Barry:

You do not call for a response, but I want you to know that your comments are 
being addressed.
 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
>> From the shepherd writeup:
> 
>   There was concern raised that no one has reported implementation
>   of this draft. The document has experimental status and that helped
>   gain working group consensus to move it forward.
> 
> ...and...
> 
>   The document has been reviewed and is supported by a few
>   working group members.  Not everyone in the group agrees
>   that it is needed,
> 
> This seems to imply that making it Experimental was a tactic to get it through
> the working group, and that concerns me a bit, though not enough to get to
> DISCUSS.  I would be happier if there were some discussion in the document
> about how we would determine that it is, indeed, needed and useful, and when 
> we
> might know that we should move it to Standards Track or else abandon it.
> 
> Unfortunately, I suspect the answer to that is that we won’t know until we 
> have
> quantum computers to mount attacks with, and that won’t be until certain 
> places
> freeze over.  I realize that preparing for maybe someday having quantum
> computers and what they might someday do is an exercise that not everyone will
> want to spend time working on and implementing.

I do not think we can add anything to the document.  As was said on the email 
thread on the TLS mail list, there is a plan to use it by the US government.  
Others have not said one way or the other.

> Some editorial comments, for which no reply is necessary:
> 
> — Section 4 —
> 
>   Since the
>   "tls_cert_with_extern_psk" extension is intended to be used only with
>   initial handshakes, it MUST NOT be sent alongside the "early_data"
>   extension.
> 
> What happens if it is?  Should this say that if they appear together the 
> server
> aborts the handshake with an "illegal_parameter" alert?

I added a paragraph:

   If the client includes both the "tls_cert_with_extern_psk" extension
   and the "early_data" extension, then the server MUST terminate the
   connection with an "illegal_parameter" alert.

>   The hash algorithm MUST
>   be set when the PSK is established, with a default of SHA-256.
> 
> If it MUST be set, how is there a default?

This is stated in RFC 8446 in Section 4.2.11.

> — Section 5 —
> 
>   If the server responds with a HelloRetryRequest
>   message, then the client sends another ClientHello message as
>   described in Section 4.1.2 of [RFC8446], including the same
>   "tls_cert_with_extern_psk" extension as the original ClientHello
>   message or abort the handshake.
> 
> “, or aborts” (the comma closes the comma before “including”, and “aborts” is
> parallel to “sends”).

Fixed.

> — Section 5.1 —
> 
>   Most of those extension are
>   not impacted in any way.  This section discusses the impacts on the
>   other extensions.
> 
> Make it “those extensions”.  And I would rephrase the second sentence as, 
> “This
> section discusses the impacts on the extensions that are affected.”

I suggest:

   Section 4 lists the extensions that are required to accompany the
   "tls_cert_with_extern_psk" extension.  Most of those extension are
   used in the usual manner.  This section discusses the impacts on the
   extensions that are affected the presence of the
   "tls_cert_with_extern_psk" extension.

>   The "psk_key_exchange_modes" extension restricts both the
>   use of PSKs offered in this ClientHello and those which the server
>   might supply via a subsequent NewSessionTicket.
> 
> “Use of” needs to be factored out of the “both” clause:
> NEW
> ...restricts the use of both the PSKs offered in this ClientHello
> and those that the server might supply...
> END

I accepted you better wording.

> — Section 7 —
> 
>   the external PSKs and searching the resulting small set of
>   possibilities, rather than brute force searching the whole key space.
> 
> “and search”, and “brute-force”

I accepted you better wording.

>   The reasoning is explained in [K2016] (see
>   Section 4.2).
> 
> I suggest “The reasoning is explained in Section 4.2 of [K2016].”  Otherwise 
> it
> sounds like you should see 4.2 of this doc (and I think the html links will be
> generated better this way).

I accepted you better wording.

>   This specification does not require that external PSK is known only
> 
> “that the external PSK”

I added the missing article.

Russ


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to