Re: [Uta] Robert Wilton's Discuss on draft-ietf-uta-rfc7525bis-09: (with DISCUSS and COMMENT)

"Rob Wilton (rwilton)" <rwilton@cisco.com> Fri, 15 July 2022 09:25 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0D03C18872F; Fri, 15 Jul 2022 02:25:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.605
X-Spam-Level:
X-Spam-Status: No, score=-9.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Y64tA0nr; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=PmCgbJej
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9GBO4t4Iz9_7; Fri, 15 Jul 2022 02:25:49 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C2E50C18872C; Fri, 15 Jul 2022 02:25:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8984; q=dns/txt; s=iport; t=1657877116; x=1659086716; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=gmPceq6TW8cnudDBf+h33HxHGSvoJRDrzS9IcC1S6jk=; b=Y64tA0nrm5slwgHaVJCHKZRYzs9SV2xUXRyCwNIS1w7Y7d+7bsX2DYtq RayEr9A9KLBZQlnlUb5xc4npfl6kRtajFrS2WzLM8ujk+iV3KdiM46yv1 VRavNcBY7gpNvLPP7qKKy6BfXhn8fqFwxzSF/C0KuS0p81YW0PGV+F/gk k=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:Qk6MKR1qvbWAs0LksmDPr1BlVkEcU/3cMg0U788hjLRDOuSm8o/5N UPSrfNqkBfSXIrd5v4F7oies63pVWEap5rUtncEfc9AUhYfgpAQmAotSMeOFUz8KqvsaCo3V MRPXVNo5Te1K09QTc3/fFbV5Ha16G16Jw==
IronPort-Data: A9a23:STi+3KOsJjb4vrvvrR1Kl8FynXyQoLVcMsEvi/4bfWQNrUorgmcDy 2EbXmzQP6qCNDOgf4gkOdu/o09V68TSyoNgSXM5pCpnJ55oRWUpJjg4wmPYZX76whjrFRo/h ykmQoCcaphyFBcwnz/1WlTbhSEUOZqgG/ytUoYoBggrHVU+EHh41Eo68wIEqtcAbeaRUlvlV eza+6UzCHf9s9KjGjtJg04rgEoHUMXa4Fv0jHRnDRx4lAO2e00uMX4qDfrZw00U7WVjNrXSq +7rlNlV945ClvsnIovNfr3TKiXmTlNOVOSDoiI+ZkSsvvRNjnQ01okUMMo6Ul1GkCeZkZNg4 +pPiZPlHG/FPoWU8AgcexBcFyc7Nqpc9fqaZ3O+qseUiUbBdhMAwd03UxpwZtNeo70xWDoen RAbAGhlghSrnf23xK68TMFnh98oK4/gO4Z3VnRInGiBXKZ/GM2dK0nMzeBI4SZp2edvIf3TP eApUwI0TEjvOSQabz/7D7pnzLv32RETaQZwrF+Uq6gf+HXVwRA3y7WFGMfJc/SLSNlb2EGCq Qru4njwRxoaPd2F0hKE/26iwOjVkkvTVJgbGqH99/N2jhiO2mVWEhMdCgbh/PO4kWa/Vs5Rb UsO9UIGrKUp+2SqQ8XzGRqirxaspQIEVsZdCcUh9BmA1qfOpQecblXoVRZIbNgg8cQxXzFvi xmCnsjiAnpkt7j9pW+hGqm89TW2FgcRHUk5fz4fXxsLoMjIn4MPgUeaJjp8K5KdgtrwEDD25 jmFqikimrke5fLnMY3mozgrZBrx+/D0oh4JChb/BTn8t1wnDGKxT8n5twaEvK8owJOxFAHpg ZQSpySJAAni57mkkCiARo3h95n2uq7ca1UwbbOTdqTNGhyk/3qlOItX+jw7eQFiM90PfnniZ 0q7VeJtCH17YSTCgUxfOt/Z5yEWIU7IToiNuhf8NYEmX3SJXFXblByCnGbJt4wXrGAikLskJ bCQetu2AHARBMxPlWTrGLdHiuNwl3lvlQs/oKwXKTz6jtJyg1bIFt843KemNYjVEYvd+lyOq oYDXyd040wGC7WWjtbrHX47dABWcidT6WHeoM1MfenLORt9BGwkEJfsLUAJJeRYc1Buvr6Qp BmVAxYAoHKm3CGvAVjaOxhLNeK0Nb4i/C1TFXJ3Zz6AhSN8CbtDGY9CLfPbi5F9qrw6pRO1J tFYE/i97gNnG2uZpmxAPMmhxGGgHTzy7T+z0+OeSGBXV/Zdq8bho7cIoiOHGPEyMxeK
IronPort-HdrOrdr: A9a23:pCdQv65nacAH0GO3mgPXwXyBI+orL9Y04lQ7vn2ZFiY6TiXIra +TdaoguSMc0AxhJE3Jmbi7Sc29qADnhOFICO4qTPuftWjdySaVxeRZjLcKrAeQYxEWmtQtt5 uINpIOdeEYbmIKwvoSgjPIaOrIqePvmMvD6IeurEuFDzsaEZ2IhD0JbTpzZ3cGPTWucqBJcq Z0iPA3wgaISDAyVICWF3MFV+/Mq5ngj5T9eyMLABYh9U2nkS6owKSSKWnX4j4uFxd0hZsy+2 nMlAL0oo+5teug9xPa32jPq7xLhdrazMdZDsDksLlVFtyssHfpWG1SYczBgNkHmpDr1L/sqq iJn/4UBbUx15oWRBDznfKi4Xin7N9k0Q6d9bbRuwqTnSW+fkNiNyKE7rgpKScwLCEbzYlBOe twrhKknosSAhXakCvn4d/UExlsi0qvuHIn1fUelnpFTOIlGfdsRKEkjTVo+a07bWvHwZFiFP MrANDX5f5Qf1/fZ3fFvnN3yNjpWngoBB+JTkULp8TQilFt7TpE5lpdwNZakmYL9Zo7RZUB7+ PYMr5wnLULSsMNd6pyCOoIXMPyAG3QRhDHNn6UPD3cZeo6EmOIr4Sy7KQ+5emsdpBNxJwumI 7ZWFcdrmI2c1KGM7z44HSKyGG4fIyQZ0We9igF3ekLhlTVfsufDRG+
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.92,273,1650931200"; d="scan'208";a="910981156"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 15 Jul 2022 09:25:15 +0000
Received: from mail.cisco.com (xfe-rtp-004.cisco.com [64.101.210.234]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 26F9PExC002719 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 15 Jul 2022 09:25:15 GMT
Received: from xfe-aln-003.cisco.com (173.37.135.123) by xfe-rtp-004.cisco.com (64.101.210.234) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Fri, 15 Jul 2022 05:25:14 -0400
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Fri, 15 Jul 2022 04:25:14 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XKgv7H7F1UQo4TyM3BPdd84Dxr1Ybjqi3kB1pu4OExMP2xQDt7USWX8wleB/IRdpjFbejyBuGTUnXBp2ImJclJ9NfIlyklM/b8v4O2Obb4CgIu3tEfvrUQBGVZ9FEkBZ2F6V9el0/hCjFpKJizf2lD0dIAJMQR1s2O8tsjKgGSHzVZYh8hqN2ubJXzqkzNf4OD4tio4ZOiB9L0q7svALzQG5z4mbWnQx5og0TpX1PVFrWEmv03QkKirzrKIod2DXUdYRf3wnR1TMeE7HA+9HqttMvhm3i/yCoQIhYo14EKiPBMSruPQz4iRQkGC3AHcmEtKaEQ4s4uoQlsaEW9VZNQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=gmPceq6TW8cnudDBf+h33HxHGSvoJRDrzS9IcC1S6jk=; b=eD1pShQFtdnbqMrAca/f1IJCI2nPrRhk7l66bh4RAD1+Sd1Df5sz5YrZsAZoFVNy44UQHvBx2EEjOTzSCh4+e8oXpSlVADLvcf5llv6d93zCP3/igtr3CvGtR7KCSjTPvE16jtmP7l+c37+ad7zN6J5z35Bap5OZHUrm6YWQuu66RccQMsDN0stcA4KG1dS73fDKXJNgxkX83Of+Yz7P2uctMqd7wEZR83htRFY1vDsj4VsgFqa7FPtv3xgUE6S7kTuVB6XgOm40NiGpwYkQlWh1//tjKinjsFm4muBzAbIcFayQ8MFvgud2tC+SYCfB9nTLaxi/KJ4bNKClRMAJtw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gmPceq6TW8cnudDBf+h33HxHGSvoJRDrzS9IcC1S6jk=; b=PmCgbJejdhlh3xVCcNVlDmKNS3/3zrt7ia9dBT67bGBz7ahw10AZHG8LrfvgjhjOWFfzfwHT+zke3iklY+QrxoUPcgX8RB8nUBshua4MxMdJqFximk0AjMIlOXeiq6Pz5Ms5zP10swXD41WyUH65z7GWkbzbDPU72NTpcCvHmMo=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by CY4PR11MB1543.namprd11.prod.outlook.com (2603:10b6:910:c::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5438.14; Fri, 15 Jul 2022 09:25:12 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::e0e7:b17a:c19c:20e4]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::e0e7:b17a:c19c:20e4%4]) with mapi id 15.20.5438.019; Fri, 15 Jul 2022 09:25:12 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Peter Saint-Andre <stpeter@stpeter.im>, The IESG <iesg@ietf.org>
CC: "draft-ietf-uta-rfc7525bis@ietf.org" <draft-ietf-uta-rfc7525bis@ietf.org>, "uta-chairs@ietf.org" <uta-chairs@ietf.org>, "uta@ietf.org" <uta@ietf.org>, "leifj@sunet.se" <leifj@sunet.se>
Thread-Topic: Robert Wilton's Discuss on draft-ietf-uta-rfc7525bis-09: (with DISCUSS and COMMENT)
Thread-Index: AQHYl2Vbtb6/MYgEPkeJX2Vy4Jo9ca1999cAgAEle3A=
Date: Fri, 15 Jul 2022 09:25:12 +0000
Message-ID: <BY5PR11MB4196858D743ADDF0058AEEF6B58B9@BY5PR11MB4196.namprd11.prod.outlook.com>
References: <165779144446.10023.16857085823147739769@ietfa.amsl.com> <799e5773-9fa4-b06a-38d1-138c43c5cfd9@stpeter.im>
In-Reply-To: <799e5773-9fa4-b06a-38d1-138c43c5cfd9@stpeter.im>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d9f4c07b-9df0-45f1-8f79-08da6643eb5b
x-ms-traffictypediagnostic: CY4PR11MB1543:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(396003)(366004)(39860400002)(346002)(136003)(376002)(52536014)(5660300002)(186003)(2906002)(86362001)(83380400001)(55016003)(8936002)(38070700005)(122000001)(110136005)(33656002)(6506007)(38100700002)(54906003)(7696005)(66446008)(76116006)(71200400001)(66476007)(41300700001)(4326008)(478600001)(66556008)(966005)(8676002)(66946007)(53546011)(316002)(64756008)(9686003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d9f4c07b-9df0-45f1-8f79-08da6643eb5b
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jul 2022 09:25:12.3678 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 3FgznXsg/ibp+PrERS8PtbwU2kzEaAaKSQpgQcPdFs2tJ2jgAbZIejDslsa9TSn1xOqmeD609gXaA45L3F+dPg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR11MB1543
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 64.101.210.234, xfe-rtp-004.cisco.com
X-Outbound-Node: alln-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/D8fQwwZ7JMXsV_zLd_U0eayRjlE>
Subject: Re: [Uta] Robert Wilton's Discuss on draft-ietf-uta-rfc7525bis-09: (with DISCUSS and COMMENT)
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jul 2022 09:25:54 -0000

Hi Peter,

> -----Original Message-----
> From: Peter Saint-Andre <stpeter@stpeter.im>
> Sent: 14 July 2022 16:07
> To: Rob Wilton (rwilton) <rwilton@cisco.com>; The IESG <iesg@ietf.org>
> Cc: draft-ietf-uta-rfc7525bis@ietf.org; uta-chairs@ietf.org; uta@ietf.org;
> leifj@sunet.se
> Subject: Re: Robert Wilton's Discuss on draft-ietf-uta-rfc7525bis-09: (with
> DISCUSS and COMMENT)
> 
> Hi Robert, thanks for the review. Comments inline.
> 
> On 7/14/22 3:37 AM, Robert Wilton via Datatracker wrote:
> > Robert Wilton has entered the following ballot position for
> > draft-ietf-uta-rfc7525bis-09: Discuss
> >
> > When responding, please keep the subject line intact and reply to all
> > email addresses included in the To and CC lines. (Feel free to cut this
> > introductory paragraph, however.)
> >
> >
> > Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> > for more information about how to handle DISCUSS and COMMENT
> positions.
> >
> >
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/draft-ietf-uta-rfc7525bis/
> >
> >
> >
> > ----------------------------------------------------------------------
> > DISCUSS:
> > ----------------------------------------------------------------------
> >
> > Hi,
> >
> > Thanks for this document, I think that it is a helpful update.  Disclaimer, I'm
> > not a security expert, but I would like to discuss some of the RFC 2119
> > constraints that have been specified please:
> >
> > (1)
> > I find some of the 2119 language to be somewhat contradictory:
> >
> >    *  Implementations MUST NOT negotiate TLS version 1.1 [RFC4346].
> >
> >    *  Implementations MUST support TLS 1.2 [RFC5246] and MUST prefer to
> >       negotiate TLS version 1.2 over earlier versions of TLS.
> >
> > The second sentence implies that a TLS 1.2 is allowed to negotiate earlier
> > versions of TLS, but a previous statement indicates that this is not allowed.
> > A similar contradiction appears for DTLS:
> >
> >     *  Implementations MUST NOT negotiate DTLS version 1.0 [RFC4347].
> >
> >     *  Implementations MUST support DTLS 1.2 [RFC6347] and MUST prefer
> to
> >        negotiate DTLS version 1.2 over earlier versions of DTLS.
> 
> Based on other reviews, I think we already have a fix for this:
> 
> https://github.com/yaronf/I-D/pull/447/files

But is "Implementations MUST support TLS 1.2 {{!RFC5246}}." really right?

Shouldn’t this be "Implementations MUST support TLS 1.2 {{!RFC5246}} or a later version"?  Otherwise, protocols like QUIC would presumably not be compliant with this BCP if they only support TLS 1.3?  Or alternatively, this could probably be stated as "Implementations MAY support TLS 1.2 {{!RFC5246}}".


> 
> > (2)
> >             *  New protocol designs that embed TLS mechanisms SHOULD use
> only TLS
> >                1.3 and SHOULD NOT use TLS 1.2; for instance, QUIC [RFC9001])
> took
> >                this approach.  As a result, implementations of such newly-
> >                developed protocols SHOULD support TLS 1.3 only with no
> >                negotiation of earlier versions.
> >
> > Why is this only a SHOULD and not a MUST?  If a new protocol (rather than
> an
> > updated version of an existing protocol) was being designed why would it
> be
> > reasonable to design it to support TLS 1.2?  If you want to keep these as
> > SHOULD rather than MUSTs then please can the document specify under
> what
> > circumstances it would be reasonable for a new protocol design to use TLS
> 1.2.
> 
> Although personally I'm open to MUST here, I'd like to discuss that with
> my co-authors (one of whom is offline this week).

Okay.


> 
> > (3)
> >                                                             When TLS-only
> >        communication is available for a certain protocol, it MUST be used
> >        by implementations and MUST be configured by administrators.  When
> >        a protocol only supports dynamic upgrade, implementations MUST
> >        provide a strict local policy (a policy that forbids use of
> >        plaintext in the absence of a negotiated TLS channel) and
> >        administrators MUST use this policy.
> >
> > The MUSTs feel too strong here, since there are surely deployments and
> streams
> > of data where encryption, whilst beneficial, isn't an absolute requirement?
> >
> > In addition "MUST be used by implementations and MUST be configured by
> > administrators" also seem to conflict, i.e., if the implementation must use
> it
> > then why would an administrator have to enable it?
> 
> I believe this is a duplicate of an issue that other folks have already
> raised:
> 
> https://github.com/yaronf/I-D/issues/437

Okay, I still think that the proposed text isn't quite right - why would an administrator need to configure it, if it used by the implementation?:

Current:

  When a TLS-only
  communication method is available for a certain protocol, it MUST
  be used by implementations and MUST be configured by
  administrators, in preference to a dynamic upgrade method.

Perhaps something like the following might be better:

 When available, implementations MUST default to using a TLS-only communication method in preference to any dynamic upgrade method.  For legacy implementations defaulting to a dynamic upgrade method, then administrators SHOULD(*) configure the protocols to only use the TLS-only communication method over any dynamic upgrade method and MUST advise service users to directly use the TLS-only communication methods (e.g., for IMAP mail server settings).

(*) Perhaps this could be a MUST, but that would seem likely to be hard to follow if that would break lots of customers ...


> 
> > (4)
> >     When using RSA, servers MUST authenticate using certificates with at
> >     least a 2048-bit modulus for the public key.  In addition, the use of
> >     the SHA-256 hash algorithm is RECOMMENDED and SHA-1 or MD5 MUST
> NOT
> >     be used ([RFC9155], and see [CAB-Baseline] for more details).
> >
> > So, for clarity, this would presumably mean that SHA-256 is also preferred
> over
> > say SHA-512?  Is that the intention?  Or would it be better if the SHOULD
> > allowed stronger ciphers?
> 
> I think we should probably say "SHA-256 or stronger", but again I'd like
> to see what my co-authors think.

Okay.

Thanks,
Rob


> 
> Peter