Windows Live Mail replacement - get it here:
https://www.oeclassic.com/

Tom Petch


Since then, I have seen suggestions on the TLS and other lists, and in the 
press, about the development of alternative protocols to meet the requirements 
that TLS 1.3 does not. 


Yes, I'm aware of at least one of those efforts (eTLS), however so far it seems 
to have only minimal adoption. At least in the Web environment, I am unaware of 
any browser or server which is interested in implementing it.


-Ekr

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to