On Tue, Apr 08, 2025 at 04:48:12PM +0000, Salz, Rich wrote:
> Is the second paragraph of Sec 4 not sufficient? It says “If deployment 
> considerations are a concern, the protocol MAY specify TLS 1.2 as an 
> additional, non-default option.”

That wording alone encourages non-interop: One implementation that does
not think about the issue will simply use some TLS 1.3-only stack, and
then it will not be interoperable with another implementation in which
it is not possible to support TLS 1.3 (e.g.: because it's non-upgradeable 
firmware,
only the app-software is/can-be newer).

For all the cases, where not all communication partners can support TLS 1.3,
the wording of RFC9325 is already perfect. And my suggested text for your
draft was trying to restate that. Except that we probably should add requring
RFC9325 for new protocols in that case too.


But maybe break the suggestions into two parts:

a) Currently, the draft overstates what it can prove: we do not know whether
TLS 1.3 is (universally) in widespread use. We can only determine this for
some implementation wide rather limited, but utilization wise very significant
subseet of TLS usage: protocols for browsers on the Internet. See example F5
paper from S. I think we should be crisper about that limited, but important
insight in the draft. I also think we will never know a lot more about that
"dark usage" of TLS (or for that matter a lot of that "dark usage" of our
protocols).

b) The suggested solutions to the visible vs. non-visible use of TLS do
not only need to be IMHO differrent because of the well understood problems
of inagile software/firmware in the non-visible part, but also because
of the difference of visibility.

For example, i think it would make sense to think about a simple timeout
based requirement against MUST support TLS1.3 for the dark part of usage,
for example 10 years after announcement of TLS1.3 - which would be 2028.

But obviously now that it's already 2025, its a bit late for that given how
the purpose of such a timed requirement would be to have some good amount of
time to let that RFC trickle through those slow industries where it applies.

Also, the fact that PQ has been around the corner has given me pause of
pushing for something like that for pre-quantum versions/profile of TLS.
Alas, i have no good enough understanding about PQ crypto to have a strong
opinion if or whether we could do such a timed requirement for TLS with PQ
at some point in time - beyond the so-far mentioned firmware issues, PQ
has hardware issues in IoT: A lot of IOT HW seem to have jumped on EC for
faster processing, and its unclear to me, how constrained HW will best become
PQ anyhow...

Aka: We can still think of making a timed requirement for TLS 1.3 and ignore
PQ (unfortunately) for dark usage of TLS, but obviously it would still have to 
be
a long enough period of time to make the timed announcement useful.

Not sure if less than 10 years from announcement makes sense.  *sigh*

Cheers
    Toerless

_______________________________________________
Uta mailing list -- uta@ietf.org
To unsubscribe send an email to uta-le...@ietf.org

Reply via email to