Skip to main content

IETF Last Call Review of draft-ietf-tls-keylogfile-04
review-ietf-tls-keylogfile-04-opsdir-lc-combes-2025-05-06-00

Request Review of draft-ietf-tls-keylogfile
Requested revision No specific revision (document currently at 05)
Type IETF Last Call Review
Team Ops Directorate (opsdir)
Deadline 2025-05-07
Requested 2025-04-16
Requested by Mohamed Boucadair
Authors Martin Thomson , Yaroslav Rosomakho , Hannes Tschofenig
I-D last updated 2026-01-05 (Latest revision 2025-06-09)
Completed reviews Genart IETF Last Call review of -01 by Russ Housley (diff)
Opsdir IETF Last Call review of -04 by Jean-Michel Combes (diff)
Assignment Reviewer Jean-Michel Combes
State Completed
Request IETF Last Call review on draft-ietf-tls-keylogfile by Ops Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/ops-dir/CeBGYXQIsuyxH0bOOOwVJ7H_KxY
Reviewed revision 04 (document currently at 05)
Result Ready
Completed 2025-05-06
review-ietf-tls-keylogfile-04-opsdir-lc-combes-2025-05-06-00
Hi,

I have reviewed this document as part of the Ops area directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Ops area directors.
Document editors and WG chairs should treat these comments just like any other
last-call comments.

Disclaimer: I am not a TLS expert.

Regarding the form, this document is well written, especially regarding the
security considerations.

Regarding the substance, IMHO, it looks like the promotion of a nightmare for
any operational security guy :) My main fear is to see the use of such feature
in a “production system” because (1) the border between “test system” and
“production system” is not always as clear as expected (2) forgetting to switch
off such a feature when pushing the system into production may become an easy
mistake. Now, IMHO and except if I missed something, it should be less complex
from an operational security point of view (i.e., rights management) to
debug/analyze protocols in configuring TLS with “NULL ENCRYPTION” (i.e.,
configuration rights) than logging/storing secrets (i.e., write rights, read
rights, export rights).

Now, as the intended status is Informational, it works for me.

Hope that helps.

Best regards,

JMC.