Ilari Liusvaara wrote:
>
> Peter Gutmann wrote:
>
>> Salz, Rich <[email protected]> writes:
>> 
>>>> TLS needs an LTS version that you can just push out and leave to its own
>>>> devices
>>>
>>>So don't you have that with TLS 1.1 and appropriate cipher and option
>>>choices?
>> 
>> Based on the feedback I've had, I'm kinda tempted to do a TLS 1.2 LTS draft
>> that specifices just a single boolean flag, "use this known-good
>> configuration and not the 6.023e23 other ones and you should be good
>> for the next decade or so".  That can then be baked into long-term
>> systems and devices and left alone while people get on with other things.
> 
> To actually fix the known problems with TLS 1.2, you would at minimum
> need a new extension, since there is currently no way to fix the broken
> server authentication.

One Boolean signaling is sufficent to fix all of the problems.
one SCSV in the Client->Server direction and a TLS extension Boolean
response in ServerHello.


> 
> Then there are the other security fix extensions (at least three already).
> Those all would need to be impiled.
> 
> And then there is the TLS 1.2 Diffie-Hellman issue...

TLS 1.2LTS should fix them all at once, including:

   - promise to support minimum DHE key lengths >= 2048 bits
     whenever ClientHello includes DHE cipher suites

   - promise to support a certain small subset of EC curves
     and uncompressed point format whenever ClientHello includes
     ECDHE cipher suites (but may omit TLS extensions).

   - new/improved ServerKeyExchange handshake message, which
     does not only contain the reasonable set of DHE parameters,
     but also uses a digititally signed covering all prior
     handshake messages, not just the two hello randoms.

   - overriding any TLS record layer protocol version and
     ClientHello.client_version that is less than TLSv1.2

   - promise that digital signatures using SHA-256 are supported

   - fix the misunderstood semantics of the signature_algorithm extension
     so that it is only used as a hint to certificate selection,
     but *NEVER* seen as a hard requirement (or reason for server to
     abort the TLS handshake based on the signature of the server cert).


-Martin

_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to