Mohamed Boucadair has entered the following ballot position for
draft-ietf-uta-require-tls13-09: Yes

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-uta-require-tls13/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks Rich for this document.

Thanks also to Samier for his first opsdir review.

I fully support. Some clarity is needed to unambiguously characterize which
"new protocols" we are covering. A fix for this and other edits were shared
with Rich using a PR. I'm removing that link and include the changes in the
ballot itself.

Apologies for the inconvenience.

# Title

## Clarify this is for TLS-based protocols

OLD: "New Protocols Must Require TLS 1.3"
NEW: "New Protocols with TLS Support Must Require TLS 1.3"

# Section 1

## Clarify this is for TLS-based protocols

OLD: For these reasons, new protocols must require and
NEW: For these reasons, new protocols with TLS support must require and

## minor edit

OLD: Note that addressing them usually requires bespoke configuration.
NEW: Addressing them usually requires bespoke configuration.

## minor edit

OLD:
  removing most cryptographic primitives considered dangerous. Importantly, TLS
  1.3 enjoys robust security proofs and provides excellent security without
  any additional configuration.

NEW:
  removing most cryptographic primitives considered dangerous. Importantly,
  compared to TLS1.2, TLS 1.3 provides better security without any additional
  configuration.

## Clarify this is for TLS-based protocols

OLD: This document specifies that, since TLS 1.3 use is widespread, new
protocols NEW: This document specifies that, since TLS 1.3 use is widespread,
new protocols with TLS support

# Section 3

## nit

OLD: Implications for post-quantum cryptography
NEW: Implications for Post-Quantum Cryptography (PQC)

## clarify impact + nits

OLD:
  have a huge impact on TLS traffic. To mitigate this, TLS applications
  will need to migrate to post-quantum cryptography (PQC) [PQC].
  Detailed consideration of when any application requires PQC, or when
  a CRQC is a threat they need to protect against, is beyond the

NEW:
  have a huge impact on TLS traffic (see, e.g., Section 2 of
  [I-D.ietf-pquip-pqc-engineers]). To mitigate this, TLS applications will need
  to migrate to Post-Quantum Cryptography (PQC) [PQC]. Detailed considerations
  of when an application requires PQC or when a CRQC is a threat that an
  application need to protect against, are beyond the

## nit

OLD: For TLS it is important to note that the focus of these efforts is TLS 1.3
NEW: It is important to note that the focus of these PQC efforts for TLS is TLS
1.3

## Clarify this is for TLS-based protocols

OLD: This is one more reason for new protocols to default to TLS 1.3, where
NEW: This is one more reason for new protocols requiring TLS service to default
to TLS 1.3, where

# Section 4

## nit

OLD: then clients SHOULD specify just the minimum
NEW: then clients SHOULD specify the minimum

# Section 5

## nit

OLD: RFC 9325 provides recommendations for ensuring the security of deployed
NEW: [RFC9325] provides recommendations for ensuring the security of deployed

## nit

OLD:
  At the time it was published, it described availability of TLS 1.3
  as "widely available." The transition and adoption mentioned in that
  documnent has grown, and this document now makes two small changes

NEW:
  At the time it was published, it described availability of TLS 1.3
  as "widely available". The transition and adoption mentioned in that
  document has grown, and this document now makes two small changes

## clarify this is for tls-based protocols

OLD:
  That section says that TLS 1.3 SHOULD be supported; this document says
  that for new protocols it MUST be supported.

NEW:
  That section says that TLS 1.3 SHOULD be supported; this document mandates
  that TLS 1.3 MUST be supported for new TLS-based protocols.

## nit

OLD:
  That section says that TLS 1.2 MUST be supported; this document says that
  it MAY be supported as described above.

NEW:
  That section says that TLS 1.2 MUST be supported; this document says that
  TLS 1.2 MAY be supported.

# Section 6

## nit

OLD: See [I-D.draft-ietf-tls-deprecate-obsolete-kex] for details.
NEW: See [I-D.ietf-tls-deprecate-obsolete-kex] for details.

## nit

OLD: years exploiting CBC cipher suites; refer to e.g. [CBCSCANNING]
OLD: years exploiting CBC cipher suites; refer to, e.g., [CBCSCANNING]

Cheers,
Med



_______________________________________________
Uta mailing list -- uta@ietf.org
To unsubscribe send an email to uta-le...@ietf.org

Reply via email to