Hi,

I reviwed the whole document. Looks fine in general. Some comments:


- "Those who implement and deploy TLS and DTLS, in particular versions 1.2 or 
earlier of these protocols"

Delete "or earlier". As these versions are "MUST NOT negotiate". Might be good 
to mention this deprecation in the introduction.


- Would be good for the reader if the intro said something to explain the TLS 
handshake and record layer. DTLS and QUIC also use the TLS handshake but with a 
different record layer. Would be good to point out that a lot of the 
recommendations for "TLS" apply to all uses of the TLS handshake such as DTLS 
and QUIC.


- I think QUIC should be mentioned in the introduction. Otherwise the document 
feels old already when it is published. QUIC already makes up a huge part of 
internet traffic. Over 25% in some ISP. Many of the recommendations apply to 
QUIC as well


- 3.3.  Compression
Would be good to add that TLS certificate compression is fine to use.


-  of time (e.g., measured in days)

"Days" is ridiculasly long for non-constrained use cases. ANSSI requires 
ephemeral diffie-hellman every hour or 100 GB for IPsec. Signal and WireGuard 
are doing Diffie-Hellman much more often than that. I think "measured in days" 
give the wrong idea. I suggest changing to "e.g., every hour".  Days seems like 
a recommendation taken from the year 2000. If needed separate contrained and 
non-constrained use cases.


-  "Renegotiation in TLS 1.2 was replaced"

Change to "partly replaced". Diffie-Hellman, server authentication, and update 
of the exporter secret are all missing.


- Section 4.1
I am missing a recommendation related to AEAD. I would make sense to add that 
"Implementations SHOULD NOT negotiate non-AEAD cipher suites."


- "Clients SHOULD include TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as the first 
proposal to any server, unless they have prior knowledge that the server cannot 
respond to a TLS 1.2 client_hello message."

I would delere ", unless ...". This does not align with MUST NOT negotiate 1.1


-  "When using RSA, servers SHOULD authenticate using certificates with at 
least a 2048-bit modulus for the public key."

This needs to be "MUST" to alging with "MUST NOT negotiate cipher suites 
offering less than 112 bits of security"


- The document should talk about the need to start phasing out RSA-2048 and 
2048-bit DH keys which both gives 112-bit security. BSI requires that RSA-2048 
disabled by January 2023. CA Browser forum has already forbidden RSA-2048 for 
use with code signing.


- 7.1. The document should make it clear without Host Name Validation there is 
typically no authentication. The TLS handshake only provides 
proof-of-possestion of the private key and transfers certificates so that the 
application can do authentication.


Cheers,
John

From: Uta <uta-boun...@ietf.org> on behalf of internet-dra...@ietf.org 
<internet-dra...@ietf.org>
Date: Thursday, 26 May 2022 at 23:22
To: i-d-annou...@ietf.org <i-d-annou...@ietf.org>
Cc: uta@ietf.org <uta@ietf.org>
Subject: [Uta] I-D Action: draft-ietf-uta-rfc7525bis-07.txt

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Using TLS in Applications WG of the IETF.

        Title           : Recommendations for Secure Use of Transport Layer 
Security (TLS) and Datagram Transport Layer Security (DTLS)
        Authors         : Yaron Sheffer
                          Peter Saint-Andre
                          Thomas Fossati
        Filename        : draft-ietf-uta-rfc7525bis-07.txt
        Pages           : 39
        Date            : 2022-05-26

Abstract:
   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) are widely used to protect data exchanged over application
   protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the
   years, the industry has witnessed several serious attacks on TLS and
   DTLS, including attacks on the most commonly used cipher suites and
   their modes of operation.  This document provides the latest
   recommendations for ensuring the security of deployed services that
   use TLS and DTLS.  These recommendations are applicable to the
   majority of use cases.

   An earlier version of this document was published as RFC 7525 when
   the industry was in the midst of its transition to TLS 1.2.  Years
   later this transition is largely complete and TLS 1.3 is widely
   available.  This document updates the guidance given the new
   environment and obsoletes RFC 7525.  In addition, the document
   updates RFC 5288 and RFC 6066 in view of recent attacks.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-uta-rfc7525bis/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-uta-rfc7525bis-07.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-uta-rfc7525bis-07


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to