On Wed, Mar 14, 2018 at 7:17 PM, nalini elkins <nalini.elk...@e-dco.com>
wrote:

>
>>    - > Nalini, why don't you (the consortium) define the standard, then?
>>
>>
>>
>> > Indeed, if a “TLS13-visibility” standard has to be defined, it would
>> make sense for the consortium (rather than the TLS WG) to define it.
>>
>>
>>
>> I completely disagree.   Here is why I would not prefer that route:
>>
>>
>>
>> 1.  Multiple standards are likely to diverge.
>>
>>
>> Take the case of India, we have over 700 dialects.  Many of them started
>> with the same root language.  It has gotten so villages 10 miles apart
>> cannot talk to each other.  We use English (a clearly non-native language!)
>> to communicate.
>>
>>
>> I could see the same happening with TLS and Consortium-TLS.   Not a happy
>> thought for interoperability.
>>
>
> >Why is there any need for interoperability between TLS and
> Consortium-TLS? TLS is designed to be secure and reliable, and it's clear
> that Consortium-TLS finds such goals problematic. Yet I fail to see why
> that's a problem, since the claimed goal >is that Consortium-TLS would only
> be used within a single enterprise/datacenter, and thus would never need to
> interoperate with a world that valued security and privacy.
>
>
> Enterprises value security and privacy.   They have a different job to
> do.  What they are trying to do is to protect against leakage of data, do
> fraud monitoring, protect against malware and many other things.   When
> this gets into the medical arena, it can even be lives.  I don't even see
> how you can say what you are saying.
>
> Let me ask you then, what are the use cases you find to be valid?  Saying
> that enterprises don't value security and privacy is really not terribly
> useful to resolving any discussion.
>

Isn't it the core of the discussion though? Whether the enterprise case -
which understandably and fundamentally weakens the security assurances,
both to servers and to clients - is justified, given the ecosystem risk it
poses? And the specific proposals, as demonstrated, have negative impacts
both in the design and deployment of TLS.

Given that, and given the ample discussion on-list motivating PFS, and
given the stated reasoning, it doesn't seem that "inter-protocol
interoperability" is necessary nor desirable. It's true that enterprises
don't value the same security and privacy properties that have been
discussed on the list - we wouldn't be having this discussion if that was
not the case. This isn't unproductive or not useful - this is based on the
statements from those advocating for the weakening of security of the
protocol.

As such, the need for interoperability is not a goal that's supported by
the discussion to date, and thus the concerns - that TLS and consortium-TLS
would diverge - does not seem supported by the arguments. So I do hope you
can answer - why is interoperability between TLS and Consortium-TLS
necessary, given that the use cases to date of Consortium-TLS state they'll
be limited to the enterprise or datacenter, for which the only
interoperability concerns that arise are between devices supporting
Consortium-TLS, which by speccing in a Consortium as suggested, you could
resolve?
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to