[Uta] AD Review of draft-ietf-uta-rfc7525bis-06

Francesca Palombini <francesca.palombini@ericsson.com> Mon, 16 May 2022 13:15 UTC

Return-Path: <francesca.palombini@ericsson.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2077AC1850F2; Mon, 16 May 2022 06:15:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.673
X-Spam-Level:
X-Spam-Status: No, score=-2.673 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.575, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nYvShxXYobVF; Mon, 16 May 2022 06:15:33 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2062c.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1a::62c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EB50EC185134; Mon, 16 May 2022 06:15:29 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AojqMoH3wmFyqg8k50BeFDXzDyFKMOQVcx9mFXw3zm3/OUB9FYdP/+r6Z30KEKHBxh9ikhNpT/eSSKFYGh/apebvAu7f4SfVx0+d3VrST1xH+kxNOE+f711fVeIhZH30M3kncWI+H1ApcUnRSfhka/Xu0XuOj6ESHA502iTB/zhikqCMSkUaHFRO390bP2VMfPEw/c3qE+jygMxDXj+e6mZ+kTO8Owxugp+jd8eQ2NL7tn5sTqi579bpVxL0I29biPT+3d8yxTSQ2solfzYsAWLFZKAVPlcV+l2+zFoVcYNg1j1Dro0NgRwc7EXpLXG4iN+Zb7en5z/Dzuai9PSbAQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=W4Kdlk2+crWdMc7yBSPxUDNNxuxos6BZVaDxSO3GJmk=; b=TQiWWhgTtqj8FLrtDVuxrLzPrldIQr58dtGOnDEfxnU/jNI3EVUx5Dlle4IkCs3JEudQa/1mX5siZEkXBwWZBlwZlnNN+f/9P1z4lvYREKCFOdKCJLXftEEDjYJY5Fub1/oa87nBC3M9esxxjbYvdp++R+7EoNV8/4U1CVhxXjQXxp1U29b1omo35o4s9VyjEwZsViFJn5tud40jOd8D/4oz7tFYenJBU+AMxvDxFBcngrPxqyxsPChyotqMHhWC0UfWphNr+DJwmjVGVqygKsaYnhs9y5wv9yhlRQo/6gLELn5GF9zioh2unpt0ii9Wbypw0QzUhAoPCHtM9CLcvw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=W4Kdlk2+crWdMc7yBSPxUDNNxuxos6BZVaDxSO3GJmk=; b=QAnC6EAN5Y+hgvrQFjT53r8PFrGtIpwSg2Xdf09zw6txx9pDaTMMs18MV84/gDtkgEwdz4XZWQVQYVhQJdhsah2NbHUQx2UmF7GCe5Z6qZfgKno0+os/Vz7L/oP3kJp4jqpRcciT5FknxKqbNn9hiE1Wn+zlTdAT6X6+FHpiwzc=
Received: from AS1PR07MB8616.eurprd07.prod.outlook.com (2603:10a6:20b:474::16) by AM0PR07MB5473.eurprd07.prod.outlook.com (2603:10a6:208:10c::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5273.13; Mon, 16 May 2022 13:15:24 +0000
Received: from AS1PR07MB8616.eurprd07.prod.outlook.com ([fe80::c033:d932:52c3:d257]) by AS1PR07MB8616.eurprd07.prod.outlook.com ([fe80::c033:d932:52c3:d257%7]) with mapi id 15.20.5273.010; Mon, 16 May 2022 13:15:24 +0000
From: Francesca Palombini <francesca.palombini@ericsson.com>
To: "uta@ietf.org" <uta@ietf.org>, "draft-ietf-uta-rfc7525bis@ietf.org" <draft-ietf-uta-rfc7525bis@ietf.org>
CC: "paul.wouters@aiven.io" <paul.wouters@aiven.io>
Thread-Topic: AD Review of draft-ietf-uta-rfc7525bis-06
Thread-Index: AQHYaSW/BooFIrZmuEyrlfQjOX3cvA==
Date: Mon, 16 May 2022 13:15:24 +0000
Message-ID: <AS1PR07MB8616676AA820C841BEC7780498CF9@AS1PR07MB8616.eurprd07.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c821004a-3212-4d06-847e-08da373e2318
x-ms-traffictypediagnostic: AM0PR07MB5473:EE_
x-microsoft-antispam-prvs: <AM0PR07MB5473C3D6E91B6F477D24289E98CF9@AM0PR07MB5473.eurprd07.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 5MFiCDVRD0bxZWSFyeyVmhAYzDsankWJ9slI0Ax4ewxsxugxhvVr7QAU2Z1U3woituWVAV3MF/FGUFcs+K7sRKh2tyIiXxqbmd+1R4nFoXZJZPbK2pd12rnm9igtxMSn3k4yCQmTrE4zAdy3kuPKDxEcnaTR7SQJLvsJW2UbKObm+AaVsFX0xC4rDl4qVVvDAHEtcaPqpAyDy1xOeOfhrmHp0BO6z3iXRGIXbR5TiPGJg50fS3pO9/Ss3MLeOZEE7rq4CNQbWZFatel8w29hazHaIKXQ5nreNemZjWehAuI2r8k1GNp+56eogx756Yt7yvy9Ed9MmugXwSOQhwllWAy3L7EszxKwUvBam0VsHBkOPD8czFBKdZ+CrjK/qgP3DRy18OUaYYkG8FKMyd3pH+zInA+vgG/Vmxe+fGNYYWJHEv4mTdo70otpe1xK8MEur5Rk0SqwTYr+JgNzhpnbU6iEwRQMIivxZyq+c1rr0z5kNH3Ub93jI8M1UCQ9fgrdUqejkGI1T2shnGhU5bJl5YDvGrMPONpVWRrFxni0rlo2ykYAgbeRpsTBB9/k3Dp3ds1L2gwzi9dw7BVqFRSAAKl+OliD05Ngtyr+axdVNie0atxN5vkRlNA5pb+TS3DfTfNTixYjjio2+/wBqu7qFfi8adkA/feuqETm8IiWEUKGR667GC9fuKQcLPLsxVWmp5LY4hsQqVzVayUecwrEIiplVMr7EBr0+dZeqpmmVJhUGxTXubxactb2orjmAdDnFAU2IuCab1Cb6gHD1mphDSPxS7IrWp8hz/QI98O9HeE=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS1PR07MB8616.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(33656002)(55016003)(508600001)(52536014)(44832011)(8936002)(38100700002)(38070700005)(30864003)(71200400001)(82960400001)(5660300002)(122000001)(966005)(86362001)(9686003)(66574015)(186003)(110136005)(2906002)(53546011)(6506007)(7696005)(4326008)(76116006)(66556008)(66446008)(66946007)(66476007)(8676002)(91956017)(64756008)(316002)(83380400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 2
x-ms-exchange-antispam-messagedata-0: yXsd0u542AKC981th7h1s7Devv6flJUn1OKf1xsjtFPUSoArrWz/ekLZV+ptyAkCfGiXLI3Vs2Mm1fp9UHEN4uVFmR+Ar+Q8TTJc3Gdz5nMSn6nCH6cd4UUgf9EtJsP+NmDM+y6v6L2olx48abIP7aAbvYeeOq0k8c9GP1mE5LS9ZsXDSDtRM2pgziVnUuji4wonKpWxiJPeRKhCCvCBXaHFkDX+TZ2I5cCD5Vnqh7z4WbYRHxtms/RW5R7wbu6eS7R81mz00trF2j88wJSw7auAOUi6urHhVUrymI9KVVdp1CNPsd93lJSv+Y3F5v3tKCysZ2WlNVKHaM26dKnK6TAdjfGJj9uWky29KPfClPJyOzbo6wPBvrWIR0lEIicAi+5JOfpng53bB51ZdWCVzDpJB7oLY2Hf7wMzpKJwa3LApGtrRqR5APoE9PC/zduXcCO6nDdFHaOSVUj0pDepbXaUCd+5ftgbGiLeWZF4WtgSd73BzYH1BOGuS4NKmLRQsJC/DELMXhuALb1b5K4qbUH0IORkHVnKIwIRuKkymAGUhWewXMXMdxuaTMnEgs9GPGAWXs4QNW+zFYQ8+QRceNVIbHqF/fHWWZVd6jNCh5Pxv+ZcG7QR2vsVmRSC466DZ9uI1p+ZLWz760TVRxvCV71iXDpmzRzSqT71Ku3NXvJpR3j6V0UJbP2FyZfbkajtzdWZ1gwE/rMyoU2i7YnizAAdONFcYRXdmJ5jhfaru8ybmAMZiNA6TWmjVhZyy3yk3M4yF/2bkjZwARBnikJbbfj6rthCZHW9gm2pK/3wQV61kPk8Oijq8MNKzcuQ1MTghfY9FtumwHDCOjcVUcEJ+9/gQYG3ZvgK1f5A75scbePT2++38JJx19wXF20+1KpijykMr2LUSOLYd9tE1o/MqINEi4NGmvdhWfW6Mn4Vh8Z2gsB1NtgSpri2kCSUyZTaAoOIWKu8Lm7fw8h90OT3dtAX1paZrT2HsVCGqWz4qw2UOcYthZgLIj01nzECysC0yU2JZ0g/LGsM+Q2EprpU809lhwei7vJnnEZ8mBws009MktrTHQfsekygJIc8HReAWHYopbaB+VF8CDnsOPg434dbw7E6sWQ+wMs8mP3TEa7LsIRek5E2O09hOvlDr0dNrlWAt3W8tI/8MrUup/2VVL4aUVpVLsfIm5fo8ZD4oG8sl1ASrvOUu5D9bpeLKGDH6lCGW0jX1Iy/JWOUJE196O2MR+61JiqvXeoKqcLcDBiCus5HSKmwDDzsMZTQ8Pb1lWrFgdLIpWiO2jRgcX6v4FIqzbLGizWqR/VhaCfiFE73G88mQER2tmiOv271iCuMZYonuH4ZU070JS+kmaxBiZHp88Pf0plwSfBU1nZFpWxN5r+JyfFChJtNhGwAC4L47MlwsWKFqqHFG7BKdGu84/2ZDyT01SaiQcON/0xdKQ+t9kzJ9Eb8413xF2OR/avmnA9BiUqcNUWn/T1x3ZI0yT5+xrju5lkUoMVjj4JwLxxtowTeYRxX3/amAREdb3Q9U0GlC0wtJitZgOq6QVwomqVsoSRJXJFL8Lk4rhyKsHVcq6aAvFUzXBqBnMUVWPjTQgKDDKn8OE3TwY5OV8lXTUR3N/kvFQl9rIt9DWTrR7MsaHwizyMZBIYQC48YjMEafMR2U5Xlxf+d5yg23j+GfHl11P1PmvcoP1eiWcAN5Z6QmiIZD1bHDmsmRbifqXD0vMD645ExOz4GHSf8gsmeMj/KjBwJlqApqcFWm2a3La+g9/5E+PI1MuVC2xqMo723jnzqN6CG
x-ms-exchange-antispam-messagedata-1: BnQJsxVgSnj8Gv0OK5hlls6EAixSWBbTV37gWDzaB+t8ils+JQjKTmsTpMHu8VEYzRUjnzJmplwdIg==
Content-Type: multipart/alternative; boundary="_000_AS1PR07MB8616676AA820C841BEC7780498CF9AS1PR07MB8616eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AS1PR07MB8616.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c821004a-3212-4d06-847e-08da373e2318
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 May 2022 13:15:24.2187 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 4G/Tcaov/widpx4usaroJOZqnlne9ev7O7ncWPvHlqsz3IpgFbUgPg7zihecfUbVcUSKJ3rISiVf5fsZOiT2otTIC7qZe8e1p48czigOU5FS4bKZe6pGr/4Y31nWajog
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR07MB5473
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/QptqyMSx5ABARXZ5iPtOV4nIpa0>
Subject: [Uta] AD Review of draft-ietf-uta-rfc7525bis-06
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 May 2022 13:15:38 -0000

Thank you for the work on this document, well written and easy to read. I don't have major comments. I have some minor comments, and a couple of nits or request for clarifications, which you can address together with any other Last Call comments.

Many thanks to Paul Wouters who has provided an early SEC AD review - I think his mail might have been blocked in moderation queue because I can't find it in the mailarchive, so I will copy it at the end of my mail here. Authors: as I don’t see major blocking comments from Paul, I will not delay Last Call, but will look forward to your answers to Paul’s very valid comments as well.

Francesca

1. -----

FP: DTLS 1.3 has been published, please update the reference to RFC9147

2. -----

   This document attempts to minimize new guidance to TLS 1.2
   implementations, and the overall approach is to encourage systems to
   move to TLS 1.3.  However this is not always practical.  Newly

FP: I believe this is the first time TLS 1.3 appear (excluding the abstract) so it would be good to add a reference to RFC 8446 here. On the same note, there are a number of protocols named as examples, but with no references, it would be good to add some informative references for these (SMTP, IMAP, POP3, SIP, XMPP, IRC, SRTP)

3. -----

FP: Has the working group had a discussion about the "Updates" header tag for this document? The two existing ones are quite straightforward, but I wondered if it would make sense to add the TLS and DTLS docs there as well, to provide an easy link for implementers to more easily find this BCP.

4. -----

   more secure PSK-based mechanism is described in Section 4.6.1 of
   [RFC8446].  See this post (https://blog.filippo.io/we-need-to-talk-
   about-session-tickets/) by Filippo Valsorda for a comparison of TLS
   1.2 and 1.3 session resumption, and [Springall16] for a quantitative
   study of TLS cryptographic "shortcuts", including session resumption.

FP: Can we add the blog post as reference, and take a stable screenshot of it to include as reference in this document?

5. -----


   *  For similar reasons, session ticket validity SHOULD be limited to
      a reasonable duration (e.g., half as long as ticket key validity).

FP: It would be good to expand on why this is not a MUST, i.e. what is the expected exception case. Also I appreciate the example, but it is hard to define what a "reasonable duration" is, maybe something more can be added here?

6. -----

   of protocols that multiplex requests over a single connection (such
   as HTTP/2), post-handshake authentication has the same problems as

FP: Please add a reference to HTTP/2 (draft-ietf-httpbis-http2bis-07).

7. -----

   mistaken for a message for use in another protocol, servers should
   strictly enforce the behavior prescribed in Section 3.2 of [RFC7301]:

FP: I am wondering why this "should" and not "need to" or "ought to", or even MUST.

8. -----

FP: Running the ID Nits I also get the following warning:

     (Using the creation date from RFC5288, updated by this document, for
     RFC5378 checks: 2007-06-19)

  -- The document seems to lack a disclaimer for pre-RFC5378 work, but may
     have content which was first submitted before 10 November 2008.  If you
     have contacted all the original authors and they are all willing to grant
     the BCP78 rights to the IETF Trust, then this is fine, and you can ignore
     this comment.  If not, you may need to add the pre-RFC5378 disclaimer.
     (See the Legal Provisions document at
     https://trustee.ietf.org/license-info for more information.)

Were the original authors of RFC 5288 involved?


=====================

From: Paul Wouters
Date: Monday, 16 May 2022 at 04:03
To: uta@ietf.org
Cc: Francesca Palombini
Subject: Review of draft-ietf-uta-rfc7525bis-06


This is a good document. I do have a view specific comments. One larger overview
question I have is if the authors have thought about using tables to summarize
changes, instead of the Appendix A style write up of changes?

Specific comments and nits follow below,

Paul



-     We note that
       as long as TLS 1.2 is still allowed by a particular
       implementation, even if it defaults to TLS 1.3, implementers MUST
       still follow all the recommendations in this document.

What is this really trying to say? "MUST is a MUST" is not something we need to clarify

-  Similarly, we RECOMMEND that new protocol designs that embed the TLS mechanisms
       (such as QUIC has done [RFC9001]) include TLS 1.3

I would not say "include" but really say "be based on" as no one new
should make something based on TLS 1.2.

-     In cases where an application protocol allows implementations or
       deployments a choice between strict TLS configuration and dynamic
       upgrade from unencrypted to TLS-protected traffic (such as
       STARTTLS), clients and servers SHOULD prefer strict TLS
       configuration.

First of all, why is this a SHOULD and not a MUST? Especially since "prefer" seems to also
weaken this already. And second, does prefer mean a fallback to dynamic upgrade is allowed
if a strict configuration fails? If so, does that apply to all kind of failures? Is this
not introducing a downgrade attack?

- A client SHOULD attempt to negotiate TLS even if these
       indications are not communicated by the server.

Again, why a SHOULD and not a MUST ? I guess this is why the above uses "prefer" or else there
would be a contradiction.

- [compression] unless the application protocol in question has been shown not to be open to such attacks.

Can something perhaps be said about the standard HTTPS "application" ? eg browsers ? Is
it safe or not to support there?

-  In order to gain forward secrecy,
    this document recommends that server implementations SHOULD respond
    with a "key_share", to complete an ECDHE exchange on each session
    resumption.

Doesn't this mostly negate the "essential performance feature" of TLS session resumption?

    Protocol developers are strongly encouraged to register an ALPN
    identifier for their protocols.  This applies to new protocols, as
    well as well-established protocols such as SMTP.

This seems like a directive in an RFC to the IETF - get an ALPN for SMTP. We should just start
that process instead of passive aggressively writing that in an RFC :)

    When using ECDSA signatures for authentication of TLS peers, it is
    RECOMMENDED that implementations use the NIST curve P-256.

Why only P-256? Why not P-384 or P-521 ?

    The Logjam attack [Logjam] further
    demonstrates that 1024-bit Diffie Hellman parameters should be
    avoided.

Why is this should a lowercase? Also why not simply a "MUST NOT use" ?


Comments:

- The abstract is copied from its 7 years old predecessor, which feels a little dated when it again
   claims "Over the years [...]. Perhaps a better way is a more generic txt. For example see RFC 8247.

- "This document provides recommendations for
    improving the security of deployed services that use TLS and DTLS."

   That sounds a bit arrogant. Good deployments might have nothing to improve.
   Just state this document provides the latest recommendations.

- "This document is being republished"
   This feels odd, the IETF does not "republish". Perhaps "This document has been updated with this in mind"

- In fact, the cipher suites
   recommended by this document for TLS 1.2 (Section 4.2 below) are
   only available in this version.

Why are they not in TLS 1.3 ? :P Or are they?

- Implementations of "greenfield" protocols or deployments, where
   there is no need to support legacy endpoints

I don't think "protocols" applies here. It really just says "if you are
a greenfield deployment (you manage all the nodes communicatiing), you could
insist on TLS 1.3 only.

- See this post (https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-f50c199c2e19ebfa&q=1&e=a0863fc0-c9b6-43b3-b9a6-18db1298e613&u=https%3A%2F%2Fblog.filippo.io%2Fwe-need-to-talk-
    about-session-tickets/)

Turn into a proper informative reference ? Also, it is a weak link and likely to break
over the next few years.

- Section 3.5 seems to miss an introduction line of what renegotiation is, similar to
how 3.4 states what session resumption is (sort of)

- (formerly called Encrypted SNI)

I think this reference can be removed, it was really only a draft name and not something with
actual deployment that people "know". Also "formerly called" is misleading, it was something
completely different that had the same goal as ECH.

    TLS and its implementations provide considerable flexibility in the
    selection of cipher suites.

I wouldn't say that for TLS 1.3 ? It does still apply to TLS 1.2.

    algorithms that were once considered strong become weak.  Such
    algorithms need to be phased out over time

I think "such" here is misleading. It feels like referencing "weak
algorithms" yet we are talking about replacing algorithms before
these become week. I would simply remove the word "Such".

       TLS 1.1 and 1.2 never negotiate 40-bit or 56-bit export ciphers.

This (misleadingly) suggests TLS 1.3 might however do this?

       Implementations SHOULD NOT negotiate cipher suites that use
       algorithms offering less than 128 bits of security.

       Rationale: Cipher suites that offer between 112-bits and 128-bits
       of security are not considered weak at this time

These sentences together lead to a weird case for 128. Even though it looks
a little weird, I would say either "between 112-bits and 127-bits" or "more
than 112-bits but less than 128-bits".

Also, how long have we had 128 bit ciphers? Can we really not say MUST NOT
instead of SHOULD NOT for the 112-127 range? Also in light of Grover's algorithm
that brings 256 back to effectively 128?

       Rationale: Forward secrecy (sometimes called "perfect forward
       secrecy") prevents the recovery of information that was encrypted
       with older session keys, thus limiting the amount of time during
       which attacks can be successful.  See Section 7.3 for a detailed
       discussion.

I think this should be rewritten a little? It's not that attack time
is limited, but really the exposure after a successful attack. Eg if
the vulnerability is not fixed, PFS won't help you as for each session
the attacker is either still there or regains access using the same
vulnerability. I would more clearly say "limits how far back in time
data can be decrypted when an attack is successfull".




Nits:
    "An earlier version of this document was published as RFC 7525"

more common is to write:

    "This document obsoletes RFC 7525"

     Version 1.3 of TLS [RFC8446] was released and version 1.3 of DTLS
       was finalized [I-D.ietf-tls-dtls13]

This reference can be updated now but requires textual change ("finalized" no longer needed)

    "leak will be plugged by use of" -> leak is closed by using

    "It is also RECOMMENDED that clients abort" -> Clients SHOULD abort

SEction 3.7, 3.8 I would also add the acronym in the section title.

    "It is also RECOMMENDED that clients" -> Clients SHOULD

improved latency -> reduced latency

because they are  -> because these are

but they are out of scope -> but these are out of scope

"[RFC8422]" appears without proper linking in 4.2.1

  [I-D.ietf-tls-dtls13] can be updated to [RFC9147]

    Clients MUST indicate to servers that they request SHA-256, by using
    the "Signature Algorithms" extension defined in TLS 1.2.

Maybe start with: "TLS 1.2 client MUST ....."

  current state of the art -> best current practises ?