Hi Thomas,
From: Thomas Fossati <thomas.foss...@arm.com> Sent: 18 July 2022 16:41 To: Rob Wilton (rwilton) <rwil...@cisco.com>; Martin Thomson <m...@lowentropy.net>; Peter Saint-Andre <stpe...@stpeter.im>; The IESG <i...@ietf.org> Cc: draft-ietf-uta-rfc7525...@ietf.org; uta-cha...@ietf.org; uta@ietf.org; le...@sunet.se Subject: Re: [Uta] Robert Wilton's Discuss on draft-ietf-uta-rfc7525bis-09: (with DISCUSS and COMMENT) Hi Rob, On Monday, 18 July 2022 at 15:35, Rob Wilton (rwilton) <rwil...@cisco.com<mailto:rwil...@cisco.com>> wrote: > > I think that you are right to be cautious here. What you want to > > have happen is interoperability. If you say 1.2 or later, then > > there is a risk of some implementations doing 1.2 only and some > > doing 1.3 only, then you lose the ability to communicate. > > The introduction states: > > This document attempts to minimize new guidance to TLS 1.2 > implementations, and the overall approach is to encourage systems > to move to TLS 1.3. > > and > > These are minimum recommendations for the use of TLS in the vast > majority of implementation and deployment scenarios, with the > exception of unauthenticated TLS (see Section 5). > > And section 3.1.1 states: > > Rationale: secure deployment of TLS 1.3 is significantly easier > and less error prone than secure deployment of TLS 1.2. > > I completely get wanting the interop, but the MUST implement TLS 1.2 > still feels too strong given that AIUI, one of the reasons for TLS 1.3 > was to help mitigate some of the security issues that turned up in TLS > 1.2. > > It feels reasonable to me for a server deployment to decide that > they will only support TLS 1.3 because it is easier to deploy > securely, placing the requirement on the client to also support TLS > 1.3 for successful interop. > > Equally, I can also foresee continued deployments, where they still > decide to support old versions of TLS before 1.2 to ensure that they > can still interoperate with legacy clients that have not upgraded. Sure a deployment can do as they decide to, but negotiating < 1.2 is not considered secure anymore. Sure. Agreed. OTOH, the 1.2 profile that the document describes (and that the endpoints are required to implement) is not less secure than 1.3. The document in its current form acknowledges the reality that today not all stacks are fully ready and, for a variety of reasons, not all deployments can be readily upgraded to 1.3. MbedTLS and its ecosystem are in that position: nearly there, but not 100% yet. The desired state is everyone runs 1.3 (because it's less complex, not because it's more secure than the profiled 1.2 defined in the BCP.) What are the risks of mandating 1.2 as baseline? I think that there are two risks: 1. It may be less secure, if this comment is correct "secure deployment of TLS 1.3 is significantly easier and less error prone than secure deployment of TLS 1.2"? 2. My interpretation from the document is that it is more important to implement TLS 1.2 than it is to implement TLS 1.3. If that is the intent, then okay, but then the quoted comment about TLS 1.3 being significantly easier sort of seems entirely irrelevant if implementations MUST still deploy TLS 1.2. But I just find the guidance in the document somewhat confusing: Years later this transition is largely complete and TLS 1.3 is widely available. ... This document attempts to minimize new guidance to TLS 1.2 implementations, and the overall approach is to encourage systems to move to TLS 1.3. However, this is not always practical. ... As noted, the TLS 1.3 specification resolves many of the vulnerabilities listed in this document. A system that deploys TLS 1.3 should have fewer vulnerabilities than TLS 1.2 or below. Therefore this document replaces [RFC7525<https://datatracker.ietf.org/doc/html/rfc7525>], with an explicit goal to encourage migration of most uses of TLS 1.2 to TLS 1.3. So, I read this document saying TLS 1.3 is great, and fixes a load of issues with TLS 1.2 which is why you absolutely MUST deploy TLS 1.2, and it would be nice if you did TLS 1.3 as well! Do we disincentivise converging to the desired goal? Maybe, it depends on how other levers play out. Anyway, worst case the parties negotiate the profiled 1.2, which guarantees excellent security. What are the risks of not mandating 1.2 as baseline? What about saying SHOULD support 1.2 except for deployments where TLS 1.3 is supported and it is known that all clients are capable of supporting TLS 1.3? E.g., TLS 1.3 for NETCONF is coming along, and the ISPs may want to configure the device to only use/allow TLS 1.3 and not TLS 1.2, but they would have to violate/ignore this guidance to turn off TLS 1.2 ... or perhaps the implementation could argue that they don't need to allow TLS 1.2 to be disabled because this RFC mandates that it has to be supported everywhere ... Do we create breakage that can't be easily fixed? Quasi certain. To me it's a question of timing, and I think we can defer the decision to when data give us confidence that the induced breakage is minimal. Note that a "SHOULD support 1.3" is pretty strong (RECOMMENDED may be slightly stronger?) and paves the way for being more radical with the next iteration of this document. RECOMMENDED means exactly the same as SHOULD, so alas that won't help. I appreciate the slight frustration, but a policy of small steps is the probably the most adequate for a BCP. Yes. I agree to the small steps thing, and I understand setting TLS 1.2 as the minimum bar. But as I said above, my current reading of the RFC 2119 language makes it unclear to me whether the goal is really to move everyone to TLS 1.3 or at least TLS 1.2. If I find this text confusing then I suspect that general implementors will also do so. Thanks, Rob Cheers, thanks IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
_______________________________________________ Uta mailing list Uta@ietf.org https://www.ietf.org/mailman/listinfo/uta