I know of a number of large enterprises in verticals including financial, health care, retail, and government, across multiple countries, who are using packet payload inspection within their data centers. Most of these enterprises are reluctant to step forward in a public forum and reveal their internal network structure and their internal security and monitoring practices. This gives the false impression that out of band decryption of TLS is not a big deal. It is in fact mission critical to a significant number of large enterprises.
I have been saying to anyone who will listen that the IETF needs a private forum for enterprises, to enable them to come forward and discuss their real requirements. Without this input the IETF is trying to architect and engineer solutions without knowing the complete set of requirements, at least on the enterprise side. This results in sub-optimal design decisions (from an enterprise perspective), which in this case will break mission critical enterprise monitoring and troubleshooting systems. We've already experienced what a rollout of TLS 1.3 will be like, at more than one enterprise, when certain vendors decided to move Diffie Hellman ciphers to the top of their priority list on a code upgrade. This caused severity one outages of critical monitoring systems. This means that critical applications depend on these monitoring systems, and if the monitoring system is down the application is completely down. This is not the outcome we want when TLS 1.3 is rolled out, but it is what we are headed for. Enterprise monitoring should be tested as part of the operational TLS 1.3 testing before TLS 1.3 is approved as a standard, and TLS 1.3 should not be approved if enterprise monitoring breaks. The only other option being presented to enterprises is that we continue to run on a TLS spec that is nine years old, and then continue running it until it is 14 to 19 years old. It makes no sense to me to put out a TLS 1.3 standard, but say that enterprises cannot upgrade to it. > On Oct 19, 2017, at 5:37 PM, Christian Huitema <huit...@huitema.net> wrote: > >> On 10/19/2017 3:30 PM, Darin Pettis wrote: >> >> The amount of people currently voicing concern is likely small for two >> reasons. One is that everything is public and many of the "lurkers" >> are hesitant to voice their concerns. The second reason is that so >> many don't know that visibility will be an issue. They will either >> discover this as they migrate to TLS 1.3 or as they start to encrypt >> within their data center. There is work to rapidly raise that >> awareness through roundtables, conferences and other venues. > > Might it be because many of these enterprises and data centers do not in > fact see encryption as a problem? Maybe they have found ways to manage > their applications and servers without breaking TLS... > > -- > Christian Huitema > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls