On Wed, Sep 02, 2015 at 05:13:08PM +0200, Julien ?LIE wrote: > >AFAIK, NNTP peering relationships are fairly static, and mandatory > >TLS seems like the way to go in that case. But if NNTP servers > >contact other servers "on the fly", then opportunistic TLS may > >be appropriate and one might even consider DANE to harden that. > > You're right that NNTP peering is fairly static. However, TLS is rarely > used for NNTP peering between two servers. TLS is more wide-spread for the > connection of a news client to a news server so as to read or post articles.
I would also expect that a given user's choice of NNTP server is also fairly static, and in any case user-agents likely want valid certificates and mandatory TLS (as with IMAP and SUBMIT). If so, I don't see much of a role for opportunistic TLS in NNTP, in which case, the updated spec can be simplified to say that clients SHOULD know whether TLS is expected of their peer, and if so refuse to proceed unless they obtain an authenticated encrypted channel (per all reasonable UTA TLS BCP guidelines, and with support for the MTI ciphers appropriate for all supported TLS versions). In the server-to-server case, once DANE succeeds or fails to get traction for SMTP and XMPP, one might explore using DANE rather than the public CA "Web PKI". But this is premature at this time. With peering largely static, "Web PKI" works well enough, and clients can if they desire more security restrict which CAs they are willing to accept as issuers of the fixed peer's certificate. -- Viktor. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls