This LGTM.

On Fri, Feb 20, 2015 at 8:23 AM, Richard Barnes <r...@ipv.sx> wrote:

>
>
> On Fri, Feb 20, 2015 at 9:42 AM, Peter Saint-Andre - &yet <
> pe...@andyet.net> wrote:
>
>> On 2/20/15 3:45 AM, Ralph Holz wrote:
>>
>>> Hi Viktor,
>>>
>>>     Basically, I'm fine with "raising the ceiling" as high as it seems
>>>     to make sense, but once the floor is raised too high, the BCP no
>>>     longer applies to opportunistic TLS.
>>>
>>>
>>> Thanks for jumping in and providing a good summary.
>>>
>>> In my opinion, the purposes of this BCP *and* of OS are best served if
>>> we leave the BCP wording as it is - we address the authenticated use
>>> case only. There are more than enough deployments that are covered by
>>> the BCP's recommendations. For OS, I would be happy to see a different
>>> document to focus on that use case, and do it well - as indeed the WG
>>> consensus was, too.
>>>
>>
>> +1
>>
>
> I am also +1 to a separate document for opportunistic.  It's just the
> "unauthenticated" stuff that I object to, and the fact that the two are
> confused with each other in 5.2.  We need to disentangle the two to be
> clear about what we're talking about.
>
> It's also important to keep in mind that while opportunistic usage of TLS
> may imply skipping authentication, the converse is not necessarily true --
> there are use cases for unauthenticated TLS that not opportunistic (i.e.,
> they will not fall back to plaintext).
>
> With those considerations in mind, I would propose the  following
> revisions to sections 5.1 and 5.2 (replacing one paragraph in 5.1 and all
> of 5.2):
>
> """
> 5.1.
>
> ...
>
>    With regard to authentication, TLS enables authentication of one or
>    both end-points in the communication.  In the context of opportunistic
>    security [RFC7435], TLS may be used without authentication. As
>    discussed in Section 5.2, considerations for opportunistic security
>    are not in scope for this document.
>
> ...
>
>
> 5.2.  Opportunistic Security
>
>    There are several important applications in which the use of TLS itself
>    is optional, i.e. the client decides dynamically ("opportunistically")
>    whether to use TLS with a particular server or to connect in the clear.
>    This practice, often called "opportunistic security", is described at
>    length in [RFC7435].  These scenarios also often involve support for
>    legacy equipment.
>
>    In such cases, some of the recommendations in this document might
>    be too strict, since adhering to them could cause fallback to plaintext,
>    a worse outcome than using TLS with an outdated protocol version
>    or ciphersuite.  The sense of the UTA Working Group was to complete
>    work on this document about best practices for TLS in general, and to
>    initiate work on a separate document about opportunistic TLS.
> """
>
>
>
>>
>> I'm going to submit version -10 now.
>>
>> Peter
>>
>> --
>> Peter Saint-Andre
>> https://andyet.com/
>>
>>
>
> _______________________________________________
> Uta mailing list
> Uta@ietf.org
> https://www.ietf.org/mailman/listinfo/uta
>
>
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to