On Wed, 24 Jul 2024 at 02:29, Ben Schwartz <bemasc=40meta....@dmarc.ietf.org>
wrote:

> It seems like there's some confusion here.  ECH is an extension to TLS
> that is still under development (and now nearly final).  Use of ECH is
> optional in TLS 1.3.  Any entity that can control the TLS version in use
> also has the ability to disable ECH, so allowing TLS 1.3 does not require
> an administrator to permit ECH.
>

Yes. In addition, TLS 1.2 would reveal the device (or user) identity to
eavesdroppers and is not a viable option.

-Tiru


>
> --Ben Schwartz
> ------------------------------
> *From:* Paul Vixie <p...@redbarn.org>
> *Sent:* Tuesday, July 23, 2024 4:01 PM
> *To:* Paul Wouters <p...@nohats.ca>
> *Cc:* Tommy Jensen <jensen.tho...@microsoft.com>; Ben Schwartz <
> bem...@meta.com>; dnsop <dnsop@ietf.org>; Damick, Jeffrey <
> jdam...@amazon.com>; Engskow, Matt <mengs...@amazon.com>; Jessica
> Krynitsky <jess.krynit...@microsoft.com>
> *Subject:* Re: [DNSOP] Re: [EXTERNAL] New Version Notification for
> draft-tjjk-cared-00.txt
>
>
>
>
> --
> P Vixie
>
> On Tuesday, July 23, 2024 12:52:28 PM PDT Paul Wouters wrote:
> > On Jul 23, 2024, at 12:09, Paul Vixie <paul=40redbarn....@dmarc.ietf.org>
>
> wrote:
> > > Making TLS 1.2 available as a fallback is vital. Many secure private
> edge
> > > networks will never allow TLS 1.3 because of ECH.
> >
> > You can do TLS 1.3 without ECH ?
>
> if an endpoint wants TLS 1.3 with ECH, there's no way to negotiate them
> down
> to TLS 1.3 without ECH. there is a way to negotiate them down to TLS 1.2.
>
> > Making  a weaker version of TLS mandatory would be unwise, unless it’s to
> > give more time for migration away from it.
>
> migration for military, government, and many corporate networks can't
> happen.
> for reasons of law, regulation, or policy, they must see the client hello
> before they can decide whether to block the flow. "just secure your
> devices"
> can't work due to the way the supply chain works. the only alternative
> will be
> to block outbound entirely and force all traffic through a
> non-intercepting
> proxy.
>
> ietf knew this, but RFC 8890 forbade us to consider it. i was a dissenter.
> the
> fact that you refer to TLS 1.2 as "weaker" may indicate a preference that
> we
> mandate a technology that often _cannot_ be used even those the
> alternative
> ("effective mandate") will be a technology (explicit proxy) which is in
> fact
> weaker than TLS 1.2. we should not argue from talking points.
>
> don't put it in terms of migration. just recommend that fallback be
> allowed.
> 50 years from now, smarter people than us can think of a better way
> forward.
> as things are today, secure private edge networks including military,
> government, and many commercial networks, will not allow TLS 1.3 to be
> used.
>
> paul
>
>
> _______________________________________________
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-le...@ietf.org
>
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to