Éric Vyncke has entered the following ballot position for
draft-ietf-uta-require-tls13-10: Yes

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-uta-require-tls13/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


# Éric Vyncke, INT AD, comments for draft-ietf-uta-require-tls13-10

CC @evyncke

Thank you for the work put into this document. It is always useful to stress
the important security standards.

Please find below some non-blocking COMMENT points (but replies would be
appreciated even if only for my own education).

Special thanks to Valery Smyslov for the shepherd's write-up including the WG
consensus ***but it lacks*** the justification of the intended status.

Other thanks to Scott Rose, the DNS directorate reviewer, please consider this
int-dir review and one typo:
https://datatracker.ietf.org/doc/review-ietf-uta-require-tls13-10-dnsdir-telechat-rose-2025-03-27/
(and I have read reply)

I hope that this review helps to improve the document,

Regards,

-éric

## COMMENTS (non-blocking)

### Title

Should the title be "At Least v1.3 of TLS" ?

### Abstract

The sentence about example does not really fit an abstract, please remove.

Unsure how to read `fixed weaknesses in TLS 1.2` ? I.e, if they are fixed, then
why move to TLS 1.3 ?

### Section 1

The first paragraph is somehow self-contradicting "good security properties"
vs. "several deficiencies" vs. "bespoke configuration".

### Section 4

I would remove the DoT counter-example, it is only confusing.

Isn't the set of crypto algorithms also part of the negotiation ? I.e., a
'stupid' configuration could have TLS 1.2 with really good crypto and TLS 1.3
with average one (in a couple of years). Should the text mention this as well ?

### Section 6

While this section proposes mitigations to some attacks against TLS 1.2, it
does not do so for *all* attacks while section claims that bespoke
configuration can fix all weaknesses of TLS 1.2.



_______________________________________________
Uta mailing list -- uta@ietf.org
To unsubscribe send an email to uta-le...@ietf.org

Reply via email to