TLS 1.2 is in Feature Freeze
draft-ietf-tls-tls12-frozen-08
Yes
Deb Cooley
Paul Wouters
No Objection
Andy Newton
Gunter Van de Velde
Jim Guichard
Note: This ballot was opened for revision 06 and is now closed.
Deb Cooley
Yes
Mohamed Boucadair
(was Discuss)
Yes
Comment
(2025-03-25 for -06)
Sent
Hi Rich, Thank you for the effort put in this spec. Thanks to Jen Linkova for the opsdir review. I understood that her comment will be fixed. ======= = OLD DISCUSS (resolved, for archiving only) ============ I’m supportive of this work. I will be balloting “Yes” after the DISCUSS point is addressed. ## On urgent security conditions CURRENT: This document specifies that outside of urgent security fixes, and the exceptions listed in Section 4, no changes will be approved for TLS 1.2. Who will make the call about what is “urgent”? Is it the TLS WG? Else? What about extensions that may be required by applications defined in other WGs? ==== = Comments ========= # Abstract ## Reword for better clarity OLD: Use of TLS 1.3 is growing and fixes some known deficiencies in TLS 1.2. NEW: Use of TLS 1.3, which fixes some known deficiencies in TLS 1.2, is growing. ## I think “for TLS 1.2-only” would be more accurate as some of these are applicable to TLS1.3 as well. Consider updating accordingly: CURRENT: This document specifies that except urgent security fixes, new TLS Exporter Labels, or new Application-Layer Protocol Negotiation (ALPN) Protocol IDs, no changes will be approved for TLS 1.2. # Introduction ## Reword for better clarity OLD: Both versions have several extension points, so items like new cryptographic algorithms, new supported groups (formerly "named curves"), etc., can be added without defining a new protocol. NEW: Both TLS versions have several extension points. Items such as new cryptographic algorithms, new supported groups (formerly "named curves"), etc., can be added without defining a new protocol. As a side note on “etc.”, I’d like to check if we should be more explicit here given that we have notes in the registry such as: “Although TLS 1.3 uses the same cipher suite space as previous versions of TLS, TLS 1.3 cipher suites are defined differently, only specifying the symmetric ciphers and hash function, and cannot be used for TLS 1.2. Similarly, TLS 1.2 and lower cipher suite values cannot be used with TLS 1.3.” # Section 2 ## Provider examples of “huge impact” mentioned in this text: CURRENT: Cryptographically relevant quantum computers, once available, will have a huge impact on RSA, FFDH, and ECC which are currently used in TLS. ## On the various NIST citations: Are there any other similar pointers to list for non-US regions? # Section 4: ## I think the IANA registries should be authoritative here, not the RFC. CURRENT: No registries [TLS13REG] are being closed by this document. ## Call out this is about TLS registries: OLD: No registries [TLS13REG] are being closed by this document. NEW: No registries in TLS registry groups [REF] are being closed by this document. ## Not any random registry, but TLS: OLD: Any registries created after this document is approved for publication should indicate whether the actions defined here are applicable. NEW: Any TLS registry created after this document is approved for publication should indicate whether the actions defined here are applicable.
Orie Steele
Yes
Comment
(2025-04-01 for -07)
Sent
# Orie Steele, ART AD, comments for draft-ietf-tls-tls12-frozen-07 CC @OR13 * line numbers: - https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-tls-tls12-frozen-07.txt&submitcheck=True * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Nits ### Unlimited registrations ``` 131 There are no limits on the registrations for either of the following 132 two registries: 134 * TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs 136 * TLS Exporter Labels ``` I might phrase this as the guidance to DEs and registration policies for the following registries are not changed by this document.
Paul Wouters
Yes
Andy Newton
No Objection
Éric Vyncke
No Objection
Comment
(2025-03-29 for -07)
Sent
# Éric Vyncke, INT AD, comments for draft-ietf-tls-tls12-frozen-07 CC @evyncke Thank you for the work put into this document. It is short, useful, but may need some adjustments (see below). Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education). Special thanks to Sean Turner for the shepherd's detailed write-up including the WG consensus *and* the justification of the intended status. I hope that this review helps to improve the document, Regards, -éric ## COMMENTS (non-blocking) ### Section 2 Thanks for prefixing NIST with US in `US National Institute of Standards and Technology` but you forgot to introduce the NIST acronym ;-) Any reason why BCP14-like notation is used in `TLS 1.2 WILL NOT be supported` ? Rather then `supported`, which is outside of the IETF remit, why not using `specified` ? ## Section 4 s/Any TLS entry added after the IESG approves publication of {THIS RFC}/Any TLS entry added after the publication of {THIS RFC}/ ? It is clearer for outsiders at the expense of a small time window between IESG approval and RFC publication. ``` Any registries created after this document is approved for publication should indicate whether the actions defined here are applicable ``` I find the above text really vague and underspecified. Who will decide the applicability ? Should there be guidelines ?
Erik Kline
No Objection
Comment
(2025-02-27 for -06)
Sent
# Internet AD comments for draft-ietf-tls-tls12-frozen-06 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Nits ### S4 * s/indication indication/indication/
Gorry Fairhurst
No Objection
Comment
(2025-03-24 for -06)
Sent
Thank you for writing a simple and easily read document
Gunter Van de Velde
No Objection
Jim Guichard
No Objection
Ketan Talaulikar
No Objection
Comment
(2025-03-30 for -07)
Sent
Thanks for this document. A couple of comments (that I found ambiguous) for consideration of the authors and the responsible AD. 1) Section 1 "This document specifies that outside of urgent security fixes, and the exceptions listed in Section 4, no changes will be approved for TLS 1.2." Following the conversations, it seems like the goal is for IETF to not adopt or approve work related to TLS 1.2 except some (exceptional) cases of security issues that are agreed upon in the TLS WG. If so, text along those lines would help clear ambiguities. 2) Section 2 "Put bluntly, post-quantum cryptography for TLS 1.2 WILL NOT be supported (see Section 4) at any time and anyone wishing to deploy post-quantum cryptography should expect to be using TLS 1.3." The use of uppercase BCP14-like language tripped me as well. I believe the intention here is again that this work not be undertaken in the IETF (i.e., enhancements related to PQC MUST NOT be specified by IETF?). Is there something to be added in the IANA considerations with regards to guidance to DEs to follow the guidelines in this document and not make allocations for TLS 1.2 extensions that may come from outside the IETF standards track? Finally a question, unrelated to this document, does the TLS WG charter need an update to capture some of this decision/direction?
Mike Bishop
No Objection
Comment
(2025-03-20 for -06)
Sent
The registry note "Any entry [...] makes no requirement on DTLS" does not seem correct. Consider rewording this to indicate that the *notation* does not impact DTLS, or consider adding separate explicit columns for TLS and DTLS version restrictions.
Roman Danyliw
No Objection
Comment
(2025-04-01 for -07)
Not sent
Thank you to Joel Halpern for the GENART review.