Stephen:

> On 07/07/17 19:40, Kyle Rose wrote:
>> an informational draft submitted via the ISE
> 
> ...has nothing to to with this WG and ought consume
> no cycles on this list or in meetings.
> 
> Yes, the ISE is the route 2804 envisages for documenting
> wiretapping schemes such as this.
> 
> The authors of this draft however chose to put "standards
> track" in the header and some of those authors are very
> very well aware of all the nuances here so that was not
> a mistake is my conclusion. So I stand by my statement
> that 2804 says no to this.

As Kyle quoted, RFC 2804 says that we should be talking about the design.  It 
seems to me the only way to make this proposal more secure is to talk about it. 
 And, the TLS WG has the people with the proper expertise for that discussion.

The enterprise wants forward secrecy on the public Internet. Terminating the 
TLS session at the load balancer preserves forward secrecy on the public 
Internet.

We already had a discussion on this list about requiring a fresh ephemeral DH 
key for every session.  The consensus was not to require it.  I understand that 
there are already servers that use the same "ephemeral" DH key for more than 
one session.  I gather that this is done for performance reasons.  

The conventions described in draft-green-tls-static-dh-in-tls13-01 for using 
non-ephemeral DH keys has no impact on interoperability.  Discussion of that 
topic could easily go in an Informational RFC.  Many Informational RFCs 
describe crypto algorithms.  On the other hand, the protocol between the key 
manager and the server for installing the non-ephemeral DH key has an impact on 
interoperability, so it could be in a standards-track document.

In your response, you ignored a fairly significant point in my previous post.

        In some industries, there are regulatory requirements that cannot be
        met without access to the plaintext.  Without some authorized access
        mechanism, the enterprise will be forced to use plaintext within the
        datacenter.  That seems like a worse alternative to me.

>From my perspective, draft-green-tls-static-dh-in-tls13 is not advocating 
>outdated crypto, like RC4 or MD5.  Instead, it is using exactly the same 
>crypto algorithms and key sizes as draft-ietf-tls-tls13.  Again, this seems 
>like a much better way forward than plaintext throughout the datacenter.

Russ
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to