<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902"
     category="std" updates="8314" docName="draft-ietf-uta-tls-for-email-05"
     obsoletes="" submissionType="IETF" xml:lang="en" tocInclude="true"
     symRefs="true" sortRefs="true" version="3" number="8997" consensus="true"> 
  <!-- xml2rfc v2v3 conversion 2.47.0 -->
  <front>
    <title abbrev="TLS For Email">Deprecation of TLS 1.1 for Email
    Submission and Access</title> 
    <seriesInfo name="RFC" value="8997"/>
    <author initials="L." surname="Velvindron" fullname="Loganaden Velvindron">
      <organization>cyberstorm.mu</organization>
      <address>
        <postal>
          <street>88 Avenue De Plevitz Roches Brunes</street>
          <city>Rose Hill</city>
          <code>71259</code>
          <country>Mauritius</country>
        </postal>
        <phone>+230 59762817</phone>
        <email>logan@cyberstorm.mu</email>
        <uri/>
      </address>
    </author>
    <author fullname="Stephen Farrell" initials="S." surname="Farrell">
      <organization>Trinity College Dublin</organization>
      <address>
        <postal>
          <street/>
          <city>Dublin</city>
          <region/>
          <code>2</code>
          <country>Ireland</country>
        </postal>
        <phone>+353-1-896-2354</phone>
        <email>stephen.farrell@cs.tcd.ie</email>
      </address>
    </author>
    <date year="2021" month="March"/>
    <area>Internet</area>
    <workgroup/>
    <abstract>
      <t>This specification updates the current recommendation for the use of
the Transport Layer Security (TLS) protocol to provide confidentiality of email
between a Mail User Agent (MUA) and a Mail Submission Server or Mail Access
Server. This document updates RFC 8314.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t><xref target="RFC8314" format="default"/> defines the minimum
      recommended version of  TLS as version 1.1. Due to the deprecation of
      TLS 1.1 in <xref target="RFC8996"
      format="default"/>, this recommendation is no longer valid. Therefore,
      this document updates <xref target="RFC8314" format="default"/> so that
      the minimum version for TLS is TLS 1.2.</t> 
    </section>
    <section numbered="true" toc="default">
      <name>Conventions Used in This Document</name>

        <t>
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
    NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
    </section>
    <section anchor="update" numbered="true" toc="default">
      <name>Updates to RFC 8314</name>
      <t>OLD:</t>
      <blockquote>4.1. Deprecation of Services Using Cleartext and TLS Versions Less
      Than 1.1</blockquote>
      <t>NEW:</t>
      <blockquote>4.1. Deprecation of Services Using Cleartext and TLS Versions Less
      Than 1.2</blockquote>
      <t>OLD:</t>
      <blockquote>As soon as practicable, MSPs currently supporting Secure Sockets
      Layer (SSL) 2.x, SSL 3.0, or TLS 1.0 <bcp14>SHOULD</bcp14> transition their users
      to TLS 1.1 or later and discontinue support for those earlier
      versions of SSL and TLS.</blockquote>
      <t>NEW:</t>
      <blockquote>As soon as practicable, MSPs currently supporting Secure
      Sockets Layer (SSL) 2.x, SSL 3.0, TLS 1.0, or TLS 1.1
      <bcp14>SHOULD</bcp14> transition their users to TLS 1.2 or later and
      discontinue support for those earlier versions of SSL and
      TLS.</blockquote> 
      <t>In <xref target="RFC8314" sectionFormat="of" section="4.1"/>, the
      text should be revised from:</t> 
      <t> OLD:</t>
      <blockquote>One way is for the server to
   refuse a ClientHello message from any client sending a
   ClientHello.version field corresponding to any version of SSL or
   TLS 1.0.</blockquote>
      <t>NEW:</t>
      <blockquote>
    One way is for the server to
       refuse a ClientHello message from any client sending a
       ClientHello.version field corresponding to any version of SSL or
       TLS earlier than TLS 1.2.</blockquote>
      <t> OLD:</t>
      <blockquote>It is <bcp14>RECOMMENDED</bcp14> that new users be required
      to use TLS version 1.1 or greater from the start.  However, an MSP may
      find it necessary to make exceptions to accommodate some legacy systems
      that support only earlier versions of TLS or only
      cleartext.</blockquote> 
      <t>NEW:</t>
      <blockquote>It is <bcp14>RECOMMENDED</bcp14> that new users be required
      to use TLS version 1.2 or greater from the start.  However, an MSP may
      find it necessary to make exceptions to accommodate some legacy systems
      that support only earlier versions of TLS or only
      cleartext.</blockquote> 
      <t>OLD:</t>
      <blockquote>If, however, an MUA provides such an indication, it
      <bcp14>MUST NOT</bcp14> indicate confidentiality for any connection that does not
      at least use TLS 1.1 with certificate verification and also meet
      the minimum confidentiality requirements associated with that
      account.</blockquote>
      <t>NEW:</t>
      <blockquote>If, however, an MUA provides such an indication, it
      <bcp14>MUST NOT</bcp14> indicate confidentiality for any connection that does not
      at least use TLS 1.2 with certificate verification and also meet
      the minimum confidentiality requirements associated with that
      account.</blockquote>
      <t>OLD</t>
      <blockquote>MUAs <bcp14>MUST</bcp14> implement TLS 1.2 <xref
      target="RFC5246" format="default"/> or later.  Earlier TLS and 
      SSL versions <bcp14>MAY</bcp14> also be supported, so long as the MUA requires at
      least TLS 1.1  <xref target="RFC4346" format="default"/> when accessing accounts that are
      configured to impose minimum confidentiality requirements.</blockquote>
      <t>NEW:</t>
      <blockquote>MUAs <bcp14>MUST</bcp14> implement TLS 1.2  <xref
      target="RFC5246" format="default"/> or later, e.g., TLS 1.3  <xref
      target="RFC8446" format="default"/>.  Earlier TLS and 
      SSL versions <bcp14>MAY</bcp14> also be supported, so long as the MUA requires at
      least TLS 1.2  <xref target="RFC5246" format="default"/> when accessing accounts that are
      configured to impose minimum confidentiality requirements.</blockquote>
      <t>OLD:</t>
      <blockquote>The default minimum expected level of confidentiality for all new
   accounts <bcp14>MUST</bcp14> require successful validation of the server's
   certificate and <bcp14>SHOULD</bcp14> require negotiation of TLS version 1.1 or
   greater.  (Future revisions to this specification may raise these
   requirements or impose additional requirements to address newly
   discovered weaknesses in protocols or cryptographic algorithms.)</blockquote>
      <t>NEW:</t>
      <blockquote>The default minimum expected level of confidentiality for all new
   accounts <bcp14>MUST</bcp14> require successful validation of the server's
   certificate and <bcp14>SHOULD</bcp14> require negotiation of TLS version 1.2 or
   greater.  (Future revisions to this specification may raise these
   requirements or impose additional requirements to address newly
   discovered weaknesses in protocols or cryptographic algorithms.)</blockquote>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>The purpose of this document is to document updated recommendations
      for using TLS with email services. Those recommendations are based on
      <xref target="RFC8996"
	    format="default"/>.</t> 
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8314.xml"/>
        <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml"/>
        <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5246.xml"/>
<reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996">
<front>
<title>Deprecating TLS 1.0 and TLS 1.1</title>
<author initials='K' surname='Moriarty' fullname='Kathleen Moriarty'>
  <organization>Dell EMC</organization>
</author>
<author initials='S' surname='Farrell' fullname='Stephen Farrell'>
  <organization>Trinity College Dublin</organization>
</author>
<date month='March' year='2021'/>
</front>
<seriesInfo name="RFC" value="8996"/>
<seriesInfo name="DOI" value="10.17487/RFC8996"/>
</reference>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
      </references>
      <references>
        <name>Informative References</name>
        <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4346.xml"/>
      </references>
    </references>
    <section anchor="Acknowledgement" numbered="false" toc="default">
      <name>Acknowledgements</name>
      <t>The authors would like to thank <contact fullname="Vittorio
      Bertola"/> and <contact fullname="Viktor Dukhovni"/> for their
      feedback.</t>  
    </section>
  </back>
</rfc>
