Thanks, Barry. I will incorporate your fixes in the next version, due soon.

-- Christian Huitema

On 9/4/2019 8:41 PM, Barry Leiba via Datatracker wrote:
> Barry Leiba has entered the following ballot position for
> draft-ietf-tls-sni-encryption-05: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-tls-sni-encryption/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> Lovely document; thanks.  Just a collection of nits here:
>
> — Section 1 —
>
>    These attempts have generally floundered,
>
> I think the word you want here is “foundered”, without the “l”.
>
> — Section 2.1 —
>
>       which inspection would intrude with the privacy of employees.
>
> “Intrude on”.
>
> — Section 2.2 —
>
>    and protection of server certificates transmissions
>
> “certificate”
>
> — Section 2.3 —
>
>    Deploying SNI encryption will help thwarting most of the
>
> Will “help thwart” or “help in thwarting”; I think the former sounds better.
>
>    can however be realized by other means.
>
> Needs commas around “, however,” .
>
> — Section 3.1 —
>
>    these designs can be broken by a simple replay attack, which works as
>    follow:
>
> “as follows”
>
>    attacks breaks that goal
>
> “break”
>
> — Section 3.2 —
>
>    the multiplexed server, and by every users of the protected services.
>
> By “every user” or “all users”.
>
> — Section 3.4 —
>
>    of TLS handshakes use SNI encryption.  If that was the case, the
>
> “If that were the case,” subjunctive mood.
>
> — Section 3.5 —
>
>    If the corresponding private key was compromised,
>
> “is compromised,” or, better, “should be compromised,” subjunctive again.
>
> — Section 3.6 —
>
>    We can design solutions in which a fronting service act as a relay
>
> “acts”
>
>    Middle attack by the fronting service.  The downside is the the
>
> “that the”
>
>    client will not verify the identity of the fronting service with
>    risks discussed in , but solutions will have to mitigate this risks.
>
> You’re missing something here, a reference after “in”?  And “those risks.”
>
>    regular fronting server, using for example spoofed DNS responses
>
> Needs commas around “, for example,” .
>
> — Section 3.7 —
>
>    Multiple other applications currently use TLS, including for example
>    SMTP [RFC5246], DNS [RFC7858], or XMPP [RFC7590].
>
> Needs commas around “, for example,” .
> Also, “and”, rather than “or”.
>
>    These applications too will benefit of SNI encryption.
>
> Needs commas around “, too,” .  Or make it, “These applications will also 
> benefit...”
>
>    HTTP only methods like those
>
> “HTTP-only” needs a hyphen.
>
>    to the need of an application-agnostic solution, that would be
>    implemented fully in the TLS layer.
>
> “need for”, and “which would”.
>
> — Section 3.7.1 —
>
>    specific port numbers exposed in some network.
>
> Should this be “networks”?
>
>    Applications would not need to do that if the ALPN was hidden
>
> “were hidden”
>
> — Section 3.7.2 —
>
>    Support other transports than TCP
>
> “Support Transports Other than TCP”
>
>    requirement to encrypt the SNI apply just as well
>
> “applies”
>
> — Section 4 —
>
>    when the fronting server and the hidden server are "co-tenant" of the
>
> “co-tenants”
>
>    There are however a few issues regarding discovery
>
> Needs commas around “, however,” .
>
>    o  The client browser's has to be directed to access
>
> The “client’s browser”.
>
>       cryptographic proof that the content does in fact come from
>
> Needs commas around “, in fact,” .
>
>       The solution does thus not mitigate
>
> Needs commas around “, thus,” .
>
>    support HTTP Fronting
>
> “supports”
>
>    applications over HTTP, such as for example DNS over HTTPS
>
> Needs commas around “, for example,” .
>
> — Section 4.1 —
>
>    It also requires that the fronting server decrypts and relay
>    messages to the hidden server.
>
> “decrypt”, more subjunctive.
>
> — Section 4.2 —
>
>    be performed by distributing fake advice, such as "to reach example
>    hidden.example.com, use fake.example.com as a fronting server",
>
> There’s an extra “example” on the first line.
>
>    We can observe that content distribution network have a similar
>
> “networks”
>
> — Section 5 —
>
>    The current HTTP based
>
> “HTTP-based” needs a hyphen.
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to