The formatting is really messed up here. I will preface my inline comments with 
“R$ 25-Mar” I removed the points where we agree (mainly I changed the text and 
you approved it :)
WG may tell them to migrate to TLS 1.3. In order to avoid disconnects about how 
that is supposed to work, I’d like we better characterize “urgent security 
fixes”. Thanks.
R$ 25-Mar: I understand that urgent is not a precise term, but I cannot think 
of anything better and to me it accurately conveys the situation.  The WG 
really does not want to ever look at TLS 1.2 again but we have to leave open 
the possibility that it might happen. I am open to suggestions to change, but 
expect that the WG would have to approve it.

## I think “for TLS 1.2-only” would be more accurate as some of these are
applicable to TLS1.3 as well. Consider updating accordingly:

CURRENT:
   This document specifies that except urgent security fixes,
   new TLS Exporter Labels, or new Application-Layer Protocol
   Negotiation (ALPN) Protocol IDs, no changes will be approved for TLS
   1.2.
I do not understand this comment. If you mean a new extension is added that 
*would* be usable in TLS 1.2, we’re saying that it is not defined for TLS 1.2 
even if it would “just work.” Is that your point?
[Med] Some extensions may be applicable independent of the version. I think 
that it is more accurate: s/no changes will be approved for TLS   1.2/ no 
changes will be approved for ‘TLS  1.2’-only.
R$ 25-Mar: No.  Even if it is possible to use an extension for TLS 1.2, we want 
to make it very clear that people should not expect it to show up in their TLS 
1.2 libraries.
# Section 2

## Provider examples of “huge impact” mentioned in this text:
, and the like. Doing this would muddy the waters for the clear statement we 
want to make.
[Med] Alternatively, you may simply say “be powerful enough to break 
conventional cryptographic systems, such as RSA, FFDH, and ECC”.
R$ 25-Mar: how about this: “Cryptographically relevant quantum computers, once 
available, are likely to greatly lesssen the time and effort needed to break 
RSA, FFDH, or ECC which are currently used in TLS.”

## On the various NIST citations: Are there any other similar pointers to list
for non-US regions?
There does not seem to be. At a recent IETF side meeting, several countries 
said “we’re following the NIST algorithms.” As that is the only standard 
published so far, it seems okay.
[Med] ACK for the algo part. Maybe this can be balanced by briefly citing the 
migration roadmap announced by non-US countries (e.g., ETSI (TR 103 619 - 
V1.1.1 - CYBER; Migration strategies and recommendations to Quantum kkkkSafe 
schemes<https://urldefense.com/v3/__https:/www.etsi.org/deliver/etsi_tr/103600_103699/103619/01.01.01_60/tr_103619v010101p.pdf__;!!GjvTz_vk!RUNQyWdWUylYLlrfk9yyOWhu0xYrHkwQWos4aQegUZL-imLU3tjD-ikQJUibOd019hkxzGlftglyXXbWozN3SY6h$>)
 or the latest UK plan 
(https://www.ncsc.gov.uk/guidance/pqc-migration-timelines<https://urldefense.com/v3/__https:/www.ncsc.gov.uk/guidance/pqc-migration-timelines__;!!GjvTz_vk!RUNQyWdWUylYLlrfk9yyOWhu0xYrHkwQWos4aQegUZL-imLU3tjD-ikQJUibOd019hkxzGlftglyXXbWo6VDWo-A$>)).
R$ 25-Mar: I added a point to ETSI: In 2024 NIST released standards for 
{{ML-KEM}}, {{ML-DSA}}, and {{SLH-DSA}}. Many other countries and organizations 
are publishing their roadmaps, including the multi-national standards 
organization ETSI, {{?ETSI}}


_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to