[TLS] Mohamed Boucadair's No Objection on draft-ietf-tls-deprecate-obsolete-kex-07: (with COMMENT)

Mohamed Boucadair via Datatracker <noreply@ietf.org> Fri, 14 November 2025 14:47 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: tls@ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from [10.244.8.105] (unknown [4.156.85.76]) by mail2.ietf.org (Postfix) with ESMTP id 9839C8981443; Fri, 14 Nov 2025 06:47:04 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Mohamed Boucadair via Datatracker <noreply@ietf.org>
To: The IESG <iesg@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 12.54.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <176313162428.105009.2963929103372038038@dt-datatracker-5bd94c585b-wk4l4>
Date: Fri, 14 Nov 2025 06:47:04 -0800
Message-ID-Hash: NPNADVHVXBNW42RWI6XQKPQGXBHNKETI
X-Message-ID-Hash: NPNADVHVXBNW42RWI6XQKPQGXBHNKETI
X-MailFrom: noreply@ietf.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: draft-ietf-tls-deprecate-obsolete-kex@ietf.org, tls-chairs@ietf.org, tls@ietf.org
X-Mailman-Version: 3.3.9rc6
Reply-To: Mohamed Boucadair <mohamed.boucadair@orange.com>
Subject: [TLS] Mohamed Boucadair's No Objection on draft-ietf-tls-deprecate-obsolete-kex-07: (with COMMENT)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/62K4AfISpgLMUDa1J2lvem5PsGQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

Mohamed Boucadair has entered the following ballot position for
draft-ietf-tls-deprecate-obsolete-kex-07: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-tls-deprecate-obsolete-kex/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Hi Nimrud,

Thank you for the new version -07. The new version is a real enhancement
compared to the previous version I reviewed [1].

I'm afraid the following points are still applicable from my previous ballot
[2]:

# Why are we repeating recommendations that are already in RFC9325?

CURRENT:
   Clients SHOULD NOT offer and servers SHOULD NOT select non-ephemeral
   ECDH cipher suites in (D)TLS 1.2 connections.

# Overlapping/interference with 9325

CURRENT:
   Therefore, clients and
   servers MAY offer FFDHE cipher suites in (D)TLS 1.3 connections.

To what extent is this redundant with the considerations already in RFC9325?

More importantly, the risk I see with isolating this recommendation is that we
decouple it from other recommendations that impose some constraints on their
use:

(Section 7.4 of RFC9325)
   *  TLS implementations SHOULD NOT use static finite-field DH keys and
      SHOULD NOT reuse ephemeral finite-field DH keys across multiple
      connections.

Cheers,
Med

[1]
https://author-tools.ietf.org/iddiff?url2=draft-ietf-tls-deprecate-obsolete-kex-07

[2] https://mailarchive.ietf.org/arch/msg/tls/zuBej7aWFjQuSHSKeIlr8FS-6N8/