On 19/02/15 04:57, Richard Barnes wrote:
> On Wed, Feb 18, 2015 at 11:19 PM, Peter Saint-Andre - &yet <pe...@andyet.net
>> wrote:
> 
>> Hi Richard, thanks for the thoughtful review. Comments inline.
>>
>> On 2/18/15 8:34 PM, Richard Barnes wrote:
>>
>>> Richard Barnes has entered the following ballot position for
>>> draft-ietf-uta-tls-bcp-09: Discuss
>>>
>>> When responding, please keep the subject line intact and reply to all
>>> email addresses included in the To and CC lines. (Feel free to cut this
>>> introductory paragraph, however.)
>>>
>>>
>>> Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html
>>> for more information about IESG DISCUSS and COMMENT positions.
>>>
>>>
>>> The document, along with other ballot positions, can be found here:
>>> http://datatracker.ietf.org/doc/draft-ietf-uta-tls-bcp/
>>>
>>>
>>>
>>> ----------------------------------------------------------------------
>>> DISCUSS:
>>> ----------------------------------------------------------------------
>>>
>>> I really can't abide by the abdication in Section 5.2.
>>>
>>
>> Abdication is an awfully strong word.
>>
> 
> And deliberately so.  Maybe it's just late here, but the current text reads
> to me as incredibly weak.
> 
> 
> 
>>  Getting a cert is
>>> hard.  Running reasonably recent software and configuring it properly is
>>> not.  The possibility that a connection will not be authenticated is no
>>> excuse for using bad versions of TLS or using insecure ciphersuites.
>>>
>>> I appreciate that normally deference to WG consensus is appropriate, but
>>> this is a recommendation that could be actively harmful to the Internet
>>> by encouraging the continued use of broken code.
>>>
>>
>> I think the document, then, does not provide clear enough text.
>>
>> I do not think we intended to actively recommend that anyone run broken
>> code, use outdated versions of TLS, use insecure ciphersuites, etc.
> 
> 
> Good.  I'm glad we agree on this.
> 
> Could I ask the opposite question?  Which recommendations in the document
> did people think *could* be violated in an unauthenticated context?
> 
> 
> 
>> However, we are saying that this document was not written specifically to
>> cover unauthenticated TLS usages because that was a point of strong
>> contention in the WG and we were not able to reach consensus. The thread
>> beginning here is illustrative:
>>
>> http://www.ietf.org/mail-archive/web/uta/current/msg00625.html
>>
> 
> Thanks for the link.  That adds some helpful context.
> 
> It also seems to me to illustrate that there's not much clarity in the
> group about what problem this section is trying to solve.
> 
> Part of the source of my confusion here is that from the pure perspective
> of TLS, the server is *always* authenticated (and the client, 

Factually incorrect. Anon-DH has been present in TLS since the
beginning. If your DISCUSS is based on that misapprehension then
you need to re-consider.

S.

> if mutual
> auth is used) -- you always know what key you're talking to.  Any binding
> of that key to an identity is exogenous to TLS.
> 
> Everything in the document besides Section 5 gets this right.  There's no
> mention of requirements on PKIX, or PGP certs, etc, except for some
> indirect mentions in the Security Considerations.
> 
> So it seems to me that this section is pure harm.  It takes a document that
> got the layering right, introduces semantic confusion, and thereby arrives
> at a giant loophole.
> 
> Can we just delete it?
> 
> 
> 
> If you are insisting that this document be remanded to the WG with
>> instructions that it reach consensus one way or the other, then please let
>> us know.
>>
>>  ----------------------------------------------------------------------
>>> COMMENT:
>>> ----------------------------------------------------------------------
>>>
>>> These COMMENTs are right on the edge of being  DISCUSS points, because I
>>> think there are some pretty critical references missing.  Please consider
>>> this a COMMENT of Unusual Strength.
>>>
>>> Section 1. "which together are the most widely deployed ciphers"
>>>
>>> Actually, at least in the web context, this isn't totally true.
>>> According to Firefox telemetry, AES-GCM has been the most widely deployed
>>> cipher since at least 3Q14, and is currently used in the majority of TLS
>>> handshakes that Firefox does (52%) [1].
>>>
>>
>> As a result of addressing a comment from another IESG member, we will be
>> changing "are" to "have been" in the quoted text.
>>
> 
> Great.  "among the most" would have been fine too :)
> 
> 
> 
>>  Section 3.1.1. Implementations MUST NOT negotiate SSL version 3
>>>
>>> A reference to draft-ietf-tls-sslv3-diediedie seems in order here.
>>>
>>
>> Are you thinking that would be a normative reference or an informative
>> reference?
>>
> 
> Informative will be fine.  It just provides more background for this
> requirement, and FWIW, duplicates it:
> https://tools.ietf.org/html/draft-ietf-tls-sslv3-diediedie-00#section-2
> 
> 
> 
>>  Section 3.1.
>>>
>>> It would be good for this section to mention that servers MUST implement
>>> TLS version negotiation.  That is, they MUST NOT abort the handshake if
>>> the version offered by the client is higher than the version the server
>>> supports.  This is, after all, the root cause of fallback.
>>>
>>
>> Good point.
>>
>>  Section 3.1.3.
>>>
>>> I'm surprised that there's not even a SHOULD CONSIDER [RFC6919] for SCSV
>>> here.  Did the WG discuss having any requirement for SCSV?
>>>
>>
>> As I recall, the (brief) discussion concluded that a normative dependency
>> on draft-ietf-tls-downgrade-scsv was not yet appropriate because it is too
>> new to yet be a best *current* practice.
>>
>> On a more general note, the WG considered a number of recent proposals for
>> TLS hardening, but concluded as well that they were too new to recommend
>> quite yet. There is breaking news (pun intended) every week about TLS and
>> there's no way that a document like this can reflect the very latest ideas
>> and suggestions - we tried to balance practices that are (or might be
>> considered) "best" against practices that are implemented and can be
>> deployed today. IMHO the most we can do is get this BCP published and, as
>> needed, update or replace it with improved recommendations on a regular
>> basis (say, every year or two). This document was supposed to be published
>> quickly after IETF 88 and is already late.
>>
> 
> Fair enough.  Thanks for the background.
> 
> 
> 
>>  Also, if you want a cite for the 3% number, it's in the proceedings of
>>> IETF 91 [2].
>>>
>>
>> Thanks.
>>
>>  Section 3.3.
>>>
>>> You might point out HPACK [3] as an example of compression that is
>>> sensitive to things like CRIME.
>>>
>>
>> I see no harm in an informative reference.
>>
>>  Section 3.5.
>>>
>>> Shouldn't this refer more specifically to draft-ietf-tls-session-hash
>>> [4]?  As it is, the recommendations in this section are kind of vacuous;
>>> e.g., TLS without session-hash provides no way to "bind the master secret
>>> to the full handshake".
>>>
>>
>> Yes, that's what [triple-handshake] cites as well, and I agree that a
>> pointer to it would be helpful.
>>
> 
> Yes, please make this direct.
> 
> 
> 
>>  Section 4.4. "Modular vs. Elliptic Curve"
>>>
>>> I think that "finite field" or "modp" are more common than "modular".
>>>
>>
>> I have been told that elliptic curves are also finite fields, but I am not
>> a cryptographer.
>>
> 
> /me dusts off his math degree...
> 
> To get very technical, elliptic curves are finite *groups* (they're not
> fields; they have no multiplication operation), whereas a modp group is the
> multiplicative group of a finite field.
> 
> --Richard
> 
> 
> 
>>
>> Peter
>>
>>
>>
> 

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to