[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Deprecate TLS1.0 support in emacs

From: Robert Pluim
Subject: Re: Deprecate TLS1.0 support in emacs
Date: Wed, 12 Jul 2017 18:10:01 +0200
User-agent: Gnus/5.13 (Gnus v5.13) Emacs/26.0.50 (gnu/linux)

Lars Ingebrigtsen <address@hidden> writes:

> Robert Pluim <address@hidden> writes:
>> TLS1.0 is a seriously insecure protocol. I refrained from doing what I
>> actually wanted to do, which is deprecate TLS1.1 as well. I think it's
>> a disservice to allow TLS1.0 to continue to be used.
> It's no more "insecure" to read lists.gnu.org via HTTPS than it is via
> HTTP, which is also an option.  Denying the former while allowing the
> latter is rather nonsensical.

This is not about reading lists.gnu.org specifically, this is about
all TLS protocol use from emacs. That should not use protocols that
contain known serious security flaws if we can avoid it. When you
choose to use https you have an expectation of security, unlike with
http, so we should attempt to fulfill that expectation.

> And if it had been available only via HTTPS, then refusing Emacs users
> to access it would also have a security impact: Refusing access to
> information is not "security", but the opposite.

There is no refusal of access, just refusal of a specific protocol. If
we implement your suggestion from below there won't even be refusal.

>> That could be done with nsm, but only if you'll accept setting the
>> default network-security-level to 'high, or adding a specific check
>> for protocol version at 'medium. Option 1 looks something like this:
> No, `high' should be reserved for people that want higher than normal
> network security.

OK, then we should integrate a check like this into `medium'. TLS1.0
should be warned about in the default configuration. I'd argue that
TLS1.1 should be as well, but we can always revisit that later.

I'll see if I can come up with a patch tomorrow.

> It might make sense to warn for TLS1.0 on `medium', though, but I'd have
> to check what other web browsers do here.  I think, for instance, that
> Firefox still supports TLS1.0, and gives no warning, either.  So unless
> I've misunderstood the Firefox situation, I don't think we should do
> anything here.

Firefox still allows TLS1.0, unless you configure it in paranoid mode,
like yours truly.

> More long-term, I think it may make sense to just treat these "insecure"
> protocols as if they were unencrypted, user interface wise, but that
> would be up to each individual application (eww, package-list, etc) and
> not further down in the network stack?  Perhaps?

No, we should just attempt to eradicate the use of TLS1.0 (and
TLS1.1), not allow people to keep using them :-)

I appreciate that's a strong opinion, but I definitely think we should
strongly encourage people to move away from both of these protocols.


reply via email to

[Prev in Thread] Current Thread [Next in Thread]