Hi Sean,

I guess I’m not following why we need a new NNTP draft either.

RFC 4642 (TLS with NNTP) states:

   In general, the security considerations of the TLS protocol [TLS] and
   any implemented extensions [TLS-EXT] are applicable here; only the
   most important are highlighted specifically below.
   [...]
   NNTP client and server implementations MUST implement the
   TLS_RSA_WITH_RC4_128_MD5 cipher suite [...] This is
   important, as it assures that any two compliant implementations can
   be configured to interoperate.


Along with latest RFCs about TLS, it becomes inconsistent. No NNTP implementation can now be RFC-compliant to both NNTP specifications and TLS specifications as there are two incompatible MUST.

That's why I thought we need a new NNTP draft about the use of TLS. (An erratum to RFC 4642 is normally not enough because it is a real change to the protocol.)


Isn't it a valid reason?
RFC 7465 that prohibits RC4 updates the 3 RFCs related to TLS 1.0, 1.1 and 1.2. It does not update RFC 4642 for NNTP.



If
you’re looking or something that specifically updates the NNTP MTI
cipher suites, then there isn’t such an RFC.  But, RFC 7525 (aka BCP
195) points to RFC 7465 that prohibits RC4 (for all versions of
TLS), so if an NNTP implementer is faithfully implementing TLS and
related RFCs then they’ll end up supporting TLS 1.2 with one of the
cipher suites in s4.2 of RFC 7525.

Yes, I understand. A compliant NNTP implementation will support one of the mandatory cipher suites specified in TLS. So interoperability will be guaranteed.

My concern is for the also mandatory RC4 cipher suite for a compliant NNTP implementation using TLS (per RFC 4642). I do not see how to conciliate the wording of RFC 4642 with latest RFCs related to TLS.

Maybe I am misunderstanding something in how RFCs work. Have latest RFCs related to TLS automatically taken precedence on the wording of RFC 4642 without any update relationship between them?



If you really, really want to have something that updates RFC 4642
(likely referring to BCP 195), then there’s nothing stopping you from
writing that draft.  If you get no nibbles on said draft from the
ietf-nntp list I’d try UTA
(http://datatracker.ietf.org/wg/uta/charter/).  Note that said draft
is out-of-scope for the TLS WG.

OK, thanks for your advice.
I understand that an NNTP draft is out-of-scope of the TLS WG. I asked in that WG because I thought an update relationship between RFC 4642 and the latest documents produced by the TLS WG would have been enough and more straight-forward to solve the wording incompatibility that RFC 7465 introduced earlier this year. I pretty well understand that the unfortunate reference to cipher suites in RFC 4642 was not known by the TLS WG; so nobody knew that it was time to do special care for it. Neither do I myself followed the drafts and the last call of the prohibition of RC4.

That's why I wrote here to in fact ask what could now be done. I thought it could be up to a Section of RFCs produced by the TLS WG that could update RFC 4642. It finally appears that another way should be found: either the NNTP or the UTA WG.


Do not hesitate to correct me if I am wrong in certain points.
And thanks again to all who answered,

--
Julien ÉLIE

« Audaces fortuna iuvat. » (inspiré de Virgile, pour les chauves)

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to