Re: [Last-Call] Results of Last Call: <draft-ietf-tls-oldversions-deprecate-09.txt> (Deprecating TLSv1.0 and TLSv1.1) to Best Current Practice

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12/8/20 9:07 PM, Stephen Farrell wrote:

(replying to ekr, but really a question for you...)

On 09/12/2020 01:55, Eric Rescorla wrote:

I'm curious, what do you think the point of having this update all the
other documents was if it wasn't to constrain implementations?

When answering that, can you clarify what you mean by
"constrain" and where there's a downside to your idea
of that? It's not clear to me at any rate.

Because the requested status was Best Current Practice, I didn't interpret this document as saying that implementations of TLS must prevent operators from enabling TLS versions prior to 1.2.  ("Best" implies that other practices can be chosen.)

The downside is that operators may effectively be forced to break interoperability with existing clients and/or servers, that provide essential functionality, if some of their software is upgraded to reflect the recommendations in draft-ietf-tls-oldversions-deprecate-09.   They may be forced to do this even when the operators have valid operational reasons for continuing to use TLS < 1.2, have explicitly evaluated the risks with doing so, used their exception processes to justify doing so, etc.   (Because it's generally not feasible to postpone upgrades indefinitely or sometimes even for a short time; there are often interdependencies that preclude doing that.)

Keith



-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux