IETF Last Call Review of draft-ietf-tls-keylogfile-04
review-ietf-tls-keylogfile-04-opsdir-lc-combes-2025-05-06-00
| Request | Review of | draft-ietf-tls-keylogfile |
|---|---|---|
| Requested revision | No specific revision (document currently at 05) | |
| Type | IETF Last Call Review | |
| Team | Ops Directorate (opsdir) | |
| Deadline | 2025-05-07 | |
| Requested | 2025-04-16 | |
| Requested by | Mohamed Boucadair | |
| Authors | Martin Thomson , Yaroslav Rosomakho , Hannes Tschofenig | |
| I-D last updated | 2026-01-05 (Latest revision 2025-06-09) | |
| Completed reviews |
Genart IETF Last Call review of -01
by Russ Housley
(diff)
Opsdir IETF Last Call review of -04 by Jean-Michel Combes (diff) |
|
| Assignment | Reviewer | Jean-Michel Combes |
| State | Completed | |
| Request | IETF Last Call review on draft-ietf-tls-keylogfile by Ops Directorate Assigned | |
| Posted at | https://mailarchive.ietf.org/arch/msg/ops-dir/CeBGYXQIsuyxH0bOOOwVJ7H_KxY | |
| Reviewed revision | 04 (document currently at 05) | |
| Result | Ready | |
| Completed | 2025-05-06 |
review-ietf-tls-keylogfile-04-opsdir-lc-combes-2025-05-06-00
Hi, I have reviewed this document as part of the Ops area directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the Ops area directors. Document editors and WG chairs should treat these comments just like any other last-call comments. Disclaimer: I am not a TLS expert. Regarding the form, this document is well written, especially regarding the security considerations. Regarding the substance, IMHO, it looks like the promotion of a nightmare for any operational security guy :) My main fear is to see the use of such feature in a “production system” because (1) the border between “test system” and “production system” is not always as clear as expected (2) forgetting to switch off such a feature when pushing the system into production may become an easy mistake. Now, IMHO and except if I missed something, it should be less complex from an operational security point of view (i.e., rights management) to debug/analyze protocols in configuring TLS with “NULL ENCRYPTION” (i.e., configuration rights) than logging/storing secrets (i.e., write rights, read rights, export rights). Now, as the intended status is Informational, it works for me. Hope that helps. Best regards, JMC.