Hi Paul,

The draft already contains the following guidance to address this point on
how to treat items marked as "D":

"D: Indicates that the item is discouraged. This marking could be used to
identify mechanisms that might result in problems if they are used, such as
a weak cryptographic algorithm or a mechanism that might cause
interoperability problems in deployment. Implementers SHOULD consult the
linked references associated with the item to determine the conditions
under which it SHOULD NOT or MUST NOT be used."

The behavior of TLS when it cannot arrive on an acceptable set of
parameters is defined in the TLS protocol specification.

Cheers,

Joe



On Fri, Mar 14, 2025 at 1:59 AM Paul Hoffman <phoff...@proper.com> wrote:

> Greetings again. The contents of this draft are fine but definitely
> incomplete. The draft gives clear language about whether particular
> cryptographic components are recommended for use in TLS, but no guidance
> for implementations of what those implementations should do if given a
> discouraged code point.
>
> If a TLS server negotiates to a cryptographic component labelled "D". what
> SHOULD / MUST the client do?
>
> If a TLS client only offers D-level components, what SHOULD / MUST the
> server do?
>
> A program's configuration mechanism SHOULD NOT / MUST NOT allow specifying
> D-level components?
>
> This draft should either be expanded to say what TLS clients and servers
> and configuration SHOULD / MUST do with D-level components. If it is too
> difficult for the TLS WG to agree on specific actions, the draft should at
> least say that so that the reader knows what to do with these new ratings.
> Without such wording, the new "D" label becomes useless in practice, which
> is clearly bad for security and interoperability.
>
> --Paul Hoffman
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to