Hi Viktor,

It would be best if NNTP did not specify MTI TLS ciphersuites and
left that to the relevant TLS specifications.  Instead, it would
be more useful to specify a minimum TLS protocol version, and
require each side to support the MTI ciphers for each supported
protocol version.

OK thanks, that seems wise.



It seems that 4642 is rather muddy on whether TLS in NNTP is
opportunistic or not.  On the one hand it requires server
authentication, which seems to be mitigation of active attacks via
mandatory TLS, and on the other it talks about clients possibly
continuing despite absence of STARTTLS capability or STARTTLS
failure.

If an update is published, it should resolve the opportunistic vs.
mandatory TLS confusion, possibly by describing two separate modes
of operation.

Noted, thanks.



AFAIK, NNTP peering relationships are fairly static, and mandatory
TLS seems like the way to go in that case.  But if NNTP servers
contact other servers "on the fly", then opportunistic TLS may
be appropriate and one might even consider DANE to harden that.

You're right that NNTP peering is fairly static. However, TLS is rarely used for NNTP peering between two servers. TLS is more wide-spread for the connection of a news client to a news server so as to read or post articles.

--
Julien ÉLIE

« Vous savez, les idées, elles sont dans l'air. Il suffit que
  quelqu'un vous en parle de trop près, pour que vous les
  attrapiez ! » (Raymond Devos)

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to