Hi Ben

Thanks for the response.  Please see below.

> 
> Agreed ... but this proposal appears to be predicated on a contrary 
> assumption.  It assumes that it is difficult for malware to learn the TLS 
> profile of the device, and then proceeds to place this profile information in 
> the (public) MUD file, where malware can easily retrieve it.

Ok, I didn’t take that from this discussion.

> 
> I'm not thinking of the hours-days timescale of MUD file updates; I'm 
> thinking of the months-years timescale of updating standards to support new 
> features.  How long does a device have to wait after a new protocol revision 
> comes out before it can start using the new protocol?

Ok, I see what you are saying.  Thanks for getting me there.

The question is what to do when you start seeing something you don’t 
understand.  Let’s take a TLS extension, for instance.  If the TLS extension is 
unknown to the f/w but is declared somehow, that tells the firewall that they 
have some coding to do, and should be conservative about complaining over 
something that is out of profile.  I don’t see that as a show stopper.  What I 
do see as a showstopper would be if, as is written and you rightly observe, a 
new rev of a YANG model is required to introduce the TLS extension, so that 
part would need to be described in a more flexible manner (e.g, an IANA 
registration or similar).  I’d suggest the authors consider that.

Eliot



Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to