On 7/19/22 10:44 AM, Peter Saint-Andre wrote:
One more small note below...

On 7/19/22 10:30 AM, Rob Wilton (rwilton) wrote:

<snip/>

You may want to consider whether it is worth making it clearer, either in the titles or the first intro paragraph, in section of 3.1.1/3.1.2 that the protocol version requirements are specifically about implementations, and deployments are allowed/encouraged to restrict deployments to later TLS versions where reasonable/appropriate. Otherwise, I suspect that readers may well have both implementations and deployments in their head when they read this section.

Good point. I'll look at the entire document again from this perspective and see where we might add some clarifying text.

I found a good place for some amplifying text, at the end of the following paragraph in the introduction.

OLD

   These are minimum recommendations for the use of TLS in the vast
   majority of implementation and deployment scenarios, with the
   exception of unauthenticated TLS (see Section 5).  Other
   specifications that reference this document can have stricter
   requirements related to one or more aspects of the protocol, based on
   their particular circumstances (e.g., for use with a particular
   application protocol); when that is the case, implementers are
   advised to adhere to those stricter requirements.  Furthermore, this
   document provides a floor, not a ceiling, so stronger options are
   always allowed (e.g., depending on differing evaluations of the
   importance of cryptographic strength vs. computational load).

NEW

   These are minimum recommendations for the use of TLS in the vast
   majority of implementation and deployment scenarios, with the
   exception of unauthenticated TLS (see Section 5). Other
   specifications that reference this document can have stricter
   requirements related to one or more aspects of the protocol, based on
   their particular circumstances (e.g., for use with a particular
   application protocol); when that is the case, implementers are
   advised to adhere to those stricter requirements. Furthermore, this
   document provides a floor, not a ceiling: where feasible,
   administrators of services are encouraged to go beyond the minimum
   support available in implementations to provide the strongest
   security possible. For example, based on knowledge about the deployed
   base for an existing application protocol and a cost-benefit analysis
   regarding cryptographic strength vs. computational load, a given
   service provider might decide to disable TLS 1.2 entirely and offer
   only TLS 1.3.

See https://github.com/yaronf/I-D/pull/469/files

Peter

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to