This is just a result of goofy tooling. I.e., I removed my discuss but
didn't edit the rest of my comments....
-Ekr


On Fri, Aug 11, 2017 at 11:13 AM, Daniel Migault <
daniel.miga...@ericsson.com> wrote:

> Hi Eric,
>
> Thank you for reviewing the document. Given your second comment, I suspect
> you are reading the version 04 while the current version is version 05 [1].
> I believe your comments have been addressed in the version 05.However let
> me know if you have other concerns.
>
> Regarding TLS1.3. we were asked to position the new code points toward
> TLS1.3, but I guess that was at the time the version was not indicated in
> the title, so in principle we could remove these references.I believe the
> text in version 05 address your comment, but here are the current version
> still cites TLS 1.3 in the following sections:
>
>    - introduction: """AEAD algorithms that combine encryption and
>    integrity protection are strongly recommended for (D)TLS [RFC7525
>    <https://tools.ietf.org/html/rfc7525>] and non-AEAD algorithms are
>    forbidden to use in TLS 1.3 [I-D.ietf-tls-tls13
>    
> <https://tools.ietf.org/html/draft-ietf-tls-ecdhe-psk-aead-05#ref-I-D.ietf-tls-tls13>].
>    """. Would you prefer to remove "and non-AEAD algorithms are forbidden to
>    use in TLS 1.3 [I-D.ietf-tls-tls13
>    
> <https://tools.ietf.org/html/draft-ietf-tls-ecdhe-psk-aead-05#ref-I-D.ietf-tls-tls13>
>    ]" or it is fine to leave it as it is ?
>    - section 3: """ Cipher suites TLS_AES_128_GCM_SHA256,
>    TLS_AES_256_GCM_SHA384, TLS_AES_128_CCM_8_SHA256 and TLS_AES_128_CCM_SHA256
>    are used to support equivalent functionality in TLS 1.3 [
>    I-D.ietf-tls-tls13
>    
> <https://tools.ietf.org/html/draft-ietf-tls-ecdhe-psk-aead-05#ref-I-D.ietf-tls-tls13>].
>    """. Would you prefer to have all mentioned text being removed or is it
>    fine to leave it as it is ?
>
> Regarding the reference to the PRF of TLS 1.1, I think it concerns the
> text below which has been removed in the version 05.
>
> """
>
>    [...]  The PRF results from
>    mixing the two pseudorandom streams with distinct hash functions (MD5
>    and SHA-1) by exclusive-ORing them together.  In the case of
>    ECDHE_PSK authentication, the PSK and pre-master are treated by
>    distinct hash function with distinct properties.  This may introduce
>    vulnerabilities over the expected security provided by the
>    constructed pre-master.  As such TLS 1.0 and TLS 1.1 should not be
>    used with ECDHE_PSK.   The cipher suites defined in this document make use 
> of the
>    authenticated encryption with additional data (AEAD) defined in TLS
>    1.2 [RFC5246 <https://tools.ietf.org/html/rfc5246>] and DTLS 1.2 [RFC6347 
> <https://tools.ietf.org/html/rfc6347>].  Earlier versions of TLS do not
>    have support for AEAD and consequently, the cipher suites defined in
>    this document MUST NOT be negotiated in TLS versions prior to 1.2.
>    In addition, it is worth noting that TLS 1.0 [RFC2246 
> <https://tools.ietf.org/html/rfc2246>] and TL1.2
>    [RFC4346 <https://tools.ietf.org/html/rfc4346>] splits the pre-master in 
> two parts.  The PRF results from
>    mixing the two pseudorandom streams with distinct hash functions (MD5
>    and SHA-1) by exclusive-ORing them together.  In the case of
>    ECDHE_PSK authentication, the PSK and pre-master are treated by
>    distinct hash function with distinct properties.  This may introduce
>    vulnerabilities over the expected security provided by the
>    constructed pre-master.  As such TLS 1.0 and TLS 1.1 should not be
>    used with ECDHE_PSK.
> """
>
> Yours,
>
> Daniel
>
> [1] https://tools.ietf.org/html/draft-ietf-tls-ecdhe-psk-aead-05
>
> On Thu, Aug 10, 2017 at 10:39 AM, Eric Rescorla <e...@rtfm.com> wrote:
>
>> Eric Rescorla has entered the following ballot position for
>> draft-ietf-tls-ecdhe-psk-aead-05: No Objection
>>
>> When responding, please keep the subject line intact and reply to all
>> email addresses included in the To and CC lines. (Feel free to cut this
>> introductory paragraph, however.)
>>
>>
>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
>> for more information about IESG DISCUSS and COMMENT positions.
>>
>>
>> The document, along with other ballot positions, can be found here:
>> https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-psk-aead/
>>
>>
>>
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>>
>> The citations to TLS 1.3 still seem pretty muddled. I think you
>> should just stop referencing and discussing 1.3.
>>
>
>> S 2.
>> I'm not sure that the discussion of the PRF is helpful here in
>> mandating the non-use of these cipher suites with TLS 1.1 and
>> below.
>>
>>
>
>
>>
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
>>
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to