Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-03-10 Thread Nimrod Aviram
> Authors, can you please update the document (and fix the clarification that Ekr recently raised) at your convenience? Sure, I'll start working on it. best, Nimrod On Fri, 10 Mar 2023 at 03:35, Christopher Wood wrote: > First, let us apologize for taking so long to conclude this consensus >

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-03-09 Thread Christopher Wood
First, let us apologize for taking so long to conclude this consensus call. We should have closed this much sooner. After reviewing the responses on the mailing list, and taking into consideration discussions that took place during meetings, it is our assessment that there is rough consensus

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-01-03 Thread Peter Gutmann
Hubert Kario writes: >Because there are software stacks that allow configuration of arbitrary >parameters for FFDH (see GnuTLS, OpenSSL), and there are software stacks that >generate one public key share and reuse it for a long time, or allow >configuration of this kind of behaviour (see old

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-01-03 Thread Hubert Kario
On Tuesday, 3 January 2023 11:33:39 CET, Peter Gutmann wrote: Hubert Kario writes: It's also easy and quick to verify that the server *is* behaving correctly and thus is not exploitable. It's also a somewhat silly issue to raise, if we're worried about a server using deliberately broken

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-01-03 Thread Peter Gutmann
Hubert Kario writes: >It's also easy and quick to verify that the server *is* behaving correctly >and thus is not exploitable. It's also a somewhat silly issue to raise, if we're worried about a server using deliberately broken FFDHE parameters then why aren't we worried about the server

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-01-03 Thread tom.ripe
On 14/12/2022 04:08, Peter Gutmann wrote: Blumenthal, Uri - 0553 - MITLL writes: I do not support deprecation, because there will be deployed devices (IoT, SCADA) that aren’t upgradable – and the new stuff will have to access them. It's actually much worse than just SCADA, there are

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-01-03 Thread tom.ripe
On 02/01/2023 13:55, Hubert Kario wrote: On Saturday, 24 December 2022 02:10:08 CET, Rob Sayre wrote: Maybe it would help if the chairs could clarify the difference between "deprecated" and "prohibited" / "forbidden". I think these words have straightforward definitions, and I find many

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-01-02 Thread Rob Sayre
On Mon, Jan 2, 2023 at 5:55 AM Hubert Kario wrote: > > The problem is not the language, but how the word "deprecated" is used by > different regulatory bodies. > I'm not sure what you're referring to, or why they wouldn't understand the definition of the word, but maybe a longer explanation

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-01-02 Thread Hubert Kario
On Monday, 2 January 2023 17:32:26 CET, Nimrod Aviram wrote: It's also easy and quick to verify that the server *is* behaving correctly and thus is not exploitable. Could you please help me understand how you propose to verify this? For example, assuming an SMTP server that presents a

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-01-02 Thread Viktor Dukhovni
On Mon, Jan 02, 2023 at 06:32:26PM +0200, Nimrod Aviram wrote: > (To concede a point in advance: It is obviously possible to _assume_ that > if the server presents a modulus, then it "must" be a safe prime, or it > meets some desired security notion that the server operator has deemed >

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-01-02 Thread Nimrod Aviram
> It's also easy and quick to verify that the server *is* behaving correctly and thus is not exploitable. Could you please help me understand how you propose to verify this? For example, assuming an SMTP server that presents a (presumably) custom-generated safe prime. My understanding is that this

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-01-02 Thread Hubert Kario
On Saturday, 24 December 2022 02:10:08 CET, Rob Sayre wrote: Maybe it would help if the chairs could clarify the difference between "deprecated" and "prohibited" / "forbidden". I think these words have straightforward definitions, and I find many responses to be disrespectful in insisting

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2023-01-02 Thread Hubert Kario
On Thursday, 22 December 2022 23:26:26 CET, Carrick Bartle wrote: the latter is basically unexploitable with properly behaving hosts in TLSv1.2 Well, right, that's the trick. The issue that people have pointed out with FFDHE is that it's very easy to have a host that is not properly behaving

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-23 Thread Rob Sayre
Maybe it would help if the chairs could clarify the difference between "deprecated" and "prohibited" / "forbidden". I think these words have straightforward definitions, and I find many responses to be disrespectful in insisting that "deprecated" means something it does not. But maybe this is an

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-22 Thread Carrick Bartle
> Telling people that they shouldn't use the only things they can use means that the advice is unactionable, thus will be ignored. Yep, that's precisely what people are suggesting. If someone has a legacy system that cannot be upgraded, or they need to interface with such systems, they can ignore

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-22 Thread Carrick Bartle
> the latter is basically unexploitable with properly behaving hosts in TLSv1.2 Well, right, that's the trick. The issue that people have pointed out with FFDHE is that it's very easy to have a host that is not properly behaving (see RFC 7919, which is referenced in our draft). On Wed, Dec

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-22 Thread Rob Sayre
On Thu, Dec 22, 2022 at 6:10 AM Hubert Kario wrote: > On Wednesday, 21 December 2022 19:13:36 CET, Rob Sayre wrote: > > On Wed, Dec 21, 2022 at 5:59 AM Hubert Kario wrote: > > > > Telling people that they shouldn't use the only things they can use > means... > > > > Well, I'd be curious to know

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-22 Thread Blumenthal, Uri - 0553 - MITLL
100% support the BCP route. -- V/R, Uri On 12/22/22, 10:16, "TLS on behalf of Peter Gutmann" wrote: Hal Murray writes: >Would a BCP be a better approach? That might provide a good setting to >discuss the issues. There is no reason to limit a BCP to TLSv1.2 or FFDHE.

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-22 Thread Peter Gutmann
Hal Murray writes: >Would a BCP be a better approach? That might provide a good setting to >discuss the issues. There is no reason to limit a BCP to TLSv1.2 or FFDHE. That seems like a much better idea. A deprecate RFC can only say "no" while a BCP can cover alternatives, in this situation

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-22 Thread Hal Murray
> What I'm against is blanket forbidding of FFDHE in TLSv1.2. The subject says "deprecate". That seems to have caused much of the discussion. Would a BCP be a better approach? That might provide a good setting to discuss the issues. There is no reason to limit a BCP to TLSv1.2 or FFDHE.

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-22 Thread Hubert Kario
On Wednesday, 21 December 2022 19:13:36 CET, Rob Sayre wrote: On Wed, Dec 21, 2022 at 5:59 AM Hubert Kario wrote: Telling people that they shouldn't use the only things they can use means... Well, I'd be curious to know what the use cases are. The stuff Uri Blumenthal already mentioned:

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-21 Thread Viktor Dukhovni
On Thu, Dec 22, 2022 at 05:56:50AM +, Peter Gutmann wrote: > John Mattsson writes: > > >A more reasonable approach would be to deprecate all cipher suites without > >_ECDHE_. > > > >While the WG is in deprecation mode, please deprecate all non-AEAD cipher > >suites as well. RFC 7540 did

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-21 Thread Peter Gutmann
John Mattsson writes: >A more reasonable approach would be to deprecate all cipher suites without >_ECDHE_. > >While the WG is in deprecation mode, please deprecate all non-AEAD cipher >suites as well. RFC 7540 did this 7.5 years ago... An even more reasonable approach would be to mandate EMS,

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-21 Thread Carrick Bartle
Sounds good, thanks! On Mon, Dec 19, 2022 at 3:46 PM Rob Sayre wrote: > On Mon, Dec 19, 2022 at 2:52 PM Martin Thomson wrote: > >> On Tue, Dec 20, 2022, at 09:34, Carrick Bartle wrote: >> >> You might need to clarify that TLS 1.1 and earlier are wholly >> deprecated though, just to be sure. >>

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-21 Thread Rob Sayre
On Wed, Dec 21, 2022 at 5:59 AM Hubert Kario wrote: > > Telling people that they shouldn't use the only things they can use > means... > Well, I'd be curious to know what the use cases are. But I would also say this might be enough:

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-21 Thread John Mattsson
devices are labeled depracated. Cheers, John From: TLS on behalf of Hubert Kario Date: Wednesday, 21 December 2022 at 14:59 To: Martin Thomson Cc: tls@ietf.org Subject: Re: [TLS] consensus call: deprecate all FFDHE cipher suites On Tuesday, 20 December 2022 23:56:22 CET, Martin Thomson wrote

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-21 Thread Hubert Kario
On Tuesday, 20 December 2022 23:56:22 CET, Martin Thomson wrote: On Tue, Dec 20, 2022, at 23:52, Hubert Kario wrote: use of FFDHE with large key sizes is the best protection against store-and-decrypt-later attacks This doesn't deprecate use of FFDHE in TLS 1.3, for which we have some

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-21 Thread Hubert Kario
On Tuesday, 20 December 2022 19:37:14 CET, Rob Sayre wrote: On Tue, Dec 20, 2022 at 4:53 AM Hubert Kario wrote: Thus the deprecation of it is a matter of taste, not cryptographic necessity. I'm sorry if I'm being dense here, but isn't all of this a SHOULD NOT in RFC 9325?

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-20 Thread Rob Sayre
On Tue, Dec 20, 2022 at 2:56 PM Martin Thomson wrote: > On Tue, Dec 20, 2022, at 23:52, Hubert Kario wrote: > > use of FFDHE with large key sizes is the best protection against > > store-and-decrypt-later attacks > > This doesn't deprecate use of FFDHE in TLS 1.3, for which we have some >

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-20 Thread Martin Thomson
On Tue, Dec 20, 2022, at 23:52, Hubert Kario wrote: > use of FFDHE with large key sizes is the best protection against > store-and-decrypt-later attacks This doesn't deprecate use of FFDHE in TLS 1.3, for which we have some ludicrously large named groups. Is that not enough? > If anything,

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-20 Thread Rob Sayre
On Tue, Dec 20, 2022 at 4:53 AM Hubert Kario wrote: > Thus the deprecation of it is a matter of taste, not > cryptographic > necessity. > I'm sorry if I'm being dense here, but isn't all of this a SHOULD NOT in RFC 9325?

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-20 Thread Hubert Kario
I oppose deprecation. Given that we're still a ways off from standardised post-quantum key exchanges, use of FFDHE with large key sizes is the best protection against store-and-decrypt-later attacks (buying likely years of additional protection) I think the deprecation is premature. While

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-19 Thread Rob Sayre
On Mon, Dec 19, 2022 at 2:52 PM Martin Thomson wrote: > On Tue, Dec 20, 2022, at 09:34, Carrick Bartle wrote: > >> You might need to clarify that TLS 1.1 and earlier are wholly > deprecated though, just to be sure. > > > > We do mention that in the body of the document. Are you suggesting that >

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-19 Thread Martin Thomson
On Tue, Dec 20, 2022, at 09:34, Carrick Bartle wrote: >> You might need to clarify that TLS 1.1 and earlier are wholly deprecated >> though, just to be sure. > > We do mention that in the body of the document. Are you suggesting that > we also add that to the abstract and intro? Oh yeah, three

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-19 Thread Carrick Bartle
> You might need to clarify that TLS 1.1 and earlier are wholly deprecated though, just to be sure. We do mention that in the body of the document. Are you suggesting that we also add that to the abstract and intro? On Sun, Dec 18, 2022 at 2:55 AM Martin Thomson wrote: > On Sun, Dec 18, 2022,

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-19 Thread Carrick Bartle
15 > *To: *David Benjamin > *Cc: *TLS List > *Subject: *Re: [TLS] consensus call: deprecate all FFDHE cipher suites > > > > Hi David, > > > > My understanding is that we're only discussing deprecating DHE for 1.2. > 1.3 is out of scope for this document. > > > &

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-18 Thread Martin Thomson
On Sun, Dec 18, 2022, at 04:33, Yaron Sheffer wrote: > Yes, this is clear to people on this thread. My comment was just about > the document, which IMO should define its scope more clearly and early > on. The title and abstract and introduction could say "TLS 1.2" and the document would be

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-17 Thread Yaron Sheffer
List Subject: Re: [TLS] consensus call: deprecate all FFDHE cipher suites It is, however, mentioned throughout the actual text of the document, assuming we're both looking at draft-ietf-tls-deprecate-obsolete-kex-01. I think the document describes its current change just fine. I asked only

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-17 Thread David Benjamin
artle < > cbartle...@gmail.com> > *Date: *Thursday, 15 December 2022 at 20:15 > *To: *David Benjamin > *Cc: *TLS List > *Subject: *Re: [TLS] consensus call: deprecate all FFDHE cipher suites > > > > Hi David, > > > > My understanding is that we'r

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-17 Thread Yaron Sheffer
on behalf of Carrick Bartle Date: Thursday, 15 December 2022 at 20:15 To: David Benjamin Cc: TLS List Subject: Re: [TLS] consensus call: deprecate all FFDHE cipher suites Hi David, My understanding is that we're only discussing deprecating DHE for 1.2. 1.3 is out of scope

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-17 Thread Nimrod Aviram
I'm not sure such an implicit approach best serves everyone's interests... Vendors would be better served if we explicit communicate expected timelines for deprecation, and expected timelines where maintaining support is a "must"/MUST/SHOULD. And this WG would be better served if we have

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-16 Thread Viktor Dukhovni
On Tue, Dec 13, 2022 at 09:46:29AM -0500, Sean Turner wrote: > This message starts the process to judge whether there is consensus to > deprecate all FFDHE cipher suites including those well-known groups. > Please indicate whether you do or do not support deprecation of FFDHE > cipher suites by

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-16 Thread Rob Sayre
On Fri, Dec 16, 2022 at 3:22 AM Peter Gutmann wrote: > Saying > "lalalalala I'm not listening, I'm not listening" won't deal with the fact > that there's a staggering amount of gear out there with product lifecycles > sometimes measured in decades that needs a sound basis for making decisions >

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-16 Thread Carrick Bartle
The fact that there are long product lifecycles makes the case for deprecation rather than against it. Imagine that we do not deprecate DHE. That means that next year, someone will be fully within the standard to create a long-lived product that uses DHE with TLS 1.2 and nothing more secure than

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-16 Thread Russ Housley
There have been attempts in the past to signal this to product planners: SHOULD+This term means the same as SHOULD. However, it is likely that an algorithm marked as SHOULD+ will be promoted at some future time to be a MUST. SHOULD-This term means the

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-16 Thread Nimrod Aviram
> There needs to be some plan with a schedule that gives downstream users time to get their act in gear. I agree. And the schedule should also allow for deprecation in a reasonable timeline. > Should there be an IETF group to help coordinate things like this? I think it'd be better if each group

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-16 Thread Peter Gutmann
Rob Sayre writes: >For my part, I'm sick of "IoT" or "SCADA" or "embedded" vendors just >endlessly keeping old cipher suites alive. The unwise cost-cutting in those >areas does not constrain the rest of the internet. And for my part I'm... well not really sick of but resigned to accepting the

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-15 Thread Loganaden Velvindron
On Fri, Dec 16, 2022, 11:41 Hal Murray wrote: > > say...@gmail.com said: > > For my part, I'm sick of "IoT" or "SCADA" or "embedded" vendors just > > endlessly keeping old cipher suites alive. The unwise cost-cutting in > those > > areas does not constrain the rest of the internet. > > Agreeded,

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-15 Thread Hal Murray
say...@gmail.com said: > For my part, I'm sick of "IoT" or "SCADA" or "embedded" vendors just > endlessly keeping old cipher suites alive. The unwise cost-cutting in those > areas does not constrain the rest of the internet. Agreeded, but the software maintainers can't just drop support for X

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-15 Thread Rob Sayre
On Thu, Dec 15, 2022 at 4:27 PM Peter Gutmann wrote: > > It seems the only real reason for deprecating DHE is that it's not > fashionable. This kind of discourse isn't cool. If there are good ways to show that FFDHE cipher suites are ok, let's document them. > And as my earlier message

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-15 Thread Carrick Bartle
> without further guidance they've chosen to go with literally the worst possible option instead of the perfectly-OK one. You are more than welcome to draft a document stating that, given two deprecated options, which is preferable. > It seems the only real reason for deprecating DHE is that it's

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-15 Thread Peter Gutmann
Carrick Bartle writes: >In the situation you've described, they've been told they shouldn't use RSA >either, so clearly it doesn't matter to them what we've deprecated or not. Yup, because if you give people the choice between not A but not B either then they have to ignore one of the two, and

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-15 Thread Carrick Bartle
In the situation you've described, they've been told they shouldn't use RSA either, so clearly it doesn't matter to them what we've deprecated or not. We should deprecate insecure algorithms; the fact that there's a spectrum of insecurity among deprecated algorithms does not detract from the fact

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-15 Thread Carrick Bartle
> Wouldn’t be the first case an RFC gets misinterpreted. I don't think the IETF's decisions should be dictated by the risk that someone might potentially misread their documents. That's always a risk. Someone might misread RFC 8446 as saying "use SSL 3.0 only." Does that mean the IETF shouldn't

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-15 Thread Carrick Bartle
not support deprecation, because there will be deployed devices (IoT, > SCADA) that aren’t upgradable – and the new stuff will have to access them. > > > > I’ll spare the group my personal opinion about this draft. > > -- > > V/R, > > Uri > > > > > >

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-15 Thread Carrick Bartle
Hi David, My understanding is that we're only discussing deprecating DHE for 1.2. 1.3 is out of scope for this document. Carrick On Tue, Dec 13, 2022 at 10:06 AM David Benjamin wrote: > Small clarification question: is this about just FFDHE in TLS 1.2, i.e. > the TLS_DHE_* cipher suites, or

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-14 Thread Blumenthal, Uri - 0553 - MITLL
True - but, unfortunately, quite a few readers misunderstand that and use depreciation as an excuse to remove support of deprecated algorithms and protocols. Wouldn’t be the first case an RFC gets misinterpreted. Regards,UriOn Dec 14, 2022, at 02:30, Rob Sayre wrote:On Tue, Dec 13, 2022 at 8:14

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-14 Thread Ilari Liusvaara
On Tue, Dec 13, 2022 at 03:51:33PM +, Blumenthal, Uri - 0553 - MITLL wrote: > I do not support deprecation, because there will be deployed devices > (IoT, SCADA) that aren’t upgradable – and the new stuff will have to > access them. Any stuff that needs to access such devices already has to

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-14 Thread Peter Gutmann
Nimrod Aviram writes: >Let me clarify that the document also has RSA as a MUST NOT. > >So there will be no reason to read this document and switch from FFDHE to >RSA. If you tell people they can't have A but they can't have B either then they're going to have to choose one of the two in order

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-14 Thread Nimrod Aviram
Let me clarify that the document also has RSA as a MUST NOT. So there will be no reason to read this document and switch from FFDHE to RSA. On Wed, 14 Dec 2022 at 06:09, Peter Gutmann wrote: > Blumenthal, Uri - 0553 - MITLL writes: > > >I do not support deprecation, because there will be

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-13 Thread Rob Sayre
On Tue, Dec 13, 2022 at 8:14 PM Blumenthal, Uri - 0553 - MITLL < u...@ll.mit.edu> wrote:\ > > > I think I’ve made my point already – there are devices that use FFDHE, > which remain secure (so far), and may require access by new . > Thus, an RFC that would prohibit it, sounds, as you said

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-13 Thread Blumenthal, Uri - 0553 - MITLL
o: Sean Turner , Ira McDonald Cc: TLS List Subject: Re: [TLS] consensus call: deprecate all FFDHE cipher suites Hi, Yes - I support deprecating all FFDHE cipher suites including well-known groups. Cheers, - Ira On Tue, Dec 13, 2022 at 9:46 AM Sean Turner wrote: During the

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-13 Thread Peter Gutmann
Blumenthal, Uri - 0553 - MITLL writes: >I do not support deprecation, because there will be deployed devices (IoT, >SCADA) that aren’t upgradable – and the new stuff will have to access them. It's actually much worse than just SCADA, there are deployments in things like wholesale banking where

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-13 Thread Rob Sayre
ll spare the group my personal opinion about this draft. > > -- > > V/R, > > Uri > > > > > > *From: *TLS on behalf of Ira McDonald < > blueroofmu...@gmail.com> > *Date: *Tuesday, December 13, 2022 at 10:47 > *To: *Sean Turner , Ira McDonald > *Cc:

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-13 Thread Blumenthal, Uri - 0553 - MITLL
: deprecate all FFDHE cipher suites Hi, Yes - I support deprecating all FFDHE cipher suites including well-known groups. Cheers, - Ira On Tue, Dec 13, 2022 at 9:46 AM Sean Turner wrote: During the tls@IETF 115 session topic covering draft-ietd-tls-deprecate-obsolete-kex, the sense

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-13 Thread Rob Sayre
; > > > > *From: *TLS on behalf of Ira McDonald < > blueroofmu...@gmail.com> > *Date: *Tuesday, December 13, 2022 at 10:47 > *To: *Sean Turner , Ira McDonald > *Cc: *TLS List > *Subject: *Re: [TLS] consensus call: deprecate all FFDHE cipher suites > > &

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-13 Thread David Benjamin
Small clarification question: is this about just FFDHE in TLS 1.2, i.e. the TLS_DHE_* cipher suites, or also the ffdhe* NamedGroup values as used in TLS 1.3? I support deprecating the TLS_DHE_* ciphers in TLS 1.2. Indeed, we removed them from Chrome back in 2016

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-13 Thread Salz, Rich
I support deprecating all of them. My reason is not because I think there are known weaknesses, but because we can remove code. There are apparently devices that cannot be updated to do this and that's okay. There are apparently devices that could not be upgraded to support TLS 1.3 and we

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-13 Thread Loganaden Velvindron
I support. On Tue, Dec 13, 2022, 18:47 Sean Turner wrote: > During the tls@IETF 115 session topic covering > draft-ietd-tls-deprecate-obsolete-kex, the sense of the room was that there > was support to deprecate all FFDHE cipher suites including well-known > groups. This message starts the

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-13 Thread Blumenthal, Uri - 0553 - MITLL
, December 13, 2022 at 10:47 To: Sean Turner , Ira McDonald Cc: TLS List Subject: Re: [TLS] consensus call: deprecate all FFDHE cipher suites Hi, Yes - I support deprecating all FFDHE cipher suites including well-known groups. Cheers, - Ira On Tue, Dec 13, 2022 at 9:46 AM Sean Turner

Re: [TLS] consensus call: deprecate all FFDHE cipher suites

2022-12-13 Thread Ira McDonald
Hi, Yes - I support deprecating all FFDHE cipher suites including well-known groups. Cheers, - Ira On Tue, Dec 13, 2022 at 9:46 AM Sean Turner wrote: > During the tls@IETF 115 session topic covering > draft-ietd-tls-deprecate-obsolete-kex, the sense of the room was that there > was support