Telechat Review of draft-ietf-tls-exported-authenticator-14
review-ietf-tls-exported-authenticator-14-secdir-telechat-sheffer-2021-04-02-00
Request | Review of | draft-ietf-tls-exported-authenticator |
---|---|---|
Requested revision | No specific revision (document currently at 15) | |
Type | Telechat Review | |
Team | Security Area Directorate (secdir) | |
Deadline | 2021-04-06 | |
Requested | 2021-03-30 | |
Authors | Nick Sullivan | |
I-D last updated | 2021-04-02 | |
Completed reviews |
Genart Last Call review of -09
by Christer Holmberg
(diff)
Secdir Last Call review of -09 by Yaron Sheffer (diff) Secdir Last Call review of -13 by Yaron Sheffer (diff) Genart Last Call review of -13 by Christer Holmberg (diff) Secdir Telechat review of -14 by Yaron Sheffer (diff) |
|
Assignment | Reviewer | Yaron Sheffer |
State | Completed | |
Request | Telechat review on draft-ietf-tls-exported-authenticator by Security Area Directorate Assigned | |
Posted at | https://mailarchive.ietf.org/arch/msg/secdir/8SW62r6jdFCj6HbmWrYnufmnbUM | |
Reviewed revision | 14 (document currently at 15) | |
Result | Has issues | |
Completed | 2021-04-02 |
review-ietf-tls-exported-authenticator-14-secdir-telechat-sheffer-2021-04-02-00
After a bit of back and forth over my *two* previous SecDir requests, I'm afraid that my original comment has not yet been fully addressed. The IANA considerations section (Sec. 8.1) adds server_name as a possible extension for CertificateRequest. This would be a non-backward compatible change to TLS. IMO what we needed to do is both to clarify the allowed extensions for what Nick called "the CR-like structure" (almost done in Sec. 4, though the last sentence should by changed to include CertificateRequest) and undo the change to the TLS ExtensionType registry (not done, would require to remove Sec. 8.1). * Nit: this sentence is repeated almost verbatim in Sec. 4 and Sec. 5, and in both cases is mangled. Old: The application layer protocol used to send the authenticator request SHOULD use a secure with equivalent security to TLS, such as QUIC [QUIC-TLS], as its as its underlying transport to keep the request confidential. New: The application layer protocol used to send the authenticator request SHOULD use a secure *channel* with equivalent security to TLS, such as QUIC [QUIC-TLS], as its ~~as its~~ underlying transport to keep the request confidential.