[TLS] Re: AD review draft-ietf-tls-rfc8447bis-10

Sean Turner <sean@sn3rd.com> Fri, 07 March 2025 17:52 UTC

Return-Path: <sean@sn3rd.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 3A9B68E7A57 for <tls@mail2.ietf.org>; Fri, 7 Mar 2025 09:52:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p2djiTtD0t_t for <tls@mail2.ietf.org>; Fri, 7 Mar 2025 09:52:11 -0800 (PST)
Received: from mail-qt1-x82b.google.com (mail-qt1-x82b.google.com [IPv6:2607:f8b0:4864:20::82b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id C53958E7A4A for <tls@ietf.org>; Fri, 7 Mar 2025 09:52:11 -0800 (PST)
Received: by mail-qt1-x82b.google.com with SMTP id d75a77b69052e-47662449055so853441cf.1 for <tls@ietf.org>; Fri, 07 Mar 2025 09:52:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; t=1741369931; x=1741974731; darn=ietf.org; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:from:to:cc:subject:date:message-id:reply-to; bh=wBh7mfFE6o8wRQqwWBTCLnlTn+ErtwO4iedqef6w3AU=; b=F/RMdGhB8LremTq5jrHh9JQKGmLcwJQU+LtECQg7dGMf4NQR8I3rh4NMYzb+8pBCLm y+mWoWF/O9jsS02HWRfc3uVY+e1UcSdbzSgmliHLmYuEo2IFczPeWmLJYQYHyaxlx3jX 3i13A0P5FeBcdbscMcO8fWMQGojzjqXNIQu7o=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1741369931; x=1741974731; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=wBh7mfFE6o8wRQqwWBTCLnlTn+ErtwO4iedqef6w3AU=; b=awRNJc4FpShwoLBrOsgk+jHF9KKzNgnpLVl+bf76O3aTSZ/1yWvxv706iW1iAAiy9g K87U+dzXpkKPdVb0+UalnWEzDM5o6AeLPk2601MEP3pq/WXWNdwQd60jR20WiJRu0Guw /mlPy1oXwvRg/pYqbmmbz4neMs7v/85gkCo7OQ3BxLXRjKFDJYNg9iJW2CfVqqHPHUGV cUAbkvsIjS6gAnYBb5Kv3etrinMZuOMDT/vvfqexj6/RmDKx316+iYBJ4VzgqV6purT8 HDMq66aeBRsqpT+TPrYnt2C6yOK9zHgCtQxE6KerlsAORmb9bXuTnpl/hO9QOSD3uDOg yt8Q==
X-Gm-Message-State: AOJu0Ywkq4SinYQDMWkbd9Bk+WoNJC2hFrzXObfJI6W+V35jbq6DAHuV KOzq82oC0Zcoo6WAlHaHvTlQ5UGx8UY7Ac555EL6K0gcCPmlXSDRoDI0JB5B1rB45iHM7BbNz8d a
X-Gm-Gg: ASbGncuk2idbdxdjpUNzEQW5LhUf/Ofn7VZcq/JDoBb6EcUDfZNYJTwCvXeWCrxw5iV eSiY9T2VzlAQqlQZkCNMUiD06v4MH7nhMB7AOIioabcJPI17pm5UEBKSH4hQFojNdKhZ05CKLKv YmoUFhy4sxw244KLt4Pmxn/5/q/9n+qN+ultx06gLLTdsW4Gz0K/oHBBt8+tCcMXqCNChoQU8VV rnds41QOQtXEPvU0ek88FwTQtjjvRiDUWK+kDan5sn46Wwo3jRfNvA++GklUVeAS7oDMnuVKE+D JaXXPys7uK3T5iOCdxx6psSyVK4G8cg2VMIbw0WynkbyCwnSLxqcch1rQnN0sefFHg==
X-Google-Smtp-Source: AGHT+IFr7uBa1PjI2Ms/A3p9cXTWZc3j66pud5VghBelyLJA6fxe7YFTNe5Xmx1TF9OWSSG460Zhqw==
X-Received: by 2002:ac8:5dd0:0:b0:471:bedc:5d72 with SMTP id d75a77b69052e-4761097faaamr56876111cf.15.1741369931209; Fri, 07 Mar 2025 09:52:11 -0800 (PST)
Received: from smtpclient.apple ([2600:4040:252a:8d00:847b:163e:d6df:88ec]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-4751d94b20bsm22677211cf.16.2025.03.07.09.52.09 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 07 Mar 2025 09:52:10 -0800 (PST)
From: Sean Turner <sean@sn3rd.com>
Message-Id: <F0DE2499-2422-4F72-B0AD-8CA90A20F152@sn3rd.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_CD846032-F8DD-42A7-B48D-37682B9AD9D1"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3826.400.131.1.6\))
Date: Fri, 07 Mar 2025 12:51:49 -0500
In-Reply-To: <CAGL5yWZy1xXLTVGhj3s_gNCoph_3XcShO7DWm=aDsYR1ySvY6g@mail.gmail.com>
To: Paul Wouters <paul.wouters=40aiven.io@dmarc.ietf.org>
References: <CAGL5yWZy1xXLTVGhj3s_gNCoph_3XcShO7DWm=aDsYR1ySvY6g@mail.gmail.com>
X-Mailer: Apple Mail (2.3826.400.131.1.6)
Message-ID-Hash: RPJ5LPBNLX4AMM6VQHWGABMHDWL2KIS5
X-Message-ID-Hash: RPJ5LPBNLX4AMM6VQHWGABMHDWL2KIS5
X-MailFrom: sean@sn3rd.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: TLS List <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: AD review draft-ietf-tls-rfc8447bis-10
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/plubZSdt2fnoYtowOy9P3tLTNeY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>


> On Mar 6, 2025, at 9:33 PM, Paul Wouters <paul.wouters=40aiven.io@dmarc.ietf.org> wrote:
> 
> AD review of draft-ietf-tls-rfc8447bis-10
> 
> I have some comments and small change requests. Do let me know if I got it wrong.

Will do.  BTW - one choice for you below.

> Section 3
> 
>         Setting a value to "Y" or "D" in the "Recommended" column requires
>         IETF Standards Action [RFC8126]. Any state transition to or from a
>         "Y" or "D" value requires IESG Approval.
>         
> Isn't this easier written as:
> 
>         Setting a value to "Y" or "D" in the "Recommended" column requires
>         IETF Standards Action [RFC8126] or IESG Approval.
> 
> This appears in a number of sections in the document.

This sentence structure appears in 10 places. The same types of sentences appear in 5 places in RFC 8447, but there is it "Y" and "N" not “Y" an "D". This I-D updates all of those 5 in RFC 8447, so sure we can make this change.

> Section 4 TLS ExtensionType Values
> 
>         Values with the first byte in the range 0-254 (decimal) are
>         assigned via Specification Required [RFC8126].  Values with the
>         first byte 255 (decimal) are reserved for Private Use [RFC8126].
> 
> I'd rather not let IANA figure out decimal network order byte math. Or
> require everyone to do that math when checking the registry. Why not:
> 
>         Values in the range 0-65279 are assigned via Specification Required
>         [RFC8126]. Values in the range 65280-65535 are reserved for Private
>         Use [RFC8126].
> 
> Also, this is not true for:
> 
>         65281   renegotiation_info
> 
> which is clearly not usable for Private Use. Maybe it makes sense to say:
> 
>         Values in the range 0-65279 are assigned via Specification Required
>         [RFC8126]. Values in the range 65280-65295 are Reserved. Values in
>         the range 65296-65535 are reserved for Private Use [RFC8126].
> 
> This then leaves 0xff00-0xff0f for whatever the reason for 65281 was to be
> able to happen a few more times, and keep the private range valid without
> strange exceptions.

I don’t think that has actually been much of a problem because it has been specified this way since RFC 4346.  So, we got two options:

1) leave it alone
2) drop the offending text because we are not changing anything WRT to the ranges in those 3 sections. If we do that I would suggest:

OLD:

*  Change the registration procedure to:

    Values with the first byte in the range 0-254 (decimal) are assigned
    via Specification Required [RFC8126].  Values with the first byte
    255 (decimal) are reserved for Private Use [RFC8126].  Setting a
    "Recommended" column value to "Y" or "D" requires Standards Action [RFC8126].
    Any state transition to or from a "Y" or "D" value requires
    IESG Approval.

NEW:

 *  Adjust the registration procedure related to setting the “Recommended” column as follows:

  Setting a value to "Y" or "D" in the "Recommended" column requires
  IETF Standards Action [RFC8126] or IESG Approval.

Which do you prefer?

> Section 5  TLS Cipher Suites Registry
> 
> This section contains some reasoning why it is Discouraging things. The current
> IANA registry also contains such reasoning on the form of notes, but this section
> does not add to the notes. So now this inforation is splintered between RFC and
> Registry. I think the easiest fix is to add these few reasons specified here
> as Note: to the IANA registry.
> 
> 
> Note that this registry states:
> 
>         When this registry is modified, the YANG module
>         "iana-tls-cipher-suite-algs" [iana-tls-cipher-suite-algs] must
>         be updated as defined in [RFC9645].
> 
> Has this happened or is it scheduled? If so who is the contact I can follow up with?

The YANG module is empty right now so I assume it needs to be scheduled. I assume IANA will run this as part of their IANA Actions process.  Confirming with Kent now.

> Section 6 TLS Supported Groups
> 
>         * Replace the registry range table note column for the 0-255,
>           512-65535 range with "Unallocated".
> 
> This makes no sense. That current line with its note reads:
> 
>         0-255, 512-65535        Specification Required  Elliptic curve groups
> 
> I understand that the note should remove the text "Elliptic curve groups",
> but it makes no sense to add "Unallocated" because the range does have
> allocations in it. Maybe just instruct IANA to remove the note "Elliptic
> curve groups" ?

I can get behind that.

> Section 11 TLS ClientCertificateTypes registry
> 
> The registry name is not "TLS ClientCertificateTypes" registry, but
> "TLS ClientCertificateTypes Identifiers" registry.

You are correct!

spt