[TLS] Re: AD review draft-ietf-tls-rfc8447bis-10
Sean Turner <sean@sn3rd.com> Fri, 07 March 2025 17:52 UTC
Return-Path: <sean@sn3rd.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 3A9B68E7A57 for <tls@mail2.ietf.org>; Fri, 7 Mar 2025 09:52:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p2djiTtD0t_t for <tls@mail2.ietf.org>; Fri, 7 Mar 2025 09:52:11 -0800 (PST)
Received: from mail-qt1-x82b.google.com (mail-qt1-x82b.google.com [IPv6:2607:f8b0:4864:20::82b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id C53958E7A4A for <tls@ietf.org>; Fri, 7 Mar 2025 09:52:11 -0800 (PST)
Received: by mail-qt1-x82b.google.com with SMTP id d75a77b69052e-47662449055so853441cf.1 for <tls@ietf.org>; Fri, 07 Mar 2025 09:52:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; t=1741369931; x=1741974731; darn=ietf.org; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:from:to:cc:subject:date:message-id:reply-to; bh=wBh7mfFE6o8wRQqwWBTCLnlTn+ErtwO4iedqef6w3AU=; b=F/RMdGhB8LremTq5jrHh9JQKGmLcwJQU+LtECQg7dGMf4NQR8I3rh4NMYzb+8pBCLm y+mWoWF/O9jsS02HWRfc3uVY+e1UcSdbzSgmliHLmYuEo2IFczPeWmLJYQYHyaxlx3jX 3i13A0P5FeBcdbscMcO8fWMQGojzjqXNIQu7o=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1741369931; x=1741974731; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=wBh7mfFE6o8wRQqwWBTCLnlTn+ErtwO4iedqef6w3AU=; b=awRNJc4FpShwoLBrOsgk+jHF9KKzNgnpLVl+bf76O3aTSZ/1yWvxv706iW1iAAiy9g K87U+dzXpkKPdVb0+UalnWEzDM5o6AeLPk2601MEP3pq/WXWNdwQd60jR20WiJRu0Guw /mlPy1oXwvRg/pYqbmmbz4neMs7v/85gkCo7OQ3BxLXRjKFDJYNg9iJW2CfVqqHPHUGV cUAbkvsIjS6gAnYBb5Kv3etrinMZuOMDT/vvfqexj6/RmDKx316+iYBJ4VzgqV6purT8 HDMq66aeBRsqpT+TPrYnt2C6yOK9zHgCtQxE6KerlsAORmb9bXuTnpl/hO9QOSD3uDOg yt8Q==
X-Gm-Message-State: AOJu0Ywkq4SinYQDMWkbd9Bk+WoNJC2hFrzXObfJI6W+V35jbq6DAHuV KOzq82oC0Zcoo6WAlHaHvTlQ5UGx8UY7Ac555EL6K0gcCPmlXSDRoDI0JB5B1rB45iHM7BbNz8d a
X-Gm-Gg: ASbGncuk2idbdxdjpUNzEQW5LhUf/Ofn7VZcq/JDoBb6EcUDfZNYJTwCvXeWCrxw5iV eSiY9T2VzlAQqlQZkCNMUiD06v4MH7nhMB7AOIioabcJPI17pm5UEBKSH4hQFojNdKhZ05CKLKv YmoUFhy4sxw244KLt4Pmxn/5/q/9n+qN+ultx06gLLTdsW4Gz0K/oHBBt8+tCcMXqCNChoQU8VV rnds41QOQtXEPvU0ek88FwTQtjjvRiDUWK+kDan5sn46Wwo3jRfNvA++GklUVeAS7oDMnuVKE+D JaXXPys7uK3T5iOCdxx6psSyVK4G8cg2VMIbw0WynkbyCwnSLxqcch1rQnN0sefFHg==
X-Google-Smtp-Source: AGHT+IFr7uBa1PjI2Ms/A3p9cXTWZc3j66pud5VghBelyLJA6fxe7YFTNe5Xmx1TF9OWSSG460Zhqw==
X-Received: by 2002:ac8:5dd0:0:b0:471:bedc:5d72 with SMTP id d75a77b69052e-4761097faaamr56876111cf.15.1741369931209; Fri, 07 Mar 2025 09:52:11 -0800 (PST)
Received: from smtpclient.apple ([2600:4040:252a:8d00:847b:163e:d6df:88ec]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-4751d94b20bsm22677211cf.16.2025.03.07.09.52.09 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 07 Mar 2025 09:52:10 -0800 (PST)
From: Sean Turner <sean@sn3rd.com>
Message-Id: <F0DE2499-2422-4F72-B0AD-8CA90A20F152@sn3rd.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_CD846032-F8DD-42A7-B48D-37682B9AD9D1"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3826.400.131.1.6\))
Date: Fri, 07 Mar 2025 12:51:49 -0500
In-Reply-To: <CAGL5yWZy1xXLTVGhj3s_gNCoph_3XcShO7DWm=aDsYR1ySvY6g@mail.gmail.com>
To: Paul Wouters <paul.wouters=40aiven.io@dmarc.ietf.org>
References: <CAGL5yWZy1xXLTVGhj3s_gNCoph_3XcShO7DWm=aDsYR1ySvY6g@mail.gmail.com>
X-Mailer: Apple Mail (2.3826.400.131.1.6)
Message-ID-Hash: RPJ5LPBNLX4AMM6VQHWGABMHDWL2KIS5
X-Message-ID-Hash: RPJ5LPBNLX4AMM6VQHWGABMHDWL2KIS5
X-MailFrom: sean@sn3rd.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: TLS List <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: AD review draft-ietf-tls-rfc8447bis-10
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/plubZSdt2fnoYtowOy9P3tLTNeY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
> On Mar 6, 2025, at 9:33 PM, Paul Wouters <paul.wouters=40aiven.io@dmarc.ietf.org> wrote: > > AD review of draft-ietf-tls-rfc8447bis-10 > > I have some comments and small change requests. Do let me know if I got it wrong. Will do. BTW - one choice for you below. > Section 3 > > Setting a value to "Y" or "D" in the "Recommended" column requires > IETF Standards Action [RFC8126]. Any state transition to or from a > "Y" or "D" value requires IESG Approval. > > Isn't this easier written as: > > Setting a value to "Y" or "D" in the "Recommended" column requires > IETF Standards Action [RFC8126] or IESG Approval. > > This appears in a number of sections in the document. This sentence structure appears in 10 places. The same types of sentences appear in 5 places in RFC 8447, but there is it "Y" and "N" not “Y" an "D". This I-D updates all of those 5 in RFC 8447, so sure we can make this change. > Section 4 TLS ExtensionType Values > > Values with the first byte in the range 0-254 (decimal) are > assigned via Specification Required [RFC8126]. Values with the > first byte 255 (decimal) are reserved for Private Use [RFC8126]. > > I'd rather not let IANA figure out decimal network order byte math. Or > require everyone to do that math when checking the registry. Why not: > > Values in the range 0-65279 are assigned via Specification Required > [RFC8126]. Values in the range 65280-65535 are reserved for Private > Use [RFC8126]. > > Also, this is not true for: > > 65281 renegotiation_info > > which is clearly not usable for Private Use. Maybe it makes sense to say: > > Values in the range 0-65279 are assigned via Specification Required > [RFC8126]. Values in the range 65280-65295 are Reserved. Values in > the range 65296-65535 are reserved for Private Use [RFC8126]. > > This then leaves 0xff00-0xff0f for whatever the reason for 65281 was to be > able to happen a few more times, and keep the private range valid without > strange exceptions. I don’t think that has actually been much of a problem because it has been specified this way since RFC 4346. So, we got two options: 1) leave it alone 2) drop the offending text because we are not changing anything WRT to the ranges in those 3 sections. If we do that I would suggest: OLD: * Change the registration procedure to: Values with the first byte in the range 0-254 (decimal) are assigned via Specification Required [RFC8126]. Values with the first byte 255 (decimal) are reserved for Private Use [RFC8126]. Setting a "Recommended" column value to "Y" or "D" requires Standards Action [RFC8126]. Any state transition to or from a "Y" or "D" value requires IESG Approval. NEW: * Adjust the registration procedure related to setting the “Recommended” column as follows: Setting a value to "Y" or "D" in the "Recommended" column requires IETF Standards Action [RFC8126] or IESG Approval. Which do you prefer? > Section 5 TLS Cipher Suites Registry > > This section contains some reasoning why it is Discouraging things. The current > IANA registry also contains such reasoning on the form of notes, but this section > does not add to the notes. So now this inforation is splintered between RFC and > Registry. I think the easiest fix is to add these few reasons specified here > as Note: to the IANA registry. > > > Note that this registry states: > > When this registry is modified, the YANG module > "iana-tls-cipher-suite-algs" [iana-tls-cipher-suite-algs] must > be updated as defined in [RFC9645]. > > Has this happened or is it scheduled? If so who is the contact I can follow up with? The YANG module is empty right now so I assume it needs to be scheduled. I assume IANA will run this as part of their IANA Actions process. Confirming with Kent now. > Section 6 TLS Supported Groups > > * Replace the registry range table note column for the 0-255, > 512-65535 range with "Unallocated". > > This makes no sense. That current line with its note reads: > > 0-255, 512-65535 Specification Required Elliptic curve groups > > I understand that the note should remove the text "Elliptic curve groups", > but it makes no sense to add "Unallocated" because the range does have > allocations in it. Maybe just instruct IANA to remove the note "Elliptic > curve groups" ? I can get behind that. > Section 11 TLS ClientCertificateTypes registry > > The registry name is not "TLS ClientCertificateTypes" registry, but > "TLS ClientCertificateTypes Identifiers" registry. You are correct! spt
- [TLS] AD review draft-ietf-tls-rfc8447bis-10 Paul Wouters
- [TLS] Re: AD review draft-ietf-tls-rfc8447bis-10 Sean Turner
- [TLS] Re: AD review draft-ietf-tls-rfc8447bis-10 Sean Turner
- [TLS] Re: AD review draft-ietf-tls-rfc8447bis-10 Sean Turner