Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
Do You Need to Implement TLS 1.3 Right Now?
July 30, 2019 •Walt Paley
No, you don’t need to implement TLS 1.3 right now. (Shortest blog post ever.)
But if you're curious why not, keep reading!
TLS 1.3 is a great step. A natural progression. An obvious upgrade over TLS 1.2. It’s 0.1 better, after all!
It’s also overrated, aggravating, and much ado about - well, very little, depending on who you ask.
At the International Cryptographic Module Conference in Vancouver this spring, a panel was moderated by Tim Hudson (of OpenSSL and Cryptsoft) and featuring Matt Caswell (OpenSSL), Brent Cook (LibreSSL), Chris Conlon (WolfSSL), and David Hook (Bouncy Castle). It had been scheduled in conflict with a very popular session and was relegated to a smaller room away from the main lecture hall. I made sure to attend anyway, and I was not disappointed. The quality of the discussion and the candor of the panelists was eye-opening.
Hudson kicked off the slide deck with a Cloudflare analysis of TLS deployments in the wild. The slide showed a pie chart with 74% of connections still made using TLS 1.2, while 21% had upgraded to 1.3. OpenSSL’s Caswell began the conversation by noting that there was no need to rush into the transition, let alone panic, while Bouncy Castle’s Hook noted skepticism that the connections reported as TLS 1.3 in production deployment were actually TLS 1.3. These first two comments really set the tone for the session.
LibreSSL’s Cook took a minute to interject that TLS 1.2 configurations today are actually quite strong. He continued to describe that while five years ago, vulnerabilities may have been a concern, today’s TLS 1.2 has already been fortified and he believes 1.3 to be only marginally better, if at all. He asked the audience “who really wants 1.3 to succeed?” before suggesting that it might be Google advancing the narrative as much as anyone else. He also suggested mobile corporations could be a winner from expanded TLS 1.3 usage, as they would benefit from higher latency. An audience member posited that browsers benefit, specifically from protecting their ad revenue from MITM attacks. Not exactly the altruistic beneficiaries that may have been imagined.
Tim Hudson and Matt Caswell, teammates on OpenSSL, went on to agree that TLS 1.3 provides forced configurations that reflect widely accepted best practices… but that competent engineers would have already configured their TLS 1.2 deployments that way. WolfSSL’s Chris Conlon suggested that it made sense for new architectures to include TLS 1.3 for futureproofing, but that he didn’t see an impetus to tear out existing TLS 1.2 configurations as long as they had been maintained properly.
David Hook chimed in again, noting that as an industry, we are making significant mistakes with TLS 1.3 in the form of design, configuration, implementation, and deployment. The gotcha is that we don’t know which decisions are the mistakes at this point. Maybe in another 12 months, he thought, we might have a better idea of what’s working and what’s not.
In support of this wait-and-see approach, Matt Caswell commented that the OpenSSL project added TLS 1.3 too soon. He said that they could have waited… and probably should have. Brent Cook echoed this sentiment, adding that the LibreSSL team recognized significant costs associated with being early adopters. Specifically, they were making additions to the code as quickly as possible, only to spend more time reverting back to previous versions and making changes to those newest additions. They began enforcing a 2 week delay on TLS updates, just to be sure that patches were going to stick. Even Conlon offered more insight into the growing pains, saying that half of the people trying TLS 1.3 with WolfSSL were running into major issues. Even more telling, the only people experimenting with TLS 1.3 were outliers, not mainstream production.
Possibly the most disturbing part of the session was Caswell’s summary explanation of “middle boxes” and how a technical problem with the handshake was solved with old technology and an alteration to the TLS 1.3 standard. (Give that a Google if you dare.)
I came away from the panel believing that TLS 1.3 has become something of a mirage based on FUD and FOMO. Everyone on the industry side is convinced that they are the only ones that aren’t deploying it, so they are stressing out and sounding the alarms. Meanwhile, relatively few are actually tackling it, and they are stressing out because it is a struggle. Those gains in performance and the all-important future-proofing? They can wait a few more months for the terrain to even out. Don’t worry, we’ll get there as an industry. It just doesn’t have to be today.
Even more complicated, if you’re here and reading this blog, you have concerns about TLS 1.3 in conjunction with FIPS 140-2 validation. OpenSSL continues to be the most common architecture, and rest assured that until they release their version 3.0, which has been promised to support both TLS 1.3 and FIPS mode, TLS 1.3 cannot become table stakes. OpenSSL’s 1.1.x version supports TLS 1.3, thanks to Matt Caswell and his teammates’ efforts and tolerance of frustration, while their legacy 1.0.2x version supports FIPS. There is no option that does both yet. Some vendors have taken on the overhead of building two SKUs, deploying each version respectively, so that they can offer TLS 1.3 and FIPS 140-2…. but the fine print will reveal that buyers must choose between them.
Our recommendation? Sit tight.
Fear of missing out is a powerful motivator, but there are logical reasons to bide your time. When OpenSSL releases version 3.0, it will kickstart the ubiquity of TLS 1.3, and SafeLogic will release our architecturally compatible version of CryptoComply at the same time. Save your engineering cycles for this major step forward. Your marketing team might hassle you a little bit for not competing on TLS 1.3 just yet, but you can give them a strong technical narrative to counteract your rivals, since you just read this blog. Sometimes the best action is no action, and this is one of those times.
Don’t get lured into investing hundreds of hours to shoe-horn TLS 1.3 into a custom solution that will quickly become obsolete, or investing in a proprietary stack that condemns you to vendor lock-in. When the leading developers in the open source cryptographic community voice regret that they had acted too soon, it’s smart to listen. Be patient, stay the course, and be diligent in your TLS 1.2 configuration in the meantime.
Walt Paley
Walter Paley is the VP of Communications for SafeLogic. He is responsible for strategy, content, marketing, and outreach. Walt has worked with a series of start-ups and companies in growth stages, including Nukona (acquired by Symantec), Qubole, Bitzer Mobile (acquired by Oracle), and TigerText, among others. An Alumnus of the psychology program at UC San Diego, Walt lives in Southern California with his wife, kids, and their black lab, Echo.
Popular Posts
Search for posts
Tags
- FIPS 140 (111)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (18)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- post-quantum cryptography (11)
- Cloud (9)
- PQC (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- OpenSSL 3.x (3)
- POA&M (3)
- TLS 1.3 (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)