Hi Sean,

Thanks for that education. Will clear my DISCUSS.

> On Apr 30, 2024, at 10:03 AM, Sean Turner <s...@sn3rd.com> wrote:
> 
> 
> 
>> On Apr 27, 2024, at 22:46, Mahesh Jethanandani via Datatracker 
>> <nore...@ietf.org> wrote:
>> 
>> Mahesh Jethanandani has entered the following ballot position for
>> draft-ietf-uta-ciphersuites-in-sec-syslog-05: Discuss
>> 
>> When responding, please keep the subject line intact and reply to all
>> email addresses included in the To and CC lines. (Feel free to cut this
>> introductory paragraph, however.)
>> 
>> 
>> Please refer to 
>> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
>> for more information about how to handle DISCUSS and COMMENT positions.
>> 
>> 
>> The document, along with other ballot positions, can be found here:
>> https://datatracker.ietf.org/doc/draft-ietf-uta-ciphersuites-in-sec-syslog/
>> 
>> 
>> 
>> ----------------------------------------------------------------------
>> DISCUSS:
>> ----------------------------------------------------------------------
>> 
>> Section 4. Paragraph 1.
>>> Implementations of [RFC5425] SHOULD NOT offer
>>> TLS_RSA_WITH_AES_128_CBC_SHA.  The mandatory to implement cipher
>>>  suite is REQUIRED to be TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256.
>> I am not a security expert and do not completely understand the reason for
>> specifying a mandatory-to-implement algorithm. So this DISCUSS could simply 
>> be
>> addressed by "this is how things are done". But curious minds would still 
>> want
>> to know ...
> 
> It is how things are done, but we need to PICK an MTI so that we can get 
> interoperability.
> 
>> The recommendation in Section 3 of the draft is that cryptographic algorithms
>> will be broken or weakened over time. That implementers need to check that
>> cryptographic algorithms continue to provide the level of security that is
>> expected of them. The implication seems to be that specifying a mandatory
>> algorithm, e.g., TLS_RSA_WITH_AES_128_CBC_SHA, forced its implementation, and
>> it was wrong to do so.
> 
> The blurb about algorithms weakening over time is just a truism and is in 
> many security considerations, e.g., RFCs 9325, 8550, and serves to motivate 
> why we need to update the MTI algorithm.  TLS_RSA_WITH_AES_128_CBC_SHA was a 
> perfectly fine algorithm back in the day (and was the MTI in TLS 1.2 at one 
> point), but now we know it’s got some issues.
> 
>> Why then is this document replacing one mandatory
>> algorithm with another mandatory algorithm? Would it not be better to 
>> recommend
>> (rather than making it mandatory) a set of cipher suites that should be
>> implemented, and/or a reference made to a document like
>> draft-ietf-tls-rfc8447bis that recommends the latest and the greatest
>> cryptographic algorithms, so we are not back at doing this five years hence?
> 
> Unfortunately, I think we’ll end up here regardless because you do need to 
> pick an MTI. You might be able to avoid it by redirection, but somewhere 
> somebody has to pick it.  NOTE: that’s not being done in 
> draft-ietf-tls-rfc8447bis, that document is added recommended column, but 
> it’s not changing the MTI.
> 
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>> 
>> More of a NIT than a comment.
>> 
>> Section 3, Last paragraph.
>>> Finally, [BCP195] [RFC9325] provides guidance on the support of
>>> [[RFC8446] and [RFC9147].
>> Seems like an extra square bracket.
> 
> Will fix.


Mahesh Jethanandani
mjethanand...@gmail.com






_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to