Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72482 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 42505 invoked from network); 11 Feb 2014 22:01:47 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 11 Feb 2014 22:01:47 -0000 Authentication-Results: pb1.pair.com smtp.mail=rdlowrey@gmail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=rdlowrey@gmail.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.223.174 as permitted sender) X-PHP-List-Original-Sender: rdlowrey@gmail.com X-Host-Fingerprint: 209.85.223.174 mail-ie0-f174.google.com Received: from [209.85.223.174] ([209.85.223.174:44217] helo=mail-ie0-f174.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 67/F0-62230-ACD9AF25 for ; Tue, 11 Feb 2014 17:01:46 -0500 Received: by mail-ie0-f174.google.com with SMTP id tp5so4812677ieb.5 for ; Tue, 11 Feb 2014 14:01:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=++wN/Ym5hgEn0I7ac50CHoBaTOWUTFieyRwIDJsHh2M=; b=dxWOVOrpgAK9qPBNqdnayw7XeylPX3rtWTRskSnnjt9gIw3cJNuDjrGSX6opHzedAE N0vxeTncZ0bneg+31OmGFndGorMjQiNz1FNmk7inUhdaFQGaQ+89r3sz+k5dAjZ0tlDh pqVY5z7oDBdVSRElui4a8KT2gJ6mh7Q0F40cfKNoMhlLB2+vpWyPGi84i3+OOG6RBTZ6 HqkP4IU4P5HzFlmzgUqiW6WoQ5tjH5g9b+Ilz5etKGZXtly1GhDsmbcd+HCdTcgcSmzv Zk1MfjfnFLS+yxPvDZckijiUh60bKykrVp4F2y16I/CtU/L+GOrt0T7uAh3f1Wvwl9e4 M8mg== MIME-Version: 1.0 X-Received: by 10.50.60.105 with SMTP id g9mr711561igr.14.1392156103356; Tue, 11 Feb 2014 14:01:43 -0800 (PST) Received: by 10.50.34.131 with HTTP; Tue, 11 Feb 2014 14:01:43 -0800 (PST) In-Reply-To: References: Date: Tue, 11 Feb 2014 17:01:43 -0500 Message-ID: To: Peter Cowburn Cc: "internals@lists.php.net" Content-Type: multipart/alternative; boundary=047d7b10caa5033c0c04f2289a0b Subject: Re: [PHP-DEV] [VOTE] Improved TLS Defaults RFC From: rdlowrey@gmail.com (Daniel Lowrey) --047d7b10caa5033c0c04f2289a0b Content-Type: text/plain; charset=ISO-8859-1 On Tue, Feb 11, 2014 at 4:27 PM, Peter Cowburn wrote: > > > > On 11 February 2014 20:08, Daniel Lowrey wrote: > >> Voting is now open for the Improved TLS Defaults RFC and will run through >> Wednesday Feb. 19: >> >> https://wiki.php.net/rfc/improved-tls-defaults#vote >> >> Note that while the implementation is vote-ready at this time (and >> includes >> several .phpt files) I'll continue adding more tests in the coming days. >> If >> you have questions that you feel have not been addressed during the past >> two weeks please feel free to ask. >> > > Overall, I would be very happy to see these changes sooner rather than > later. That said, there is a *super* minor thing that could do with being > sorted one way or another. > > Deprecation of "tls://". Please can I raise a dissenting voice just for > that particular transport; it currently serves its purpose very well (I can > has TLS, kthxbye) and asking us to change code to use "ssl://" and add some > extra context configuration to get the same result seems a little out > there. This particular change was not discussed in the other thread, in > point of fact it read to me like "tls://" would not be deprecated [1]. What > changed? In summary: I'd really rather "tls://" not issue an E_DEPRECATED. > > I agree, this one is an oversight on my part. The tls:// wrapper "just makes sense" and deprecating it will likely result in little more than annoyance. I am going to remove the E_DEPRECATED in these cases. Oh, another super minor thing; could you make it 100% clear (I *may* be the > only one not crystal clear!) about how this RFC affects changes that have > previously been pushed to 5.6 that you wish to undo, and not undo. > > Certainly, sorry for not making it clear in the RFC. The only changes that have previously been merged for 5.6 that will be rolled-back are the following stream wrappers: - tlsv1.1:// - tlsv1.2:// I originally submitted these new wrappers, so hopefully I'm not hurting anyone's feelings by shuttering them before they ever make it to a release :) Going forward the primary tls:// wrapper can be translated as "TLSv1, TLSv1.1 or TLSv1.2." If code needs to use one of the version-specific TLS protocols they can specify the relevant constant in the "crypto_method" context option. Prior to 5.6 the tls:// wrapper translated to "only TLSv1.0." --047d7b10caa5033c0c04f2289a0b--