Hi Éric, see further thoughts on ECH below.

On 7/13/22 12:12 PM, Peter Saint-Andre wrote:
On 7/12/22 1:50 AM, Éric Vyncke via Datatracker wrote:
Éric Vyncke has entered the following ballot position for
draft-ietf-uta-rfc7525bis-09: No Objection

<snip/>

### Section 3.7 ESNI as a SHOULD ?

Shouldn't ESNI be a normative "SHOULD" ? Or is the non-normative text "just" to
avoid forming a cluster with ESNI draft ? Which would be sad...

There is always debate about references to works in progress. It's not clear that a protocol still being hashed out in a WG (even a protocol as important as ESNI) can be reasonably considered a best current practice, given that it's far from stable. Eventually, we assume that the IETF will publish rfc7525ter to replace rfc7525bis, at which time that BCP will include updated recommendations (including, I'd expect, ESNI and various other things that are developed between now and then).

The implication of your original comment is that the authors are trying to avoid a cluster and push this document through without a normative reference to the ECH I-D being worked on in the TLS WG.

This is not what we're trying to do. Although personally I think that ECH is consistent with RFC 3365, there are questions and concerns about ECH that need to be worked out, the protocol needs to be finalized, implementations need to be written or finished, administrators of various TLS-based systems need figure out how to deploy it properly, etc. For these reasons, I think it is simply too early to recommend ECH as a best *current* practice. Hopefully it will be so when this BCP is updated again a few years from now.

Nevertheless and in light of the above considerations, I grant that the current text might be too strong:

   Implementers are strongly encouraged to support TLS
   Encrypted Client Hello once [I-D.ietf-tls-esni] has been
   standardized.

Something like this might be more accurate:

   At the time of writing, a technology for encrypting the SNI
   (called Encrypted Client Hello) is being worked on in the TLS
   Working Group [I-D.ietf-tls-esni].  Once that method has been
   standardized and widely implemented, it will likely be appropriate
   to recommend or mandate its usage in a future version of this
   BCP.

I'd also suggest changing "this information leak is closed by use of TLS Encrypted Client Hello" to "this information leak will be closed by use of TLS Encrypted Client Hello once that method has been standardized".

I've incorporated the foregoing suggestions into a PR:

https://github.com/yaronf/I-D/pull/463

Peter

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to