RE: ACTION-426: strong and weak TLS algorithms (incorporateISSUE-128text)

This is really quite late response but in looking at

Network Working Group                                          T.
Dierks
Request for Comments: 4346
Independent
Obsoletes: 2246                                              E.
Rescorla
Category: Standards Track                                     RTFM,
Inc.
                                                              April
2006


              The Transport Layer Security (TLS) Protocol
                              Version 1.1


Appendix 5 notes ciphersuite definitions that are not considered secure

http://tools.ietf.org/html/rfc4346#appendix-A.5

 

-----Original Message-----
From: Thomas Roessler [mailto:tlr@w3.org] 
Sent: Wednesday, June 11, 2008 2:08 PM
To: Doyle, Bill
Cc: stephen.farrell@cs.tcd.ie; pbaker@verisign.com;
johnath@mozilla.com; yngve@opera.com; public-wsc-wg@w3.org
Subject: Re: ACTION-426: strong and weak TLS algorithms
(incorporateISSUE-128text)

For context:
http://www.w3.org/2006/WSC/drafts/rec/rewrite.html#def-strong-algos

On 2008-06-11 13:46:06 -0400, Bill Doyle wrote:

> I like it -

Thanks.

> SSLv3 is deprecated - supported ciphers are no longer strong enough,
> industry moves forward.

I'm happy to add this one to the list of things that you really must
not consider strong.  Which brings me to another point:  It's
probably worth using RFC 2119 verbiage when we enumerate what's
considered weak or strong.  I've made that change in the latest
version, and would actually be tempted to change this further to say
that:

	SSLv3 SHOULD NOT be considered strong.

I also wonder if it's worth saying a word about MD5-based certs.

> Is the IETF grouping ciphers in a way that enables weak ciphers to be
> noted? Export grade is easy, not sure about others.

Not that I'd know.

Cheers,
-- 
Thomas Roessler, W3C  <tlr@w3.org>

Received on Monday, 14 July 2008 18:52:42 UTC