Re: [TLS] Mirja Kühlewind's No Objection on draft-ietf-tls-tls13-26: (with COMMENT)
Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Wed, 07 March 2018 18:37 UTC
Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C836912895E; Wed, 7 Mar 2018 10:37:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TW3TxR4qhbxD; Wed, 7 Mar 2018 10:37:14 -0800 (PST)
Received: from mail-io0-x232.google.com (mail-io0-x232.google.com [IPv6:2607:f8b0:4001:c06::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3EAEF120721; Wed, 7 Mar 2018 10:37:14 -0800 (PST)
Received: by mail-io0-x232.google.com with SMTP id h23so4107698iob.11; Wed, 07 Mar 2018 10:37:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=or0eoCEh3K7si4FiYQykHLVHdiAFd6EDoneNDxRdyfM=; b=s89Ce894jE4ILYjxxaOwjIuKtFbiN61YVUqBM6htDPGc85n2DpEMKRjur03LvMJGSJ W9CIWcQIwmHM27we/JW0lwVO2c0076Vmp20Av6lCluh82WHMjOgT9hnAM7xqwGwZsc5J BzFeMh/OnlABj6xAvpt0rLq9Lok8zQjVaZ69//X5xpLD39nL2FQynadKE3YVVKGZNzWS eL8GKW+sGLPOneycGch6wQxFplVJ27qw6kzRLODv+VOCT7LgvkYbneNU3UsHQWV4I+gx iXWANBjfDDvGukEv+PCO+FnddB6bhss+QdCR0g/n3KXxU2D6YhtX3p+NgXwJ63QDoHaB roWQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=or0eoCEh3K7si4FiYQykHLVHdiAFd6EDoneNDxRdyfM=; b=DcmMunBeNBFgXAxY9OrBEfURpgVjJmeU0Kr1+UWTBN5P1jIxeHCEJkP3u3RJyHK4sm 7e6zd1L8J57VYPvp6zSjYc/t9HWtmB/HogGA54zn45xBf3cdUsTMzAwaBHIlceJ5PjQb CROIvZR+x0SWA8QPNda/seojwni169cahob+eTUzvCo+49JIUYjZXN7sr+MG2jojEL6G DoTjWwdQ0p4qlLiwH8Husw84nk+Uujf8Po1yiLrkQ8Uu2fdNVVppgrEvTxSTC/KMBizs XgF5bJHOx6tiwJILt244TyueC9vJRAslfVKgIcHE/4JcCNEzpxYaY95c7MWV7EshZVrh 822A==
X-Gm-Message-State: AElRT7FXknF+hIPzWHcLo00bZGHOdY0kGVb4Cb7GdJUEnfo9mI09PLHr bv5gxuIupYOlGSCG9YvPUfesHY6+0VIh/uFmmzI=
X-Google-Smtp-Source: AG47ELseUl+7Rc7MyIcYLF3JJ0UW4/geyW8zN8T4fPwslyckEPFH/qqKXWHYaTSreGCj0+/LAnbOBAviAaIipHjVXrU=
X-Received: by 10.107.57.4 with SMTP id g4mr16700094ioa.142.1520447833548; Wed, 07 Mar 2018 10:37:13 -0800 (PST)
MIME-Version: 1.0
Received: by 10.192.156.137 with HTTP; Wed, 7 Mar 2018 10:36:33 -0800 (PST)
In-Reply-To: <CABcZeBML9yhXvzA53QxVNk0-3pis=8pF9LYzYXqTmUvCaVRisQ@mail.gmail.com>
References: <152044072045.17779.18123788753031746068.idtracker@ietfa.amsl.com> <CABcZeBML9yhXvzA53QxVNk0-3pis=8pF9LYzYXqTmUvCaVRisQ@mail.gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Wed, 07 Mar 2018 13:36:33 -0500
Message-ID: <CAHbuEH6FW6AKKMeO1z_wm891z5qbz+7vNxwUB9tU1pRrM=1dJg@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
Cc: Mirja Kühlewind <ietf@kuehlewind.net>, "<tls@ietf.org>" <tls@ietf.org>, draft-ietf-tls-tls13@ietf.org, The IESG <iesg@ietf.org>, tls-chairs <tls-chairs@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/9sb70xZ2S5G0mhejMS8Yuc-qU_Q>
Subject: Re: [TLS] Mirja Kühlewind's No Objection on draft-ietf-tls-tls13-26: (with COMMENT)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Mar 2018 18:37:17 -0000
Thanks for your review, Mirja. I will just add one comment inline from WG discussion and consensus. On Wed, Mar 7, 2018 at 1:05 PM, Eric Rescorla <ekr@rtfm.com> wrote: >> 1) I'm a bit uncertain if obsoleting is the right approach as many >> other protocols usually do not obsolete older versions. However, I >> understand that this has been the approach TLS has previously taken >> and is supported by the way the document is written. > > Well: > https://www.ietf.org/iesg/statement/designating-rfcs-as-historic.html > says: > A document is obsolete when there is a newer version that replaces it. > > I believe that that's the relationship between TLS 1.3 and TLS 1.2. > > >> Still, I find it >> especially confusing that also two TLS1.2 extensions are deprecated >> which are not needed with TLS1.3 anymore but still probably valid to >> be used with TLS1.2, right? > > Which extensions are you referring to. > > >> I would recommend for this version to at >> least already note in the abstract or very early in the intro that it >> changes the versioning mechanism itself, and thereby basically >> declares the TLS handshake as an invariant for all future versions and >> extensibility is only provided using extensions anymore. > > It's true that we are deprecating the version mechanism, but that > does not mean that it is the only extension mechanism. > > > >> 2) Can you provide further explanation (potentially in the draft) why >> the Pre-Shared Key Exchange Modes are provided in an extra/separate >> extension? > > I'm sorry, I'm not following this. As opposed to what? > > >> 3) I know previous versions of TLS didn't say that much either, but I >> find it a bit wired that there are NO requirements for the underlaying >> transport in this document. Previous version this at least said in the >> intro that a reliable transport (like TCP) is assumed, but even this >> minimal information seems to have gotten lost in this >> document. However, I would usually also expect to seen some minimal >> text about connection handling, e.g. is it okay to transparently try >> to reestablish the connection by the underlying transport protocol if >> it broke for some reason? Or it is okay to use the same TCP connection >> to first send other data and then start the TLS handshake? > > This is pretty explicitly outside the scope of TLS. It's just the job > of the underlying transport to simulate a reliable stream. I can add > some text that that's expected. > > >> 4) Regarding the registration policies: I assume the intend of >> changing them is to make it easier to specify and use new >> extensions/mechanism. However, I am wondering why the policies have >> been changed to "Specification Required" and not "IETF consensus" or >> RFC Required"? > > The changes aren't in this document, but the WG feeling was that > both of those were creating bad incentives for people to publish > RFCs just to get a code point. The "Recommended" flag was intended > to address that need instead. The working group explicitly feels that a draft that is not published is adequate, falling into the specification required category where informal documentation is acceptable. Thanks, Kathleen > > >> 5) I find it a bit strange that basically the whole working group is >> listed as contributors. My understanding was that Contributors are >> people that have contributed a "significant" amount of text, while >> everybody else who e.g. brought ideas in during mailing list >> discussion would be acknowledged only. > > I don't think we have any IETF-wide standard here, but traditionally > we have adopted a pretty generous attitude towards acknowledgements > of this type. Given that electrons are basically free, I don't see a real > problem here. > > -Ekr > > > On Wed, Mar 7, 2018 at 8:38 AM, Mirja Kühlewind <ietf@kuehlewind.net> wrote: >> >> Mirja Kühlewind has entered the following ballot position for >> draft-ietf-tls-tls13-26: No Objection >> >> When responding, please keep the subject line intact and reply to all >> email addresses included in the To and CC lines. (Feel free to cut this >> introductory paragraph, however.) >> >> >> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html >> for more information about IESG DISCUSS and COMMENT positions. >> >> >> The document, along with other ballot positions, can be found here: >> https://datatracker.ietf.org/doc/draft-ietf-tls-tls13/ >> >> >> >> ---------------------------------------------------------------------- >> COMMENT: >> ---------------------------------------------------------------------- >> >> 1) I'm a bit uncertain if obsoleting is the right approach as many other >> protocols usually do not obsolete older versions. However, I understand >> that >> this has been the approach TLS has previously taken and is supported by >> the way >> the document is written. Still, I find it especially confusing that also >> two >> TLS1.2 extensions are deprecated which are not needed with TLS1.3 anymore >> but >> still probably valid to be used with TLS1.2, right? I would recommend for >> this >> version to at least already note in the abstract or very early in the >> intro >> that it changes the versioning mechanism itself, and thereby basically >> declares >> the TLS handshake as an invariant for all future versions and >> extensibility is >> only provided using extensions anymore. >> >> 2) Can you provide further explanation (potentially in the draft) why the >> Pre-Shared Key Exchange Modes are provided in an extra/separate extension? >> >> 3) I know previous versions of TLS didn't say that much either, but I find >> it a >> bit wired that there are NO requirements for the underlaying transport in >> this >> document. Previous version this at least said in the intro that a reliable >> transport (like TCP) is assumed, but even this minimal information seems >> to >> have gotten lost in this document. However, I would usually also expect to >> seen >> some minimal text about connection handling, e.g. is it okay to >> transparently >> try to reestablish the connection by the underlying transport protocol if >> it >> broke for some reason? Or it is okay to use the same TCP connection to >> first >> send other data and then start the TLS handshake? >> >> 4) Regarding the registration policies: I assume the intend of changing >> them is >> to make it easier to specify and use new extensions/mechanism. However, I >> am >> wondering why the policies have been changed to "Specification Required" >> and >> not "IETF consensus" or RFC Required"? >> >> 5) I find it a bit strange that basically the whole working group is >> listed as >> contributors. My understanding was that Contributors are people that have >> contributed a "significant" amount of text, while everybody else who e.g. >> brought ideas in during mailing list discussion would be acknowledged >> only. >> >> > > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls > -- Best regards, Kathleen
- [TLS] Mirja Kühlewind's No Objection on draft-iet… Mirja Kühlewind
- Re: [TLS] Mirja Kühlewind's No Objection on draft… Eric Rescorla
- Re: [TLS] Mirja Kühlewind's No Objection on draft… Kathleen Moriarty
- Re: [TLS] Mirja Kühlewind's No Objection on draft… Mirja Kuehlewind (IETF)
- Re: [TLS] Mirja Kühlewind's No Objection on draft… Eric Rescorla
- Re: [TLS] Mirja Kühlewind's No Objection on draft… Kathleen Moriarty
- Re: [TLS] Mirja Kühlewind's No Objection on draft… Mirja Kuehlewind (IETF)
- Re: [TLS] Mirja Kühlewind's No Objection on draft… Martin Thomson
- Re: [TLS] Mirja Kühlewind's No Objection on draft… Mirja Kuehlewind (IETF)