I also believe that it's ready.

On Fri, Apr 26, 2019 at 5:49 AM Daniel Migault
<daniel.miga...@ericsson.com> wrote:
>
> I believe the doc is fine as it is.
> Yours,
> Daniel
>
> On Thu, Apr 25, 2019 at 9:30 PM Viktor Dukhovni <ietf-d...@dukhovni.org> 
> wrote:
>>
>> > On Apr 12, 2019, at 7:28 PM, Christopher Wood <c...@heapingbits.net> wrote:
>> >
>> > This is the working group last call for the "Deprecating TLSv1.0 and 
>> > TLSv1.1” draft available at:
>> >
>> >    https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprecate/
>> >
>> > Please review the document and send your comments to the list by April 26, 
>> > 2019.
>>
>> My concern is whether the time is yet nigh for TLS 1.0 to be disabled
>> in opportunistic TLS in SMTP, or whether TLS 1.0 remains sufficiently
>> common to cause deprecation to do more harm than good via unnecessary
>> downgrades to cleartext.
>>
>> I don't have survey numbers for SMTP TLS protocol versions across MTAs
>> generally to shed light on this, perhaps someone does.  What I do have
>> is numbers for those MTAs (not a representative sample) that have DANE
>> TLSA records (so presumably a greater focus on security).
>>
>> The observed version frequencies are approximately:
>>
>>         TLS 1.0:  1%
>>         TLS 1.1:  0%
>>         TLS 1.2: 87%
>>         TLS 1.3: 12%
>>
>> essentially regardless of whether I deduplicate by name, IP or name and IP.
>> The respective sample sizes are 5435, 6938 and 7959.
>>
>> So if a DANE-enabled sender were to disable TLS 1.0 today, approximately
>> 1% of the destination MX hosts would be broken and need remediation.  These
>> handle just of 189 mostly small SOHO domains out of the ~1.1 million total
>> DANE SMTP domains, but four handle enough email to show up on the Gmail
>> SMTP transparency report:
>>
>>   tu-darmstadt.de
>>   t-2.net
>>   t-2.com
>>   t-2.si
>>
>> So on the whole, the draft should proceed, but some caution may be 
>> appropriate
>> outside the browser space, before operators start switching off TLS 1.0 
>> support.
>>
>> I don't see an operational considerations section.  Nor much discussion of
>> "less mainstream" (than Web browser) TLS application protocols.  Would a few
>> words of caution be appropriate, or is it expected that by the time the RFC
>> starts to change operator behaviour the "market share" of TLS 1.0 will be
>> substantially lower than I see today even with SMTP, XMPP, NTTP and the like.
>>
>> [ I would speculate that TLS 1.0's share is noticeably higher among MTAs
>>   generally than among the bleeding-edge MTAs that have published DANE TLSA
>>   RRs. ]
>>
>> --
>>         Viktor.
>>
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to