Greetings again. The contents of this draft are fine but definitely incomplete. The draft gives clear language about whether particular cryptographic components are recommended for use in TLS, but no guidance for implementations of what those implementations should do if given a discouraged code point.
If a TLS server negotiates to a cryptographic component labelled "D". what SHOULD / MUST the client do? If a TLS client only offers D-level components, what SHOULD / MUST the server do? A program's configuration mechanism SHOULD NOT / MUST NOT allow specifying D-level components? This draft should either be expanded to say what TLS clients and servers and configuration SHOULD / MUST do with D-level components. If it is too difficult for the TLS WG to agree on specific actions, the draft should at least say that so that the reader knows what to do with these new ratings. Without such wording, the new "D" label becomes useless in practice, which is clearly bad for security and interoperability. --Paul Hoffman _______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org