Special thanks to Valery Smyslov for the shepherd's write-up including the WG
consensus ***but it lacks*** the justification of the intended status.
It updated 9325 which is a BCP, so this must also be BCP.

Other thanks to Scott Rose, the DNS directorate reviewer, please consider this
int-dir review and one typo:
https://urldefense.com/v3/__https://datatracker.ietf.org/doc/review-ietf-uta-require-tls13-10-dnsdir-telechat-rose-2025-03-27/__;!!GjvTz_vk!TjD_WBwLk_w5P06IDyz1lfWp5lv4kCmrEGLde368Zw2kt8T_W812ClwqXC6A36IcbykS7XlrZ_OV$<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/review-ietf-uta-require-tls13-10-dnsdir-telechat-rose-2025-03-27/__;!!GjvTz_vk!TjD_WBwLk_w5P06IDyz1lfWp5lv4kCmrEGLde368Zw2kt8T_W812ClwqXC6A36IcbykS7XlrZ_OV$>
(and I have read reply)

Already fixed in editor’s copy.
## COMMENTS (non-blocking)

### Title

Should the title be "At Least v1.3 of TLS" ?

The WG discussed this and since we don’t know what future versions will have, 
the consensus was not to do that.

### Abstract

The sentence about example does not really fit an abstract, please remove.
It was a rewording in responses to a SECDIR review.  I will remove it from the 
abstract and leave it in the introduction.

Unsure how to read `fixed weaknesses in TLS 1.2` ? I.e, if they are fixed, then
why move to TLS 1.3 ?

Weakness refers to the deficiencies mentioned above (now with no explanation of 
what they are :).  Not *all* weaknesses.

### Section 1

The first paragraph is somehow self-contradicting "good security properties"
vs. "several deficiencies" vs. "bespoke configuration".

I don’t see it.  It CAN be good if you set the right configuration, but there 
are some fundamental deficiencies (e.g., no PQ, SNI in plaintext) that make it 
less good than using TLS 1.3

### Section 4

I would remove the DoT counter-example, it is only confusing.
Given the recent IoT discussion in the last-call mailing list I want to keep it.

Isn't the set of crypto algorithms also part of the negotiation ? I.e., a
'stupid' configuration could have TLS 1.2 with really good crypto and TLS 1.3
with average one (in a couple of years). Should the text mention this as well ?

We don’t expect TLS 1.3 ciphers to become weak until there is a 
cryptographically relevant quantum computer. The TLS 1.3 choices pick the best 
of the TLS 1.2 list of available algorithms so I don’t think your suggestion is 
valid.

### Section 6

While this section proposes mitigations to some attacks against TLS 1.2, it
does not do so for *all* attacks while section claims that bespoke
configuration can fix all weaknesses of TLS 1.2.

I assume “while section [introduction] claims…”. It doesn’t say it can fix all 
weaknesses. It says you can get GOOD security.

_______________________________________________
Uta mailing list -- uta@ietf.org
To unsubscribe send an email to uta-le...@ietf.org

Reply via email to