On Thu, Feb 19, 2015 at 1:26 AM, Brian Smith <br...@briansmith.org> wrote:

> Richard Barnes <r...@ipv.sx> wrote:
> > Pete Resnick <presn...@qti.qualcomm.com> wrote:
> >> Until we are able to get better community consensus on this topic and
> how
> >> to explain it in documents, I think (and I believe the WG agrees) that
> the
> >> right thing to say is, "This document isn't talking about OS" and leave
> it
> >> at that, which is what the document now says.
> >
> > It's wrong to just throw up our hands and give carte blanche just
> because we
> > might need to red-line a few things.  At most, we should say something
> like,
> > "OS is a work in progress; until further notice, use this as a baseline
> and
> > deviate to the minimal extent possible."
>
> The working group agreed that unauthenticated TLS is out of scope for
> the document. Saying anything other than unauthenticated TLS is out of
> scope would misrepresent the working group's consensus.As others
> pointed out, if and how much of this document is appropriate for
> unauthenticated TLS is very unclear and deciding that would add a lot
> of delay to the publication of the document.
>
> The working group already decided to defer much more serious and more
> widely-relevant issues (like the complete lack of any recommendations
> regarding ECDSA cipher suites, despite these being the most
> interoperable AES-GCM cipher suites available and the best ones for
> server-side performance, or the fact that the document recommends DHE
> cipher suites despite clear evidence that DHE cipher suites are a
> minefield) in the interests of getting the document published on a
> reasonable schedule.
>
> IMO, unauthenticated TLS is so different from secure use of TLS that
> it deserves its own document once we've learned what the *best*
> *current* practices for unauthenticated TLS are, which we currently do
> not know.
>

I'm curious how you think unauthenticated TLS is so dramatically
different.  I mean, WebRTC connections are all unauthenticated, and they
look exactly the same on the wire as authenticated connections -- the
endpoints just don't check the certs.

--Richard



>
> Cheers,
> Brian
>
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to