Re: [Uta] Adoption call for draft-sheffer-uta-rfc7525bis-00

2020-04-30 Thread Keith Moore
IMO RFC7525 and this new draft both suffer from dubious assumptions and make poor recommendations because of those assumptions.  In particular, there are many cases for which using an old version of TLS is suboptimal and it shouldn't be considered as secure, but it may still be better than depr

Re: [Uta] Adoption call for draft-sheffer-uta-rfc7525bis-00

2020-05-01 Thread Keith Moore
On 5/1/20 12:27 PM, Ned Freed wrote: IMO RFC7525 and this new draft both suffer from dubious assumptions and make poor recommendations because of those assumptions.  In particular, there are many cases for which using an old version of TLS is suboptimal and it shouldn't be considered as secure,

Re: [Uta] Adoption call for draft-sheffer-uta-rfc7525bis-00

2020-05-01 Thread Keith Moore
On 5/1/20 5:02 PM, Peter Saint-Andre wrote: On 4/30/20 8:59 PM, Keith Moore wrote: IMO RFC7525 That ship sailed in 2015. IETF isn't bound by /stare decisis/. I don't think we ever said anything to the contrary. BCP does stand for *best* current practice, after all. If BCP re

Re: [Uta] Adoption call for draft-sheffer-uta-rfc7525bis-00

2020-05-01 Thread Keith Moore
On 5/1/20 6:48 PM, Eric Rescorla wrote: On Thu, Apr 30, 2020 at 7:59 PM Keith Moore mailto:mo...@network-heretics.com>> wrote: People do not always have the luxury of upgrading their clients and servers to versions that support the recent TLS.    Some legacy hardware

Re: [Uta] Adoption call for draft-sheffer-uta-rfc7525bis-00

2020-05-03 Thread Keith Moore
On 5/3/20 3:14 PM, Eric Rescorla wrote: I don't have much experience with SCADA TLS stacks, so I can't speak to this, but I wasn't thinking primarily of the TLS stack itself but just of the overall software on the device. In general, most software has some defects and some of them will be secu

Re: [Uta] Adoption call for draft-sheffer-uta-rfc7525bis-00

2020-05-12 Thread Keith Moore
On 5/9/20 11:50 AM, Valery Smyslov wrote: the chairs encourage WG members to more actively participate in the call. At the meeting a lot of participants expressed a favor of adoption, we ask these participants to reconfirm their position on the list (if they didn't do it yet). Since we wouldn'

Re: [Uta] RFC 8314: Consider supporting point-to-point delivery

2020-11-13 Thread Keith Moore
Short version: this is, in many cases, a Bad Idea. To the extent email delivery is reliable, it is because of persistence in relaying traffic.   Many mail user agents are not in a good position to do that.   It is generally better to submit the message to a service that is well-connected and w

Re: [Uta] RFC 8314: Consider supporting point-to-point delivery

2020-11-13 Thread Keith Moore
On 11/13/20 11:03 AM, Mikko Rantalainen wrote: Keith Moore (2020-11-13 17:26 Europe/Helsinki): To the extent email delivery is reliable, it is because of persistence in relaying traffic.   Many mail user agents are not in a good position to do that.   It is generally better to submit the

Re: [Uta] [Iotops] BRSKI and IDevID (non-!)issues with draft-ietf-uta-use-san

2021-05-30 Thread Keith Moore
On 5/24/21 12:08 PM, Valery Smyslov wrote: I also think that authors of original RFC should be contacted and asked whether they want to co-author bis document (and one of errata was reported by them). IMO it's fine to contact the authors of an original RFC and point out that an update is nee

Re: [Uta] [Iotops] BRSKI and IDevID (non-!)issues with draft-ietf-uta-use-san

2021-05-31 Thread Keith Moore
On 5/31/21 3:37 PM, Salz, Rich wrote: * IMO it's fine to contact the authors of an original RFC and point out that an update is needed.   But it's really presumptuous and rude to appoint oneself a co-author of a bis document and suggest that the original authors should become co-au

Re: [Uta] [Iotops] BRSKI and IDevID (non-!)issues with draft-ietf-uta-use-san

2021-05-31 Thread Keith Moore
On 5/31/21 4:19 PM, Valery Smyslov wrote: the 6125-bis draft has not been yet been issued, even the -00 version, so it's a bit early for you to make conclusions on selecting its authors. I agree with you that it's best if original authors take part in authoring -bis document and that's why

Re: [Uta] [Iotops] BRSKI and IDevID (non-!)issues with draft-ietf-uta-use-san

2021-06-01 Thread Keith Moore
On 6/1/21 10:27 AM, Salz, Rich wrote: After Valery’s suggestion I wrote to Jeff and Peter on May 24. No reply yet, but it’s been a holiday weekend in the US. This particular document was AD-sponsored, so perhaps Keith’s thoughts are more applicable. For WG docs, however, another aspect to con

Re: [Uta] Opportunistic encryption and authentication agility

2014-03-24 Thread Keith Moore
On 03/23/2014 06:32 PM, Michael Richardson wrote: Keith Moore wrote: > Note that as far as I can tell, it will still be possible to implement a > client that supports only OE; it just doesn't bother verifying the cert / > DNSSEC + TLSA record / pinned key / whatev

Re: [Uta] Opportunistic encryption and authentication agility

2014-03-24 Thread Keith Moore
On 03/24/2014 11:44 AM, Michael Richardson wrote: Keith Moore wrote: > I strongly doubt that this is appropriate advice for all (or even most) > applications or protocols. In particular, if there's some reason to believe > that a server intended to provide a v

Re: [Uta] Opportunistic encryption and authentication agility

2014-03-24 Thread Keith Moore
On 03/24/2014 12:20 PM, Daniel Kahn Gillmor wrote: On 03/24/2014 10:36 AM, Keith Moore wrote: Yes, it's more work and expense for a site to maintain valid CA-signed certs. But if clients complain when they're not there, providing CA-signed certs becomes "part of the cost of

Re: [Uta] Opportunistic encryption and authentication agility

2014-03-25 Thread Keith Moore
On 03/25/2014 04:09 PM, Trevor Perrin wrote: On Mon, Mar 24, 2014 at 9:51 AM, Daniel Kahn Gillmor wrote: On 03/24/2014 12:36 PM, Keith Moore wrote: So, what's the incentive for either clients or servers to support OE if clients just silently accept it without any indication to the user?

Re: [Uta] Opportunistic encryption and authentication agility

2014-03-25 Thread Keith Moore
On 03/25/2014 04:47 PM, Trevor Perrin wrote: Please be cautious about suggesting user indications. UI is complicated and >all that. More specifically in the browser case, even if you could strongly >authenticate a connection over which you request ahttp:// page, I wouldn't >want to give that pag

[Uta] draft-moore-smtp-addrquery

2015-07-21 Thread Keith Moore
Of possible interest to this WG, or to the members of this WG, is draft-moore-smtp-addrquery-01 Basically this is an extension to SMTP to allow mail exchangers to be queried for information about the email addresses for which they accept mail. Such information could include public keys. TLS is

Re: [Uta] draft-moore-smtp-addrquery

2015-07-21 Thread Keith Moore
John, Thanks very much for the review. Comments inline. On 07/21/2015 06:12 PM, John Levine wrote: Basically this is an extension to SMTP to allow mail exchangers to be queried for information about the email addresses for which they accept mail. Such information could include public keys. TL

Re: [Uta] draft-moore-smtp-addrquery

2015-07-21 Thread Keith Moore
On 07/22/2015 01:59 AM, John Levine wrote: Here's my use model: I set up my online access account at bigbank, and give them the address john+bigb...@example.com. Then they fetch my key and all the mail they send me is encrypted to my key. I'm also thinking that we should avoid making the perfec

Re: [Uta] draft-moore-smtp-addrquery

2015-07-30 Thread Keith Moore
On 07/29/2015 06:02 PM, Viktor Dukhovni wrote: On Wed, Jul 22, 2015 at 02:55:02AM -0400, Keith Moore wrote: Clearly this draft isn't insisting on "very secure", as it's relying on TLS certs and the model that any trusted CA is trusted for all domains, which is already kn

Re: [Uta] draft-moore-smtp-addrquery

2015-07-30 Thread Keith Moore
On 07/30/2015 01:52 PM, Viktor Dukhovni wrote: On Thu, Jul 30, 2015 at 11:34:43AM -0400, Keith Moore wrote: The secret swept under the rug is that there is no security at all in the provisioning process for DV certificates. Ok, I agree with you there. A DNSSEC signature is not less reliable

Re: [Uta] draft-moore-smtp-addrquery

2015-07-31 Thread Keith Moore
On 07/31/2015 11:28 AM, Viktor Dukhovni wrote: On Thu, Jul 30, 2015 at 04:02:58PM -0400, Keith Moore wrote: And finally, the idea that a DNS client could simply trust its local resolver to do DNSSEC validation for it never made any sense at all. Perhaps you're using the phrase "loca

Re: [Uta] draft-moore-smtp-addrquery

2015-07-31 Thread Keith Moore
On 07/31/2015 04:33 PM, Viktor Dukhovni wrote: On Fri, Jul 31, 2015 at 02:23:25PM -0400, Keith Moore wrote: Perhaps you're using the phrase "local resolver" in some novel way that I don't understand. Why shouldn't an application trust responses from 127.0.0.1:53? T

Re: [Uta] draft-moore-smtp-addrquery

2015-07-31 Thread Keith Moore
On 08/01/2015 01:14 AM, Viktor Dukhovni wrote: On Fri, Jul 31, 2015 at 06:49:59PM -0400, Keith Moore wrote: They'd also need new SMTP software to support AQRY. That software would need to be well maintained too. I trust the DNSSEC validation code in unbound and BIND more than I would

Re: [Uta] [saag] UTA WG report

2017-03-30 Thread Keith Moore
On 03/30/2017 05:26 PM, Jim Fenton wrote: [removing saag list because this is probably at a lower level of detail than appropriate there. But feel free to add them if I'm wrong] My sense that there is a "BCP part" to the draft is probably more clearly stated that there are really two differe

[Uta] BCP portion of draft-ietf-email-deep / relaxing MSP requirements

2017-04-02 Thread Keith Moore
After thinking about this a bit, it seems to me that if any portions of draft-ietf-email-deep should be BCP, it's those that describe requirements for MSPs. Those are indeed practice, not protocol. In the interest of expediency, I'd be fine with making those portions of MUA-STS non-normative

Re: [Uta] Review of draft-ietf-uta-email-deep-08

2017-07-24 Thread Keith Moore
Hi Alexey, Thanks for the review! Some responses: On 07/24/2017 12:04 PM, Alexey Melnikov wrote: I am generally very pleased with -07 and -08. A few minor comments: 1. Introduction This memo does not address use of TLS with SMTP for message relay (where Message Submission [RFC6409]

Re: [Uta] Review of draft-ietf-uta-email-deep-08

2017-07-25 Thread Keith Moore
On 07/25/2017 02:56 AM, Alexey Melnikov wrote: Use of pinned certs isn't forbidden by the draft, but pinned certs don't meet minimum confidentiality requirements. I think it might be possible to adequately address the security concerns associated with the usual implementation of pinned certifica

Re: [Uta] I-D Action: draft-ietf-uta-email-deep-09.txt

2017-09-14 Thread Keith Moore
: Keith Moore Chris Newman Filename: draft-ietf-uta-email-deep-09.txt Pages : 28 Date: 2017-09-12 Abstract: This specification outlines current recommendations for use of Transport Layer Security (TLS) to provide

Re: [Uta] Genart last call review of draft-ietf-uta-email-deep-09

2017-10-16 Thread Keith Moore
Thanks for the review.  Comments below: On 10/16/2017 01:18 AM, Roni Even wrote: Reviewer: Roni Even Review result: Almost Ready I am the assigned Gen-ART reviewer for this draft. The General Area Review Team (Gen-ART) reviews all IETF documents being processed by the IESG for the IETF Chair.

Re: [Uta] Opsdir last call review of draft-ietf-uta-email-deep-09

2017-10-16 Thread Keith Moore
Thanks for the review.   Comments inline: On 10/16/2017 12:55 PM, Carlos Pignataro wrote: Reviewer: Carlos Pignataro Review result: Has Nits I have reviewed this document as part of the Operational directorate's ongoing effort to review all IETF documents being processed by the IESG. These co

Re: [Uta] Mirja Kühlewind's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-23 Thread Keith Moore
-- COMMENT: -- The document reads like a BCP to me. Was it discussed in the group to go for BCP? If yes, why was it decided to go not for BCP? If no, I would str

Re: [Uta] Adam Roach's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-23 Thread Keith Moore
-- COMMENT: -- Balloting "Yes" because I think this is a very welcome and important update to its antecedent documents -- but I think there are a few simple chan

Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-24 Thread Keith Moore
(inline) Line 186 TLS, and to encourage a greater consistency for how TLS is used, this specification now recommends use of Implicit TLS for POP, IMAP, SMTP Submission, and all other protocols used between a Mail User Agent Do you want to say RECOMMENDED? Lower case "recommends" (n

Re: [Uta] Ben Campbell's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-25 Thread Keith Moore
-- COMMENT: -- I am balloting YES because I believe it is important to publish this. But there are a few issues I think should be resolved first: Substantive

Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-25 Thread Keith Moore
On 10/25/2017 06:29 PM, Eric Rescorla wrote: dh-group   = ALPHA *(ALPHA / DIGIT / "_") I might want to include hyphen here because "P-256" done. Line 405     implementation does not know the name of the cipher suite (a     situation that should be re

Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-26 Thread Keith Moore
On 10/26/2017 07:18 PM, Chris Newman wrote: Line 304    preference to services supporting STARTTLS (if offered).  (See    also Section 4.5.) I note that 6186 is kind of unclear on what should go in SNI. It obviously needs to be what you are checking against (which 6186 gets right) but

Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-27 Thread Keith Moore
> On Oct 27, 2017, at 7:48 AM, Eric Rescorla wrote: > > The entire principle here is that (absent DNSSEC) TLS operates on what was > fed into the client. Could you elaborate a bit? I feel like I'm missing some context. Thanks, Keith ___ Uta mai

Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-28 Thread Keith Moore
I've taken a stab at writing a non-normative appendix explaining this. - Appendix.  Use of Server Name Indication (SNI) in conjunction with SRV records This section attempts to explain the considerations involved when using SNI in conjunction with SRV records, because

Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-30 Thread Keith Moore
of Chris's suggestion.   I think that's the best we can do in a short time without additional review cycles. Keith On 10/28/2017 06:45 AM, Keith Moore wrote: I've taken a stab at writing a non-normative appendix explaining this. - Appendix

Re: [Uta] Updated TLSRPT

2018-01-31 Thread Keith Moore
On Jan 29, 2018, at 10:51 AM, Alexey Melnikov wrote: > Viktor, > > > On 29/01/2018 15:46, Viktor Dukhovni wrote: >>> On Jan 29, 2018, at 2:35 AM, Valery Smyslov wrote: >>> >>> Again, please provide the text. Otherwise the iterations >>> update-review may last forever. >> It is unclear from th

Re: [Uta] Updated TLSRPT

2018-01-31 Thread Keith Moore
No. You don't violate 27 years of practice based on any number of tests that this WG is capable of doing, just to avoid defining two content-types. Sent from my iPhone > On Jan 31, 2018, at 2:25 PM, James Cloos wrote: > > FWIW, I tried sending myself a gzip(1)ed json file using: > > Content

Re: [Uta] Updated TLSRPT

2018-01-31 Thread Keith Moore
IMO if you want to define application/tlsrpt in such a way that readers/processors can reliably distinguish between clear text JSON and gzipped JSON , say by looking at the first few bytes of the content for the header magic number indicating gzip compression, you're free to do so. You just can

Re: [Uta] Adoption call for draft-lvelvindron-tls-for-email-02

2018-11-19 Thread Keith Moore
This looks ok to me.  I concur with the reasoning in the document. - Keith On 11/8/18 12:52 AM, Valery Smyslov wrote: Hi, the chairs received a request for adoption of draft-lvelvindron-tls-for-email-02 [1] as UTA WG document. The draft seems to be in scope of UTA WG and follows the IETF trend

[Uta] comments on draft-ietf-uta-tls-for-email-00.txt

2018-11-27 Thread Keith Moore
1.  I especially appreciate this document being expressed as deltas to RFC 8314, as I believe this makes it much easier for a reader (especially an implementor or mail service operator) to understand exactly what's being changed. 2.  For existing accounts that have already been established bet

Re: [Uta] comments on draft-ietf-uta-tls-for-email-00.txt

2018-11-27 Thread Keith Moore
body of recommendations. Keith On 11/27/18 9:35 PM, Keith Moore wrote: 1. I especially appreciate this document being expressed as deltas to RFC 8314, as I believe this makes it much easier for a reader (especially an implementor or mail service operator) to understand exactly what's

Re: [Uta] WGLC for draft-ietf-uta-tls-for-email-03

2019-12-19 Thread Keith Moore
On 12/2/19 1:57 AM, Valery Smyslov wrote: Hi, this message starts a two weeks long Working Group Last Call for draft-ietf-uta-tls-for-email-03. The Last Call will end 16 December 2019. Please, send your opinions regarding publication of the draft to the list before this date (even if you have

Re: [Uta] Suresh Krishnan's Discuss on draft-ietf-uta-tls-for-email-04: (with DISCUSS)

2020-02-19 Thread Keith Moore
On 2/18/20 11:53 PM, Suresh Krishnan via Datatracker wrote: I think the following text from Section 4.1 of RFC8314 needs to be updated as well. Is there any reason this is left out? Transition of users from SSL or TLS 1.0 to later versions of TLS MAY be accomplished by a means similar t