Richard Barnes <r...@ipv.sx> wrote:
> On Thu, Feb 19, 2015 at 1:26 AM, Brian Smith <br...@briansmith.org> wrote:
>> IMO, unauthenticated TLS is so different from secure use of TLS that
>> it deserves its own document once we've learned what the *best*
>> *current* practices for unauthenticated TLS are, which we currently do
>> not know.
>
> I'm curious how you think unauthenticated TLS is so dramatically different.
> I mean, WebRTC connections are all unauthenticated, and they look exactly
> the same on the wire as authenticated connections -- the endpoints just
> don't check the certs.

Sorry, allow me to edit that:

Unauthenticated TLS deserves its own document once we've learned what
the *best* *current* practices for unauthenticated TLS are, which we
currently do not know.

Obviously, since we don't know the best current practices for
unauthenticated TLS (except, possible, to avoid it), we can't
meaningfully discuss how they are different from best best current
practices for authenticated TLS, which is what the UTA working group
discussed to produce this document.

Cheers,
Brian

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to