Re: [saag] AD review of draft-iab-crypto-alg-agility-06

Viktor Dukhovni <ietf-dane@dukhovni.org> Tue, 01 September 2015 15:40 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8228E1B2B87 for <saag@ietfa.amsl.com>; Tue, 1 Sep 2015 08:40:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1dbUXAI5D9cQ for <saag@ietfa.amsl.com>; Tue, 1 Sep 2015 08:40:07 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A4EF21A0018 for <saag@ietf.org>; Tue, 1 Sep 2015 08:40:07 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id 890CB284B6C; Tue, 1 Sep 2015 15:40:06 +0000 (UTC)
Date: Tue, 01 Sep 2015 15:40:06 +0000
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: saag@ietf.org
Message-ID: <20150901154006.GQ9021@mournblade.imrryr.org>
References: <619ffebb05ba4e2a9af03a6dcc768d6e@ustx2ex-dag1mb2.msg.corp.akamai.com> <20150824215037.GO9021@mournblade.imrryr.org> <9A043F3CF02CD34C8E74AC1594475C73F4AE62A1@uxcn10-5.UoA.auckland.ac.nz> <20150825134333.GX9021@mournblade.imrryr.org> <6b5167f3d0684a8a91caa6d37dec65e3@ustx2ex-dag1mb2.msg.corp.akamai.com> <20150825160627.GH9021@mournblade.imrryr.org> <CAHbuEH5r5s8ofChzt0_Rd8dxKqf8KXLDteYw8RSBX43nyFrN+A@mail.gmail.com> <2E7E9F38-DA68-4933-AD67-CF2A8E51B4F7@dukhovni.org> <20150825214411.GS9021@mournblade.imrryr.org> <loom.20150828T064228-679@post.gmane.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <loom.20150828T064228-679@post.gmane.org>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/k8EZcxygMR53Z628rmQP72ZzCkU>
Subject: Re: [saag] AD review of draft-iab-crypto-alg-agility-06
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: saag@ietf.org
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Sep 2015 15:40:09 -0000

On Mon, Aug 31, 2015 at 04:38:00PM +0000, Joel Sing wrote:

> Viktor Dukhovni <ietf-dane <at> dukhovni.org> writes:
> > I should note, that premature deprecation of algorithms and/or
> > protocol features by library maintainers who are not attuned to
> > the needs of OS applications is already having detrimental effects.
> > 
> > For example, LibreSSL 2.2.2 has not only removed support for SSL
> > 2.0 and SSL 3.0, but has also removed TLS server support for
> > SSL-2.0-compatible HELLO.
> 
> I strongly recommend that you check your facts, in order to avoid 
> distributing misinformation in a public forum:

Turns out the removal was inadvertent, as a side-effect of a bug
in handling HELLO with no extensions.  And the issue was resolved
in 2.2.3.  My larger point still stands, removal needs to be
handled with are.

> This is inaccurate. I believe you are confusing this with a bug that was
> introduced in the 2.2.2 release, which has already been fixed in 2.2.3. A 
> TLS ClientHello that contained no extensions was incorrectly handled,
> resulting in interoperability issues and handshake failures with some
> clients.

Not confusing, as the bug had not yet been identified, but rather
reporting the best information I had at the time.  Yes, non-support
for SSL 2.0 turned out to be unintentional.

My post was not about LibreSSL as-such, LibreSSL just happened to
be a convenient recent example.  I have many more issues with
opportunistic TLS interoperability in Microsoft's Schannel than
LibreSSL, but most are long-standing problems, rather than real or
apparent recent changes.  I've reported the problems to Microsoft.

The Postfix users who ran into problems with LibreSSL 2.2.2 reported
the problem to the LibreSSL team.  We're all doing what we can.

> >     * Remove from use by default.
> >     * Reduce relative preference.
> >     * Require non-default compile-time options to enable.
> >     * Remove the code.
> 
> You have practically just described the process that LibreSSL is using.
> The main difference is the timeline under which the process is being
> executed.

Good to know.  Timelines are of course a matter of judgement and
the needs of the community using the software.

> > Applications can move more aggressively, and use appropriate APIs
> > to disable obsolete crypto faster because they are better positioned
> > to know where to draw the line between security and interoperability
> > with legacy systems.
> 
> Deprecation is difficult, since those who are doing it are often told
> that they are doing the wrong thing, usually by people who try to discredit
> the projects and teams that are busy making progress. Hopefully the
> misinformation and inaccurate assertions above are not an example of this.

Let's not get carried away with imputing ill-will.  A follow-up
correction of the factual details is quite sufficient.

-- 
	Viktor.