(This was announced as a blog post yesterday.)
Primary eng (and PM) emails
Summary
Deprecate TLS 1.0 and 1.1 in Chrome, targeting removal in Chrome 81 (early 2020). During the deprecation period, sites using those protocols will show a warning in DevTools. After which, they will fail to connect if they have not upgraded to TLS 1.2 by then.
Motivation
TLS (Transport Layer Security) is the protocol which secures HTTPS. It has a long history stretching back to the nearly twenty-year-old TLS 1.0 and its even older predecessor, SSL. TLS 1.2, published ten years ago, addresses several weaknesses in TLS 1.0 and 1.1:
TLS 1.0 and 1.1 use MD5 and SHA-1, both weak hashes, in the transcript hash for the Finished message. TLS 1.2 switches this to SHA-2. (See the SLOTH attack.)
TLS 1.0 and 1.1 use MD5 and SHA-1 in the server signature (note this is not the signature in the certificate). TLS 1.2 makes this negotiable and adds SHA-2 as an option. (Also see the SLOTH attack.)
TLS 1.0 and 1.1 only support RC4 and CBC ciphers. RC4 is broken and has since been removed. TLS’s CBC mode construction is flawed and was vulnerable to a series of attacks, most recently Lucky13. TLS 1.2 introduces AEAD-based ciphers which avoid this and are more efficient.
TLS 1.0’s CBC ciphers additionally construct their initialization vectors incorrectly, making them vulnerable to the BEAST attack. TLS 1.1 fixed this.
Supporting TLS 1.2 is a prerequisite to avoiding the above problems. Additionally, the industry has been moving towards this deprecation. TLS 1.0 is no longer PCI-DSS compliant and the TLS working group has adopted a document to deprecate TLS 1.0 and 1.1.
Interoperability and Compatibility Risk
Once removed, sites that only support TLS 1.0 or 1.1 will fail to connect. The current usage is a little high (0.5%, see below), but we are providing an extended deprecation period. The target removal date is Chrome 81, due early 2020. Additionally, other browsers are also deprecating these protocols:
Edge: Supported, positive to removal
Firefox: Supported, positive to removal
Safari: Supported, positive to removal
Enterprise deployments can preview the TLS 1.0 and 1.1 removal today by setting the SSLVersionMin policy to “tls1.2”. For enterprise deployments that need more time, this same policy can be used to re-enable TLS 1.0 or TLS 1.1 until January 2021.
Alternative implementation suggestion for web developers
Sites should enable TLS 1.2 or later. We also encourage all sites to revisit their TLS configuration. Our current criteria for modern TLS is the following:
TLS 1.2 or later.
An ECDHE- and AEAD-based cipher suite. AEAD-based cipher suites are those using AES-GCM or ChaCha20-Poly1305. ECDHE_RSA_WITH_AES_128_GCM_SHA256 is the recommended option for most sites.
The server signature should use SHA-2. Note this is not the signature in the certificate, made by the CA. Rather, it is the signature made by the server itself, using its private key.
The older options—CBC-mode cipher suites, RSA-encryption key exchange, and SHA-1 server signatures—all have known cryptographic flaws. Each has been removed in the newly-published TLS 1.3. We retain them at prior versions for compatibility with legacy servers, but we will be evaluating them over time for eventual deprecation.
Note that supporting TLS 1.2 and the above options is completely backwards-compatible. They do not require a new certificate, and sites which need to talk to legacy clients may support both modern and obsolete settings at the same time. However, some attacks are enabled by merely supporting older versions, so servers should not enable legacy options where unnecessary.
Usage information from UseCounter
0.5% of HTTPS connections made from Chrome negotiate TLS 1.0 or TLS 1.1.
Entry on the feature dashboard
https://www.chromestatus.com/feature/5654791610957824
Requesting approval to remove too?
The target removal is M81, in early 2020. As that’s over a year away, I’ll leave that for another Intent. But we’ll include this in the DevTools warning.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAF8qwaCiPd5nCE7Z75oUszJFXDDwn2w72wx8m%3DTzHMFX%3DbWOQA%40mail.gmail.com.
You received this message because you are subscribed to the Google Groups "net-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to net-dev+u...@chromium.org.
To post to this group, send email to net...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/net-dev/CAFUtAY-50XikL0eddBv4pftBs_8gCi94KnfE5U%2Bd-wrkiwuzOA%40mail.gmail.com.
My intuition is that y'all know how to successfully drive shifts in the TLS ecosystem, effectively balancing compat constraints, and I'm unlikely to be able to add much value by questioning your judgement! But, if you'll bear with me a bit, I would find it really helpful for the blink deprecation process generally to dive in a little into what makes this case special. Maybe we can add it as a case study to our compat principles to help explain when a "hopeful deprecation" with long removal timeframe is actually appropriate and likely to be setup for success (instead of the more common case of being just wishful thinking).
Are you able to quantify the extent and severity of breakage beyond that scary 0.5% of connections number? Eg. do we have metrics that ignore all sub-resource (or have we done a crawl of the top N sites) to help estimate what fraction of page views would be totally broken? Do we know anything about the distribution of origins - eg. how that number would go down if the top ~100 impacted sites were fixed?
Other than the co-ordinated industry movement, do you have any other reason to believe that the vast majority of impacted servers (including, I suppose, IoT devices) will actually get updated for this by the deadline?
While the mentioned browsers indeed matter, I think the variety of mobile browsers is also significant. Did anyone ask Samsung Internet, QQ, 360 and vendors that default to their built in browser whether they are planning to join this coordinated effort? I think Samsung does not update its browser as regularly as Chrome, for example.
On Tue, Oct 16, 2018 at 6:06 PM Rick Byers <rby...@chromium.org> wrote:My intuition is that y'all know how to successfully drive shifts in the TLS ecosystem, effectively balancing compat constraints, and I'm unlikely to be able to add much value by questioning your judgement! But, if you'll bear with me a bit, I would find it really helpful for the blink deprecation process generally to dive in a little into what makes this case special. Maybe we can add it as a case study to our compat principles to help explain when a "hopeful deprecation" with long removal timeframe is actually appropriate and likely to be setup for success (instead of the more common case of being just wishful thinking).We have been able to eliminate a number of old, unfortunate aspects of TLS over time: SSLv3, RC4, version fallbacks etc. I can only guess why things might be more tractable in TLS than for more normal web features:TLS version support is a property of the web server, not of the web site. Thus there's fewer things that have to change. Also, the software on each web server is going to be one of not-that-many possible TLS implementations so it's generally a question of just updating it. That's in marked contrast to web features, which might be touched by bits of Javascript scattered across web pages where there's no automated way to clean them up.We also operate on very long timescales. TLS 1.2 was released ten years ago. Based on a recent paper, it took five years for TLS 1.2 to start to catch on and it's been ramping up to nearly 100% ever since. On the server side things are even slower: we still support Windows XP there.Are you able to quantify the extent and severity of breakage beyond that scary 0.5% of connections number? Eg. do we have metrics that ignore all sub-resource (or have we done a crawl of the top N sites) to help estimate what fraction of page views would be totally broken? Do we know anything about the distribution of origins - eg. how that number would go down if the top ~100 impacted sites were fixed?We don't have more detailed analysis at the moment. When things get closer to the time, we'll start to look into that in case any specific devrel outreach can help us get closer to our goal.
Do you know why those 0.5% of connections use TLS 1.0 or TLS 1.1? Could there be any other reason than that the server doesn't support TLS 1.2?
On 10/16/18 7:05 PM, Rick Byers wrote:
> Although we normally don't do "hopeful deprecations", this one seems
> special to me. There's clearly a coordinated industry movement here on
> good security grounds, with a long time period and necessary opt-outs.
>
> My intuition is that y'all know how to successfully drive shifts in the
> TLS ecosystem, effectively balancing compat constraints, and I'm
> unlikely to be able to add much value by questioning your judgement!
> But, if you'll bear with me a bit, I would find it really helpful for
> the blink deprecation process generally to dive in a little into what
> makes this case special. Maybe we can add it as a case study to our
> compat principles
> <https://docs.google.com/document/d/1RC-pBBvsazYfCNNUSkPqAVpSpNJ96U8trhNkfV0v9fk/edit> to
> help explain when a "hopeful deprecation" with long removal timeframe is
> actually appropriate and likely to be setup for success (instead of the
> more common case of being just wishful thinking).
>
> Are you able to quantify the extent and severity of breakage beyond that
> scary 0.5% of connections number? Eg. do we have metrics that ignore all
> sub-resource (or have we done a crawl of the top N sites) to help
> estimate what fraction of page views would be totally broken? Do we know
> anything about the distribution of origins - eg. how that number would
> go down if the top ~100 impacted sites were fixed?
They have 14+ months to get their act together, and given existing
trends it won't even be 0.5% by then. We're just helping them along. :)
> Other than the
> co-ordinated industry movement, do you have any other reason to believe
> that the vast majority of impacted servers (including, I suppose, IoT
> devices) will actually get updated for this by the deadline?
How many people use browsers to connect to IoT devices? That's a
different sort of use case, and I think we can safely leave IoT worries
to someone else...
Peter
CheersAGL
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL9PXLwf%3D6vw3vvYXJ3aBW8q%2Bt6cPa6OYD1g_NJLAGNyGX7bDQ%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/2cfd37bb-1459-33b1-7f8f-fc4da038768c%40mozilla.com.
--Peter
You received this message because you are subscribed to the Google Groups "net-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to net-dev+u...@chromium.org.
To post to this group, send email to net...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/net-dev/CAFUtAY8nXECdwEQqCrPjRN%2Bs4ib2sfuJ8ucN7w8oRm9YZ4BLDA%40mail.gmail.com.
Hi Yoav,That's not completely right. Python <2.7.9 will use whatever versions of TLS OpenSSL defaults to, the issue (well, _an_ issue, Python<2.7.9's TLS has a few) is that you can't explicitly request TLS1.2. Note that official python.org binaries for Python<2.7.9 for Windows linked against a very old version of OpenSSL. Such Pythons are also unable to do SNI (as a client!), amongst many other issues (detailed here: https://developer.rackspace.com/blog/the-not-so-sorry-state-of-ssl-in-python/). In short, I seriously doubt Python <2.7.9 is a significant source of servers with poor TLS.
Alex
You received this message because you are subscribed to the Google Groups "Security-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-dev...@chromium.org.
--All that is necessary for evil to succeed is for good people to do nothing.
You received this message because you are subscribed to the Google Groups "Security-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-dev...@chromium.org.
Hi. I would like to know that all of my google services on browser in my pc has some problems regarding this. I can't open google forms, spreadsheets and even my drive has a warning signs of NET:ERR_SSL_OBSOLUTE_VERSION . How will it be fix? Can you help me?
Hi all,The other possibility could be OS related. I've had this issue with Chromium on old versions macOS specifically, though I've seen it happen on Windows too.Claire - what version of your operating system are you running?Cheers,-slade
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAF8qwaBxUzPa4wqC20CO53JSFkAWj%2BkKYXtONLQL19Fq7Oxwwg%40mail.gmail.com.