This thread blew up rather quickly. Replying on a topic with quotes from 
various posts, below:

On Saturday, July 08, 2017 05:09:12 am Stephen Farrell wrote:
> On 08/07/17 03:06, Ackermann, Michael wrote:
> > Converting all session traffic to clear text is not a viable
> > alternative for ANY enterprises or industries that I am aware of.

Could we please drop the plaintext straw man here? The alternative is building 
a system that doesn't rely on outdated methods, rather than shoe-horning them 
into TLS 1.3, not ditching encryption.

> > In
> > particular those in financial sectors. Security policies, legislation
> > and in many cases just good practice would not allow for this. We are
> > compelled by these factors to encrypt all data in motion.  But we
> > still need to manage our applications, networks, servers and clients.
> > Hence the need to decrypt traffic as outlined in this draft.
> 
> That assertion of necessity is blatantly false.
> 
> It is entirely feasible to decrypt and re-encrypt in many
> cases and for that to be efficient and to meet regulatory
> needs.
> 
> If some systems are so badly designed that doing that while
> updating to tls1.3 is a showstopper then that's down to bad
> design or other bad practices. Fixing those is the place to
> spend effort instead of spending effort on breaking TLS.
> 
> Other users of TLS ought not suffer on the basis of such
> bad reasoning.

+1

It is not the job of the TLS WG to make handling internal requirements of 
organizations easier with their existing systems in spite of the obvious risks 
that can be avoided.

A drop-in replacement for a theoretically legitimate usecase is also a drop-in 
replacement for very much illegitimate usecases. Making this a standard is not 
the way to go here. An argument could be made for informational RFC status 
rather than standards track, but even then, it's dangerous.

On Saturday, July 08, 2017 01:39:43 pm Watson Ladd wrote:
> On Sat, Jul 8, 2017 at 10:17 AM, Stephen Farrell
> <stephen.farr...@cs.tcd.ie> wrote:
> > Is it bad faith if the server is compelled to enable this
> > wiretap interface? For a wiretapper this is a great scheme,
> > as they only need to force it to be turned on and accept a
> > tiny bit of data and then they can pick up those packets
> > from anywhere without having to deal with problems at the
> > web server end. So no need to even re-imburse the web server
> > for the intercepted access anymore.
> 
> The same applies to static RSA ciphersuites. I understand your desire
> to move on with TLS 1.3, but we did burn what seemed to be a somewhat
> important usecase to some people, and this draft demonstrates that TLS
> 1.3 can be deployed in datacenters without hurting that usecase. As
> much as I think enterprise networks are suffering from bad design
> decisions that solve problems with boxes and not endpoint changes,
> this is a problem people are claiming to face, and there are some
> security implications.

The organizations that took the easy way at the time now are being told to take 
a harder way that is more secure. (and are consistently posting to this list 
with amnesia, acting like we told them to use plaintext) They don't like that; 
we shouldn't care. We should consider standardizing better solutions for this 
problem, without regard to how much old systems will have to adapt their 
design. This has come up on this list MANY times, and each time the end result 
of discussion was to not revert security decisions made to improve TLS. 
Releasing a standards track (or even informational) RFC on how to do exactly 
that using all the old methods, with some tweaks, defeats the purpose of making 
those security decisions.

I'm getting a bit of déjà vu from this thread, and think the same answer should 
come as from previous threads on the topic: no, please come up with something 
new. I don't see the proposed document being anywhere close to getting 
consensus for adoption by the TLS WG. For the stubborn, an (independent) 
informational RFC would get far less (but nontrivial) opposition.


Dave


PS
Please avoid the "but they'll do whatever they want anyway" comebacks. If the 
response to not accommodating static keys anymore is to stay with TLS 1.2 
forever, then at least they'll be open in their desire to avoid change at all 
costs. We should not treat this like a hostage scenario.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to