Thanks, Peter, for the quick response.  I'll hold the DISCUSS for now,
for clerical purposes pending a revised I-D.  On the "SHOULD"
explanations, thanks for the explanations, and it'd be great if some
version of them could get into the document.

Barry

On Wed, Feb 18, 2015 at 5:12 PM, Peter Saint-Andre - &yet
<pe...@andyet.net> wrote:
> Hi Barry, thanks for the feedback. My comments inline (not coordinated with
> my co-authors, who are in far-off timezones).
>
> On 2/18/15 5:16 PM, Barry Leiba wrote:
>>
>> Barry Leiba has entered the following ballot position for
>> draft-ietf-uta-tls-bcp-09: Discuss
>>
>> When responding, please keep the subject line intact and reply to all
>> email addresses included in the To and CC lines. (Feel free to cut this
>> introductory paragraph, however.)
>>
>>
>> Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html
>> for more information about IESG DISCUSS and COMMENT positions.
>>
>>
>> The document, along with other ballot positions, can be found here:
>> http://datatracker.ietf.org/doc/draft-ietf-uta-tls-bcp/
>>
>>
>>
>> ----------------------------------------------------------------------
>> DISCUSS:
>> ----------------------------------------------------------------------
>>
>> One very simple point:
>>
>> -- Section 2 --
>>
>>     A number of security-related terms in this document are used in the
>>     sense defined in [RFC4949].
>>
>> Terminology definitions need to be in normative references; 4949 should
>> be normative.
>
>
> Good point. We'll correct that in the revised I-D after tomorrow's telechat.
>
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>>
>> I don't want to make these a DISCUSS, but I would appreciate a
>> discussion:
>>
>> -- Section 3.1.1 --
>> On the SHOULD NOTs here: Is there any reason one might violate them
>> *other than* that the other side doesn't support TLS 1.2 ?  If not, is it
>> worth saying that explicitly?  Is it even worth changing "SHOULD NOT
>> negotiate TLS version [x]" to "MUST NOT negotiate TLS version [x] unless
>> no higher version is available in the negotiation" ?
>
>
> Yes, I think that's a much better way to express it.
>
>> How can I evaluate each of the following "SHOULD"s?  Why might I have a
>> good reason not to comply with each of them?:
>
>
> Those are always good questions to ask.
>
>> -- Section 3.2 --
>>
>>     o  When applicable, Web servers SHOULD use HSTS to indicate that they
>>        are willing to accept TLS-only clients.
>
>
> Section 11.3 of RFC 6797 might provide a good reason (self-signed
> certificates) in some circumstances. Other than the relative youth of RFC
> 6797, I have not yet given more thought to other reasons.
>
> (BTW, it strikes me now that the phrase "when applicable" perhaps provides
> unnecessary wiggle room.)
>
>> -- Section 3.3 --
>>
>>     Implementations and deployments SHOULD disable TLS-level compression
>>     ([RFC5246], Section 6.2.2).
>
>
> Because it's not yet clear to me that all application protocols using TLS or
> DTLS are subject to these compression-based attacks (at least, I have not
> yet seen analysis of all the many such protocols), personally I would
> hesitate at this time to say that all protocols MUST disable TLS-level
> compression.
>
>> -- Section 3.5 --
>>
>>     TLS clients
>>     SHOULD apply the same validation policy for all certificates received
>>     over a connection, bind the master secret to the full handshake, and
>>     bind the abbreviated session resumption handshake to the original
>>     full handshake.
>
>
> Some of those recommendations are not yet fully baked (e.g., binding the
> master secret to the full handshake is described in
> draft-ietf-tls-session-hash) or in the early stages of development (e.g.,
> RFC 5746 does not explicitly apply to abbreviated handshakes and the
> triple-handshake authors say only that they propose to define a secure
> resumption indication extension along the lines of RFC 5746) so it is
> probably premature to say that they are best *current* practices.
>
>> -- Section 4.2.1 --
>>
>>     Servers SHOULD prefer this cipher suite over weaker cipher suites
>>     whenever it is proposed, even if it is not the first proposal.
>
>
> I think that one would be fine as MUST (notice, however, that it applies to
> a cipher suite that itself is a SHOULD).
>
>> For the above set of "SHOULD" questions, I'm looking for something in the
>> document that can help readers understand why these are not "MUST", and
>> when and why they might make an informed decision not to abide by them.
>
>
> Always a good idea.
>
>> ---
>>
>> One other non-blocking comment; no discussion needed:
>>
>> -- Section 3.1.2 --
>> Nit: "correlates to Version 1.2 of TLS 1.2" -- take out one of the "1.2"
>> ?
>
>
> Noted.
>
> Thanks again,
>
> Peter
>
> --
> Peter Saint-Andre
> https://andyet.com/
>

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to