On Fri, Feb 20, 2015 at 9:42 AM, Peter Saint-Andre - &yet <pe...@andyet.net>
wrote:

> On 2/20/15 3:45 AM, Ralph Holz wrote:
>
>> Hi Viktor,
>>
>>     Basically, I'm fine with "raising the ceiling" as high as it seems
>>     to make sense, but once the floor is raised too high, the BCP no
>>     longer applies to opportunistic TLS.
>>
>>
>> Thanks for jumping in and providing a good summary.
>>
>> In my opinion, the purposes of this BCP *and* of OS are best served if
>> we leave the BCP wording as it is - we address the authenticated use
>> case only. There are more than enough deployments that are covered by
>> the BCP's recommendations. For OS, I would be happy to see a different
>> document to focus on that use case, and do it well - as indeed the WG
>> consensus was, too.
>>
>
> +1
>

I am also +1 to a separate document for opportunistic.  It's just the
"unauthenticated" stuff that I object to, and the fact that the two are
confused with each other in 5.2.  We need to disentangle the two to be
clear about what we're talking about.

It's also important to keep in mind that while opportunistic usage of TLS
may imply skipping authentication, the converse is not necessarily true --
there are use cases for unauthenticated TLS that not opportunistic (i.e.,
they will not fall back to plaintext).

With those considerations in mind, I would propose the  following revisions
to sections 5.1 and 5.2 (replacing one paragraph in 5.1 and all of 5.2):

"""
5.1.

...

   With regard to authentication, TLS enables authentication of one or
   both end-points in the communication.  In the context of opportunistic
   security [RFC7435], TLS may be used without authentication. As
   discussed in Section 5.2, considerations for opportunistic security
   are not in scope for this document.

...


5.2.  Opportunistic Security

   There are several important applications in which the use of TLS itself
   is optional, i.e. the client decides dynamically ("opportunistically")
   whether to use TLS with a particular server or to connect in the clear.
   This practice, often called "opportunistic security", is described at
   length in [RFC7435].  These scenarios also often involve support for
   legacy equipment.

   In such cases, some of the recommendations in this document might
   be too strict, since adhering to them could cause fallback to plaintext,
   a worse outcome than using TLS with an outdated protocol version
   or ciphersuite.  The sense of the UTA Working Group was to complete
   work on this document about best practices for TLS in general, and to
   initiate work on a separate document about opportunistic TLS.
"""



>
> I'm going to submit version -10 now.
>
> Peter
>
> --
> Peter Saint-Andre
> https://andyet.com/
>
>
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to