I made some comments in discussion of 6125bis that I think this document should 
address.

Basically, the document would benefit from a discussion on multi-server 
deployments in a few arrangements:

* deployments where multiple servers speak for the same names, but with 
different protocols.  ALPACA showed us that cross-protocol confusion, 
particularly for protocols that do not define the use of ALPN, can be exploited 
by directing protocols toward endpoints that use different protocols

* deployments where multiple servers and services with overlapping names that 
have different TLS configurations.  DROWN showed us that the security of these 
servers depends on the *weakest* server configuration.  If the weak instance 
can be attacked, that affects all services that share the same name.  This 
depends a little on the nature of the attack. An attack like this can render 
ALPN protections useless.

See also https://github.com/richsalz/draft-ietf-uta-rfc6125bis/issues/43

On Fri, May 27, 2022, at 07:26, Yaron Sheffer wrote:
> This version addresses numerous comments, mostly (but not always) 
> editorial, by Francesca and Paul W.
>
> As a reminder, the document is in IETF LC until May 30.
>
> Thanks,
>       Yaron
>
>
> On 5/27/22, 00:22, "uta-boun...@ietf.org on behalf of 
> internet-dra...@ietf.org" <uta-boun...@ietf.org on behalf of 
> internet-dra...@ietf.org> wrote:
>
>
>     A New Internet-Draft is available from the on-line Internet-Drafts 
> directories.
>     This draft is a work item of the Using TLS in Applications WG of 
> the IETF.
>
>             Title           : Recommendations for Secure Use of 
> Transport Layer Security (TLS) and Datagram Transport Layer Security 
> (DTLS)
>             Authors         : Yaron Sheffer
>                               Peter Saint-Andre
>                               Thomas Fossati
>       Filename        : draft-ietf-uta-rfc7525bis-07.txt
>       Pages           : 39
>       Date            : 2022-05-26
>
>     Abstract:
>        Transport Layer Security (TLS) and Datagram Transport Layer Security
>        (DTLS) are widely used to protect data exchanged over application
>        protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the
>        years, the industry has witnessed several serious attacks on TLS and
>        DTLS, including attacks on the most commonly used cipher suites and
>        their modes of operation.  This document provides the latest
>        recommendations for ensuring the security of deployed services that
>        use TLS and DTLS.  These recommendations are applicable to the
>        majority of use cases.
>
>        An earlier version of this document was published as RFC 7525 when
>        the industry was in the midst of its transition to TLS 1.2.  Years
>        later this transition is largely complete and TLS 1.3 is widely
>        available.  This document updates the guidance given the new
>        environment and obsoletes RFC 7525.  In addition, the document
>        updates RFC 5288 and RFC 6066 in view of recent attacks.
>
>
>     The IETF datatracker status page for this draft is:
>     https://datatracker.ietf.org/doc/draft-ietf-uta-rfc7525bis/
>
>     There is also an HTML version available at:
>     https://www.ietf.org/archive/id/draft-ietf-uta-rfc7525bis-07.html
>
>     A diff from the previous version is available at:
>     https://www.ietf.org/rfcdiff?url2=draft-ietf-uta-rfc7525bis-07
>
>
>     Internet-Drafts are also available by rsync at 
> rsync.ietf.org::internet-drafts
>
>
>     _______________________________________________
>     Uta mailing list
>     Uta@ietf.org
>     https://www.ietf.org/mailman/listinfo/uta
>
>
> _______________________________________________
> Uta mailing list
> Uta@ietf.org
> https://www.ietf.org/mailman/listinfo/uta

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to