All fine.

Hilarie 
-- 


----- Original Message -----
From: "Salz, Rich" <rsalz=40akamai....@dmarc.ietf.org>
To: "Hilarie Orman via Datatracker" <nore...@ietf.org>, "secdir" 
<sec...@ietf.org>
Cc: "draft-ietf-uta-require-tls13 all" 
<draft-ietf-uta-require-tls13....@ietf.org>, last-c...@ietf.org, uta@ietf.org
Sent: Wednesday, March 26, 2025 2:32:39 PM
Subject: [secdir] Re: Secdir last call review of draft-ietf-uta-require-tls13-06

Thanks for the review! Do the following changes address your concerns? 






    * The gist of the document is "use TLS 1.3", but I cannot tell what the 


command is directed to. The title says "new protocols". Does that 


mean "new protocols that require transport layer confidentiality, 


integrity, and authentication"?? Any new protocol that specifies TLS? 


Or simply any new protocol within the IETF? Section 1 says that it 


updates Section 5 of RFC9325. but it's not clear if that is the sole 


intent of this document, or if it has a wider scope. 



The wording now says (in a couple of places) “protocols that use TLS”. 





    * "TLS 1.3 enjoys robust security proofs" sounds definitive, but I think 


that might be misleading to the average reader. There has been a 


great deal of attention paid to proving various cryptographic aspects 


of the protocol, and some attention to implementation proofs, but 


these fall short of being an ironclad guarantee that "this cannot fail in 


practice". I don't think "robust" has any useful technical meaning 


with regard to proofs. Some rephrasing might convey the idea that 


"there has been a lot of careful scrutiny of the the protocol." 




Changed to “Importantly, the protocol has had comprehensive security proofs and 
should provide excellent security without any additional configuration. “ 




    * Section 3 states "cryptographically-relevant quantum computers (CRQC), 


once available, ..." raises our expectations for these devices. 


Do they exist now, but they aren't "available" for cryptography? 


Will they exist within the lifetime of anyone reading the document 


now? It's highly debatable. I'd add a pinch more of the subjunctive 


tense to this. 




I think “once available” is good enough. Right now they can factor 15 and 21 
without resorting to “trick” numbers. Nobody knows whewn a CRQC will be 
available. I am going to leave it as-is. 




    * Section 6: "TLS 1.2 was specified with several cryptographic 


primitives and design choices that have, over time, weakened its 


security." 




Changed to “become significantly weaker.” 




Here’s a diff of the above-described changes. 

$ g diff 

diff --git a/draft-ietf-uta-require-tls13.md b/draft-ietf-uta-require-tls13.md 

index bdab073..119bec7 100644 

--- a/draft-ietf-uta-require-tls13.md 

+++ b/draft-ietf-uta-require-tls13.md 

@@ -121,10 +121,11 @@ informative: 



TLS 1.2 is in use and can be configured such that it provides good security 

properties. TLS 1.3 use is increasing, and fixes some known deficiencies 

-with TLS 

-1.2, such as removing error-prone cryptographic primitives and encrypting 

+with TLS 1.2. 

+Examples of this include 

+removing error-prone cryptographic primitives and encrypting 

more of the traffic so that it is not readable by outsiders. 

-For these reasons, new protocols must require and 

+For these reasons, new protocols that use TLS must require and 

assume the existence of TLS 1.3. 

As DTLS 1.3 is not widely available or deployed, 

this prescription does not pertain to DTLS (in any DTLS version); it pertains 
to 

@@ -144,14 +145,15 @@ deficiencies, as described in { {sec-considerations}}. 

Note that addressing them usually requires bespoke configuration. 



TLS 1.3 { {TLS13}} is also in 

-widespread use and fixes most known deficiencies with TLS 1.2, such as 

+widespread use and fixes most known deficiencies with TLS 1.2. 

+Examples of this include 

encrypting more of the traffic so that it is not readable by outsiders and 

-removing most cryptographic primitives considered dangerous. Importantly, TLS 

-1.3 enjoys robust security proofs and provides excellent security without 

+removing most cryptographic primitives considered dangerous. Importantly, the 

+protocol has had comprehensive security proofs and should provide excellent 
security without 

any additional configuration. 



This document specifies that, since TLS 1.3 use is widespread, new protocols 

-must require and assume its existence. 

+that use TLS must require and assume its existence. 

It updates { {RFC9325}} as described in { {rfc9325-updates}}. 

As DTLS 1.3 is not widely available or deployed, 

this prescription does not pertain to DTLS (in any DTLS version); it pertains 
to 

@@ -228,7 +230,7 @@ Again, these changes only apply to TLS, and not DTLS. 

# Security Considerations {#sec-considerations} 



TLS 1.2 was specified with several cryptographic primitives and design choices 

-that have, over time, weakened its security. The purpose of this section is to 

+that have, over time, become significantly weaker. The purpose of this section 
is to 

briefly survey several such prominent problems that have affected the protocol. 

It should be noted, however, that TLS 1.2 can be configured securely; it is 

merely much more difficult to configure it securely as opposed to using its 



_______________________________________________
secdir mailing list -- sec...@ietf.org
To unsubscribe send an email to secdir-le...@ietf.org
wiki: https://wiki.ietf.org/group/secdir/SecDirReview

_______________________________________________
Uta mailing list -- uta@ietf.org
To unsubscribe send an email to uta-le...@ietf.org

Reply via email to