diff options
author | Jack Lloyd <[email protected]> | 2019-03-18 20:53:49 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2019-03-18 20:54:57 -0400 |
commit | d80228999befd5047e219d33d95dae94f3c19833 (patch) | |
tree | f64ea1964cab2d8d6805a26547a6d3b88ab84403 /doc | |
parent | bb19424616f6ef9d382f9c31c465254626a7c714 (diff) |
Clean up TLS deprecation notices
Drop deprecation of CCM-8 as while ugly it is used by CoAP and even
still included in TLS v1.3
Diffstat (limited to 'doc')
-rw-r--r-- | doc/manual/deprecated.rst | 50 |
1 files changed, 28 insertions, 22 deletions
diff --git a/doc/manual/deprecated.rst b/doc/manual/deprecated.rst index 3cd7c8c70..23b4da44e 100644 --- a/doc/manual/deprecated.rst +++ b/doc/manual/deprecated.rst @@ -36,26 +36,6 @@ in the source. - Support for PathScale and HP compilers -- TLS: 3DES and SEED ciphersuites - -- TLS: Anonymous DH/ECDH ciphersuites - -- TLS: DHE-PSK ciphersuites - -- TLS: SRP ciphersuites. All available TLS-SRP suites use obsolete - ciphers. It would be better to instead perform a standard TLS - negotiation, then a PAKE authentication within the TLS channel. - -- TLS: DSA ciphersuites/certs - -- TLS: static RSA key exchange ciphersuites - -- TLS: CCM_8 ciphersuites - -- TLS: TLSv1.0 and v1.1, DTLS v1.0 - -- TLS: CBC ciphersuites - - Block ciphers CAST-256, Kasumi, MISTY1, and DESX. - CBC-MAC @@ -64,8 +44,6 @@ in the source. - GCM support for 64-bit tags -- Old (Google specific) ChaCha20 TLS ciphersuites - - Weak or rarely used ECC builtin groups including "secp160k1", "secp160r1", "secp160r2", "secp192k1", "secp192r1", "secp224k1", "secp224r1", "brainpool160r1", "brainpool192r1", "brainpool224r1", "brainpool320r1", @@ -74,3 +52,31 @@ in the source. - All built in MODP groups < 2048 bits - All pre-created DSA groups + +TLS Protocol Deprecations +--------------------------- + +The following TLS protocol features are deprecated and will be removed +in a future major release: + +- Support for TLSv1.0/v1.1 and DTLS v1.0 + +- All support for DSA ciphersuites/certificates + +- All CBC mode ciphersuites. This includes all available 3DES and SEED + ciphersuites. This implies also removing Encrypt-then-MAC extension. + +- All ciphersuites using DH key exchange (DHE-DSS, DHE-RSA, DHE-PSK, anon DH) + +- All ciphersuites using static RSA key exchange + +- All anonymous (DH/ECDH) ciphersuites. This does not include PSK and + ECDHE-PSK, which will be retained. + +- SRP ciphersuites. This is implied by the removal of CBC mode, since + all available SRP ciphersuites use CBC. To avoid use of obsolete + ciphers, it would be better to instead perform a standard TLS + negotiation, then a PAKE authentication within (and bound to) the + TLS channel. + +- OCB ciphersuites using 128-bit keys |