[TLS] Secdir last call review of draft-ietf-tls-oldversions-deprecate-09

Adam Montville via Datatracker <noreply@ietf.org> Mon, 23 November 2020 15:25 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: tls@ietf.org
Delivered-To: tls@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id CD1383A044E; Mon, 23 Nov 2020 07:25:43 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Adam Montville via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: last-call@ietf.org, draft-ietf-tls-oldversions-deprecate.all@ietf.org, tls@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.23.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <160614514380.28200.9053950536344915172@ietfa.amsl.com>
Reply-To: Adam Montville <adam.montville.sdo@gmail.com>
Date: Mon, 23 Nov 2020 07:25:43 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/kCMvL96ZeMk2Qz3DjPd4SERFSU4>
Subject: [TLS] Secdir last call review of draft-ietf-tls-oldversions-deprecate-09
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2020 15:25:44 -0000

Reviewer: Adam Montville
Review result: Ready

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

The summary of the review is READY.

It's a short, but comprehensive document deprecating use of TLS v1.1 and v1.2,
and DTLS v1.0. This deprecation avoids reliance upon weak
ciphersuites/cryptographic primitives, and should help focus implementations on
a reduced number of requirements (i.e. no fall-back to weak protocols), which
ideally results in fewer implementation errors.