Hi Viktor,

I would also expect that a given user's choice of NNTP server is
also fairly static, and in any case user-agents likely want valid
certificates and mandatory TLS (as with IMAP and SUBMIT).

Yep, you're right.


If so, I don't see much of a role for opportunistic TLS in NNTP,
in which case, the updated spec can be simplified to say that
clients SHOULD know whether TLS is expected of their peer, and if
so refuse to proceed unless they obtain an authenticated encrypted
channel (per all reasonable UTA TLS BCP guidelines, and with support
for the MTI ciphers appropriate for all supported TLS versions).

In the server-to-server case, once DANE succeeds or fails to get
traction for SMTP and XMPP, one might explore using DANE rather
than the public CA "Web PKI".  But this is premature at this time.
With peering largely static, "Web PKI" works well enough, and
clients can if they desire more security restrict which CAs they
are willing to accept as issuers of the fixed peer's certificate.

Thanks again for having shared your thoughts. We'll take them into account (if of course we update RFC 4642).

--
Julien ÉLIE

« Audaces fortuna iuvat. » (inspiré de Virgile, pour les chauves)

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to