On Wed, Feb 18, 2015 at 11:27 PM, Pete Resnick <presn...@qti.qualcomm.com>
wrote:

> On 2/18/15 10:19 PM, Peter Saint-Andre - &yet wrote:
>
>> On 2/18/15 8:34 PM, Richard Barnes wrote:
>>
>>> ----------------------------------------------------------------------
>>> DISCUSS:
>>> ----------------------------------------------------------------------
>>>
>>> I really can't abide by the abdication in Section 5.2.
>>>
>>
>> Abdication is an awfully strong word.
>>
>>  Getting a cert is
>>> hard.  Running reasonably recent software and configuring it properly is
>>> not.  The possibility that a connection will not be authenticated is no
>>> excuse for using bad versions of TLS or using insecure ciphersuites.
>>>
>>> I appreciate that normally deference to WG consensus is appropriate, but
>>> this is a recommendation that could be actively harmful to the Internet
>>> by encouraging the continued use of broken code.
>>>
>>
>> I think the document, then, does not provide clear enough text.
>>
>> I do not think we intended to actively recommend that anyone run broken
>> code, use outdated versions of TLS, use insecure ciphersuites, etc.
>> However, we are saying that this document was not written specifically to
>> cover unauthenticated TLS usages because that was a point of strong
>> contention in the WG and we were not able to reach consensus. The thread
>> beginning here is illustrative:
>>
>> http://www.ietf.org/mail-archive/web/uta/current/msg00625.html
>>
>> If you are insisting that this document be remanded to the WG with
>> instructions that it reach consensus one way or the other, then please let
>> us know.
>>
>
> The rest I'm happy for the editors/chairs/others to take up, but let me
> take on this one:
>
> We will discuss this on the call tomorrow. Stephen and Kathleen and I are
> working on (well, really, Stephen produced a first draft a month ago and I
> dawdled on my edit, but I hope we are close to getting out the door) a
> statement to the community regarding discussions of OS considerations.
> There are a load of reasons that in an OS (and potentially other
> unauthenticated) context you would violate some of the recommendations in
> this document.


I look forward to your documentation of which recommendations and which
reasons.



> As our note will say, it is incredibly hard (I would say near impossible)
> to reasonably convey what the "right" approach is when talking about OS.


I will object strenuously to anything that suggests that continuing to use
broken algorithms or protocols is any sense a "right" approach.
Fortunately, Peter's note implies that this is not what the WG intended.



> Until we are able to get better community consensus on this topic and how
> to explain it in documents, I think (and I believe the WG agrees) that the
> right thing to say is, "This document isn't talking about OS" and leave it
> at that, which is what the document now says.
>

It's wrong to just throw up our hands and give carte blanche just because
we might need to red-line a few things.  At most, we should say something
like, "OS is a work in progress; until further notice, use this as a
baseline and deviate to the minimal extent possible."

--Richard



> I'll probably share the draft text we've been working on with Richard.
> Perhaps Stephen and I will simply convince him. Perhaps he will convince
> us. But let's leave this topic for the telechat tomorrow, and we'll circle
> back to the WG if there's an issue to address.
>
> pr
>
> --
> Pete Resnick<http://www.qualcomm.com/~presnick/>
> Qualcomm Technologies, Inc. - +1 (858)651-4478
>
>
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to