On Wed, Nov 13, 2019 at 06:29:44AM -0500, Kathleen Moriarty wrote:
> Hi Ben,
> 
> Just replying to the parts of the tread that were not responded to already
> as Stephen will likely be looking at the headers/updates per his message.
> Thanks for your careful review.
> 
> On Mon, Nov 11, 2019 at 2:54 PM Benjamin Kaduk <ka...@mit.edu> wrote:
> 
> > Hi all,
> >
> > This is a "preliminary" review only because there's some strangeness
> > relating to the Updates: (and Obsoletes:) headers, and any changes there
> > would make me need to go and recheck the relationship of this document to
> > the ones listed.  So, I haven't done any of that yet, in an attempt to only
> > have to do it once.
> >
> > Specifically, there's skew between the list of documents updated in the top
> > header and the list in Section 1.1.  Evern more annoyingly, the (tools)
> > HTML version seems to be missing some numbers from the document header,
> > that are present in the TXT version.  (Henrik is going to take a look, per
> >
> > https://mailarchive.ietf.org/arch/msg/tools-discuss/Maeh0f_WfOy5sfnGQpwGPs_sYcU
> > .)
> >
> 
> Thanks.
> 
> >
> > Additionally, Section 1.1 lists some RFCs that "have been obsoleted", but
> > there is no "Obsoletes:" header at the top of the document.
> >
> > I think nits is right about references (square-bracketed "[RFC6347]") in
> > the Abstract; we should change those to normal textual (parenthesed
> > "(RFC 6347)") before IETF LC.
> >
> > Some other notes from a quick pass over the main text (though I'll probably
> > read it again once the above are addressed) follow.
> >
> > Section 1
> >
> > It feels a little backwards for a "primary technical reason" to
> > deprecate a protocol version being that "at least one widely-used
> > library has plans to drop [it]".
> >
> 
> I see what you are saying.  The major library dropping it has to do with
> the number of versions available and supporting them all is cumbersome and
> could lead to configuration errors on the part of the user.  Would you just
> like "primary" removed or would you prefer more of a change to the text?

The main reason I raised it is that it doesn't feel like a *technical* reason;
it's done for expediency and perhaps with a bit of politics, but there's nothing
technical about the protocol involved.

> 
> >
> > I do appreciate that we give discussion about what we intend
> > "deprecation" to mean and for whom -- thank you for that!
> >
> > Section 2
> >
> >       TLS 1.3, specified in TLSv1.3 [RFC8446], represents a significant
> >       change to TLS that aims to address threats that have arisen over
> >       the years.  Among the changes are a new handshake protocol, a new
> >       key derivation process that uses the HMAC-based Extract-and-Expand
> >       Key Derivation Function (HKDF), and the removal of cipher suites
> >       that use static RSA or DH key exchanges, the CBC mode of
> >       operation, or SHA-1.  The list of extensions that can be used with
> >       TLS 1.3 has been reduced considerably.
> >
> > While it's true that the initial list of extensions usable with TLS 1.3
> > is smaller than the list of extensions usable at TLS 1.2 taken at the
> > same time, it's also true that the requirements for allocating a new
> > extension codepoint have been reduced dramatically.  So I think I'd say
> > that this reflects not a desire to reduce the attack surface (as
> > "measured" by number of extensions) but rather a paradigm shift in how
> > the protocol works, which leaves some existing functionality
> > incompatible with the new model.  I don't really get a clear sense of
> > what this current last sentence is trying to say (i.e., whether it's one
> > of those two descriptions I offered above).
> >
> 
> Would you prefer "a significant change", be "a paradigm shift"? If not,
> could you propose text?

I'm trying to say that the reduced size of the list of extensions is just
a side effect, not an end in its own right.  
But, I seem to have missed that this paragraph is part of a quotation from a
NIST document, so I don't get to wordsmith it :)

> 
> 
> > Section 3
> >
> >    Similarly, the authentication of the handshake depends on signatures
> >    made using SHA-1 hash or a not stronger concatenation of MD-5 and
> >    SHA-1 hashes, allowing the attacker to impersonate a server when it
> >    is able to break the severely weakened SHA-1 hash.
> >
> > My recollection of the WG discussions (which I will go review) is that
> > we don't really have consensus on the "not stronger" portion of this.
> > Is that a key component of the document here?  (N.B. this is *not* an
> > invitation to rehash that discussion again!  The chairs or I can provide
> > a summary of points not resolved by previous discussion and points
> > believed to be adequately agreed upon, which would be a trigger for any
> > additional discussion that might be needed.)
> >
> 
> Since you are already looking at the consensus of this with the chairs, we
> can wait for your guidance.

Okay.  That might not happen until after Singapore, though.

-Ben

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to