[Uta] Re: [Last-Call] Re: Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-10 Thread Salz, Rich
BTW: A MUST with an otherwise clause, is to me, a SHOULD. It is not an otherwise clause. It is a MUST and you MAY also do this. (Also, what's a non-default option. Either it can be negotiated, so it's on by default, or it won't be negotiated, so it's really off.) Don’t think protocol,

[Uta] Re: Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-08 Thread Salz, Rich
Is the second paragraph of Sec 4 not sufficient? It says “If deployment considerations are a concern, the protocol MAY specify TLS 1.2 as an additional, non-default option.” ___ Uta mailing list -- uta@ietf.org To unsubscribe send an email to uta-le.

[Uta] Re: Éric Vyncke's Yes on draft-ietf-uta-require-tls13-10: (with COMMENT)

2025-04-09 Thread Salz, Rich
Special thanks to Valery Smyslov for the shepherd's write-up including the WG consensus ***but it lacks*** the justification of the intended status. It updated 9325 which is a BCP, so this must also be BCP. Other thanks to Scott Rose, the DNS directorate reviewer, please consider this int-dir revi

[Uta] Re: Mike Bishop's Yes on draft-ietf-uta-require-tls13-10: (with COMMENT)

2025-04-11 Thread Salz, Rich
Worth clarifying throughout that protocols *which use TLS* must use TLS 1.3 (or later). This document isn't (I believe) attempting to mandate that all protocols use TLS in all contexts. I believe the editor’s copy already has made this change sufficiently. Section 5, the "small changes" are small

[Uta] Re: [Iotops] [Last-Call] Re: Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-14 Thread Salz, Rich
 * If *all* participants in an interaction MUST support TLS 1.3, then there is no reason to support anything else. Unless of course, you expect some participants to violate that MUST, in which case, a document is being dishonest. You are not counting a non-updated deployed base (which su

[Uta] Re: [Last-Call] Re: Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-14 Thread Salz, Rich
But, MUST do TLS 1.3 implies (to me), do *NOT* (refuse to) do TLS 1.2. The only way to allow (MAY) TLS 1.2, is for TLS 1.3 to be SHOULD. People who believe that have not read the draft, or forgotten something. It’s pretty clear, appearing in the very next paragraph aftrer the MUST TLS 1.3 p

[Uta] Re: [Last-Call] Re: Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-14 Thread Salz, Rich
The document tries to be careful about trying to move vendors to TLS 1.3, while still recognizing that deployment issues may force the addition of TLS 1.2. If a vendor is on TLS 1.0/1.1 this document doesn’t apply. I am concerned that if we water this down more, just so some vendors can claim c

[Uta] Re: Deb Cooley's Discuss on draft-ietf-uta-require-tls13-10: (with DISCUSS and COMMENT)

2025-04-14 Thread Salz, Rich
TL;DR. All good ideas, changes incorporated. I am about to submit a -11 that addresses feedback from: Deb's, Med (again; my git mistake), Mike Bishop, Eric Vynke's, and Scott Rose. Section 6, para 3, sentence 1: All Finite Field DH? Or all except those using ephemeral FFDH specified in R

[Uta] Re: Deb Cooley's Discuss on draft-ietf-uta-require-tls13-10: (with DISCUSS and COMMENT)

2025-04-14 Thread Salz, Rich
Thanks for this quick work. I think the 'most' got lost in all the edits. Otherwise, I think it looks great. Of course, the one point that was the DISCUSS. Sigh. New one coming I guess. ___ Uta mailing list -- uta@ietf.org To unsubscribe send an emai

[Uta] Re: what is a non-default option

2025-04-16 Thread Salz, Rich
In this TLS1.3 "MUST" discussion, I don't understand what an: "additional, non-default option" It means that the configuration file or however the settings are managed, does not turn in on by default. * How does a client know if there were deployment considerations on the server? In many case

[Uta] Re: what is a non-default option

2025-04-17 Thread Salz, Rich
 I'm all for telling everyone to do TLS 1.3. I do not think this document is helpful. I think it might be actually harmful. I cannot convince you otherwise, so I doubt I will respond more. I am sure your view is in the rough. smime.p7s Description: S/MIME cryptographic signature __

[Uta] Re: [Iotops] [Last-Call] Re: Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-10 Thread Salz, Rich
I'm told (by an AD) that uta-require-tls13 is supposed to apply to all ends of a new protocol. Shrug. Anyway, it's much easier to make an RFC a performance specification (a trade term about RFPs) when the document doesn't depend upon some parties just ignoring the MUSTs. It would be

[Uta] Re: webpki anchors and comodo-gate-style attacks

2025-03-04 Thread Salz, Rich
> 1. How do I cite the CABFORUM WebPKI set of anchors. > Does it have a clear name? (Because it's not identical on all > platforms/browsers/libraries). I am pretty sure that there isn't one. Instead, each trust store operator (e.g., browser vendor) is supposed to interpret the CA/B guidelines an

[Uta] Re: Erik Kline's Yes on draft-ietf-uta-require-tls13-06: (with COMMENT)

2025-03-06 Thread Salz, Rich
> * "When the API allows it, clients SHOULD specify just the minimum version they want." > I struggled with this phrasing and attempting to reconcile it with the > broader goal of requiring TLS1.3. What is really meant here, and could > it be more clearly stated? To answer the second question, ye

[Uta] Re: Dnsdir last call review of draft-ietf-uta-require-tls13-05

2025-02-21 Thread Salz, Rich
Thank you for the careful reading! > NIT: Should the enumeration of the known deficiencies of TLS 1.2 be contained > in the Introduction? The same considerations are described in Section 6, and > their summation in the Introduction seems to be superfluous. I'm happy to move item #1 from the intr

[Uta] Re: [dnsdir] Dnsdir last call review of draft-ietf-uta-require-tls13-05

2025-02-26 Thread Salz, Rich
I’ve been following the thread (mainly Geoff and EKR), and I think I have it narrowed down to the following. * Now the assertion in the draft that: "Cryptographically-relevant quantum computers, once available, will have a huge impact on TLS traffic." is true, for what its worth, but its r

[Uta] Re: [dnsdir] Dnsdir last call review of draft-ietf-uta-require-tls13-05

2025-02-26 Thread Salz, Rich
Thanks Rich - this would address my review comments Thanks for the review and conversation thread. I’ll post a new version and have the WG take a look. ___ Uta mailing list -- uta@ietf.org To unsubscribe send an email to uta-le...@ietf.org

[Uta] Re: I-D Action: draft-ietf-uta-require-tls13-06.txt

2025-02-26 Thread Salz, Rich
This version removes the duplication in Section 1 (as it's in Section 6). It also revises some of the wording in Section 3 to make clear it is not a detailed threat analysis. These were done in response to Geoff's DNSDIR review. The "diff url" is helpful. Please post if you disagree with the ch

[Uta] Re: Opsdir telechat review of draft-ietf-uta-require-tls13-06

2025-04-04 Thread Salz, Rich
I think there might have been a misunderstanding of my comment. I’m not questioning whether the discussed topics are related to updating RFC 9325—I agree that they provide important rationale for the changes. My point is that the abstract and introduction should clearly state that these topics (

[Uta] Re: Opsdir telechat review of draft-ietf-uta-require-tls13-06

2025-03-25 Thread Salz, Rich
Looks good to me! Great, thanks for taking the time to review and explain what I didn’t get. ___ Uta mailing list -- uta@ietf.org To unsubscribe send an email to uta-le...@ietf.org

[Uta] Re: Secdir last call review of draft-ietf-uta-require-tls13-06

2025-03-27 Thread Salz, Rich
All fine. Thanks! New draft coming. ___ Uta mailing list -- uta@ietf.org To unsubscribe send an email to uta-le...@ietf.org

<    1   2   3