[TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support
Arnaud Taddei <arnaud.taddei@broadcom.com> Tue, 05 November 2024 21:20 UTC
Return-Path: <arnaud.taddei@broadcom.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B5EDC1DA1E9 for <tls@ietfa.amsl.com>; Tue, 5 Nov 2024 13:20:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.251
X-Spam-Level:
X-Spam-Status: No, score=-2.251 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.148, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=broadcom.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GFCnF0bIw5pR for <tls@ietfa.amsl.com>; Tue, 5 Nov 2024 13:20:24 -0800 (PST)
Received: from mail-wm1-x331.google.com (mail-wm1-x331.google.com [IPv6:2a00:1450:4864:20::331]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 29EFBC1D6FA3 for <tls@ietf.org>; Tue, 5 Nov 2024 13:20:23 -0800 (PST)
Received: by mail-wm1-x331.google.com with SMTP id 5b1f17b1804b1-43161e7bb25so46117855e9.2 for <tls@ietf.org>; Tue, 05 Nov 2024 13:20:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; t=1730841622; x=1731446422; darn=ietf.org; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:from:to:cc:subject:date:message-id:reply-to; bh=NMZU23KOYYxDA0bO+SaSELws0FYjCHHyCJAQo93x4/c=; b=PEPe/8u4AxgbI4ULFZ+rYdpgDG2C0wzltWuYadtXIBwoQ2NzGMRSmWEhngYbYX/xM0 SmYNJpWDAzX24Uhfl6kjK6yNY/9T9ljRyOmWCNmn07tbYgZxWrGKrSMyPHl68PX7I02L Ya6pzWob2WwyTzNlEpAFMZNARHY4L2Ts3SUj8=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1730841622; x=1731446422; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=NMZU23KOYYxDA0bO+SaSELws0FYjCHHyCJAQo93x4/c=; b=wsB9cGCgzmuUvGiGelbHmExYXbG/zcvmKQy7fmVBJHGJmzJhrwYHdq3xTIgLPxw2RC jmkNy/8qUpvKGjvq6BbfrULCw4DFxhEbO3nsa++pzngC68/IaiT7MzLHfpgBdopBGqkH DPsB/ISxgWxgqzobJzhgkIqKdZ5SJVmcbAXIFrYveOYVDNnHJEEVqLHxJbR0hQ7b8PFW nT8kdx5W2+YbykXHIazgckrde4Mfbg3pJzkEluDJzJyA6f/Nb7FZuNW6nMKjlUouSHtM m0A47FxiTMigiEWaVW/aB0OFTf0uLhuP+S/B1MMS9N902HOVHkd/jYqKYgmzF11UDlLe Vkmw==
X-Forwarded-Encrypted: i=1; AJvYcCVYXwRfCb4CWgyW4xlW9ofXdwnVnoVeItk8qxyEWY38OUyXzmDYX9dFfW2H9lIn7T4DJ9o=@ietf.org
X-Gm-Message-State: AOJu0Yw2oRcQzZUnbR1/aJr3JG1Xx2Go6tfJNYZVGCifQTpO2qCDz0bm fmoOwjpdDm+w292x8fm4YWmDDE/4v3KZlRLDozhEXXHpzJY+vwbcHNIIH8A9/ODVzdFwHfRXMlX uUX7Ie/RNT/AaTKuYIdCzb5Sq3xZnEA==
X-Google-Smtp-Source: AGHT+IHi8NrOOU/aoxnRmr7yqrtcppHDo4vd899JYiqUz1WyANdFE0yhoayTVptvGVUSCyNF7WgNig==
X-Received: by 2002:a5d:5749:0:b0:377:6073:48df with SMTP id ffacd0b85a97d-381b710fa38mr17718398f8f.58.1730841622006; Tue, 05 Nov 2024 13:20:22 -0800 (PST)
Received: from smtpclient.apple ([81.173.15.10]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4327d6983b7sm198417845e9.43.2024.11.05.13.20.21 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 05 Nov 2024 13:20:21 -0800 (PST)
From: Arnaud Taddei <arnaud.taddei@broadcom.com>
Message-Id: <9CE2D516-B780-481A-8A5D-E5DEC900D2E6@broadcom.com>
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3776.700.51\))
Date: Tue, 05 Nov 2024 21:20:10 +0000
In-Reply-To: <CACcvr=nX=pk+uZMgBomWjaD54aW0KRtbL-voY4-PHCynELZdDw@mail.gmail.com>
To: Nick Harper <ietf@nharper.org>
References: <278163DF-0CB8-472F-84CB-0B8236FEC7C1@sn3rd.com> <231D5F24-E1AE-4F7C-9860-F6B0FF79D6FF@akamai.com> <CACcvr=nX=pk+uZMgBomWjaD54aW0KRtbL-voY4-PHCynELZdDw@mail.gmail.com>
X-Mailer: Apple Mail (2.3776.700.51)
Content-Type: multipart/alternative; boundary="Apple-Mail=_92DE9B16-BD14-4850-8E27-530EB2676B92"
Message-ID-Hash: VN43KEORB4EDVCWQIX2QI4QX6TNUL435
X-Message-ID-Hash: VN43KEORB4EDVCWQIX2QI4QX6TNUL435
X-MailFrom: arnaud.taddei@broadcom.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Rich Salz <rsalz=40akamai.com@dmarc.ietf.org>, "TLS@ietf.org" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/eLAhtP9OObVR3kei3LrUFiXc3zs>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
I do support the adoption of this draft. This draft is a very good product and the details and care that this draft exhibits is in itself a testimony of someone who has a real production experience, is realistic and pragmatic. There is a big difference between patching an endpoint to a variation of TLS1.2 which is meant to work in a ’TLS1.2 designed environment” Vs patching an endpoint to TLS1.3 in an environment that was ’TLS1.2 designed environment’ If the organisation that needs to manage a security risk is given a choice of 1) Patch to TLS-LTS 2) Patch to TLS1.3 Any risk manager is going to ask the qualification of the implications on both and the result will be that 1) will be far less intrusive and risky than 2) Moreover the bench-test platform that the solution needs to go through to prove its production readiness may not be able to support TLS1.3 at all. Not adopting this draft leaves only one choice to any customer with no guarantees that the patching to TLS1.3 will work in its TLS1.2 designed end-to-end environment at a manageable time, cost and ‘go to production’ or ‘go to market’ time, and risk. Worse, it could have unanticipated consequences like breaking compliancy to regulations, to safety and I can just imagine how it could move the risks from bits and bytes to blood and flesh. My 0.02 Swiss francs Arnaud Taddei Global Security Strategist | Enterprise Security Group mobile: +41 79 506 1129 Geneva, Switzerland arnaud.taddei@broadcom.com <mailto:arnaud.taddei@broadcom.com> | broadcom.com > On 5 Nov 2024, at 19:48, Nick Harper <ietf@nharper.org> wrote: > > I understand the stated goal of this draft to be to provide a way for hard-to-update endpoints to keep using TLS 1.2 in a secure way. The idea of a document that describes how to safely deploy TLS 1.2 sounds like a good idea, e.g. "use only these cipher suites, require EMS and RI, etc". This draft is not that. > > This draft makes changes to the TLS handshake protocol, which undermines the goal of supporting hard-to-update endpoints. The two changes made to the protocol are also addressed by RFC 8446. If endpoints need to be updated to support TLS-LTS, it would make more sense to update them to support TLS 1.3 than TLS-LTS. > > The rationale section (3.7) of the draft presents two reasons for using TLS-LTS over TLS 1.3. The first is the slow deployment cadence of a new protocol. LTS requires a change to the protocol and deployment of that new change, no different from 1.3. The second reason is fear of the unknown in 1.3: "TLS 1.3 is an almost entirely new protocol. As such, it rolls back the 20 years of experience that we have with all the things that can go wrong in TLS". The 20 years of all the things that can go wrong in TLS were due to unsound cryptographic decisions. The research and analysis that found those 20 years of issues was applied to the design of 1.3 to avoid making the same mistakes. 1.3 doesn't roll back that experience, and we now have over 8 years of experience with 1.3. > > I do not support adoption of the draft in this format. If the draft made no changes to the TLS 1.2 protocol and were deployable only through configuration changes (e.g. a fixed list of cipher suites and extensions), I would probably support it. > > On Tue, Nov 5, 2024 at 11:02 AM Salz, Rich <rsalz=40akamai.com@dmarc.ietf.org <mailto:40akamai.com@dmarc.ietf.org>> wrote: >> I strongly support adoption. >> >> I do not understand why anyone would be opposed to the IETF making deployment recommendations. I can understand why someone might be bothered by the impliciation that *THIS ONE WAY* is the only way to get long-term support, especially if it's seen to contradict our encouragement of TLS 1.3. But that is an editorial issue that can be easily fixed. >> >> I would like to see this adopted, a short change cycle, and then advanced in the same cluster with our TLS 1.2 is frozen document. >> >> >> _______________________________________________ >> TLS mailing list -- tls@ietf.org <mailto:tls@ietf.org> >> To unsubscribe send an email to tls-leave@ietf.org <mailto:tls-leave@ietf.org> > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-leave@ietf.org -- This electronic communication and the information and any files transmitted with it, or attached to it, are confidential and are intended solely for the use of the individual or entity to whom it is addressed and may contain information that is confidential, legally privileged, protected by privacy laws, or otherwise restricted from disclosure to anyone else. If you are not the intended recipient or the person responsible for delivering the e-mail to the intended recipient, you are hereby notified that any use, copying, distributing, dissemination, forwarding, printing, or copying of this e-mail is strictly prohibited. If you received this e-mail in error, please return the e-mail to the sender, delete it from your computer, and destroy any printed copy of it.
- [TLS] Adoption call for TLS 1.2 Update for Long-t… Sean Turner
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Sean Turner
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Rob Sayre
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Alicja Kario
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Salz, Rich
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Thom Wiggers
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Viktor Dukhovni
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Christopher Wood
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Watson Ladd
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Richard Barnes
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Martin Thomson
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Alicja Kario
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Sean Turner
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Nick Harper
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Arnaud Taddei
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Eric Rescorla
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… David A. Cooper
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Andrew Campling
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Yaron Sheffer
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… David Benjamin
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Yaron Sheffer
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Andrew Campling
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Watson Ladd
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Salz, Rich
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Andrew Campling
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Watson Ladd
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Rob Sayre
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Salz, Rich
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Rob Sayre
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Salz, Rich
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Watson Ladd
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Alicja Kario
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Salz, Rich
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Watson Ladd
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Salz, Rich
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Watson Ladd
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Rob Sayre
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Pascal Urien
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Sean Turner
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Stephen Farrell
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Muhammad Usama Sardar
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Yaron Sheffer
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… David A. Cooper
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Bas Westerbaan
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… David A. Cooper
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Watson Ladd
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… David Benjamin
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Peter Gutmann
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Sean Turner
- [TLS] Re: Adoption call for TLS 1.2 Update for Lo… Rob Sayre