Modulo a few nits (inline), this seems acceptable to me.

On 2/20/15 9:23 AM, Richard Barnes wrote:


On Fri, Feb 20, 2015 at 9:42 AM, Peter Saint-Andre - &yet
<pe...@andyet.net <mailto:pe...@andyet.net>> wrote:

    On 2/20/15 3:45 AM, Ralph Holz wrote:

        Hi Viktor,

             Basically, I'm fine with "raising the ceiling" as high as
        it seems
             to make sense, but once the floor is raised too high, the
        BCP no
             longer applies to opportunistic TLS.


        Thanks for jumping in and providing a good summary.

        In my opinion, the purposes of this BCP *and* of OS are best
        served if
        we leave the BCP wording as it is - we address the authenticated use
        case only. There are more than enough deployments that are
        covered by
        the BCP's recommendations. For OS, I would be happy to see a
        different
        document to focus on that use case, and do it well - as indeed
        the WG
        consensus was, too.


    +1


I am also +1 to a separate document for opportunistic.  It's just the
"unauthenticated" stuff that I object to, and the fact that the two are
confused with each other in 5.2.  We need to disentangle the two to be
clear about what we're talking about.

It's also important to keep in mind that while opportunistic usage of
TLS may imply skipping authentication, the converse is not necessarily
true -- there are use cases for unauthenticated TLS that not
opportunistic (i.e., they will not fall back to plaintext).

With those considerations in mind, I would propose the  following
revisions to sections 5.1 and 5.2 (replacing one paragraph in 5.1 and
all of 5.2):

"""
5.1.

...

    With regard to authentication, TLS enables authentication of one or
    both end-points in the communication.  In the context of opportunistic
    security [RFC7435], TLS may be used without authentication.

Instead of "may", I'd prefer "can be" or "is sometimes" or "is often" because "may" implies permission (let some other spec say it's acceptable).

As
    discussed in Section 5.2, considerations for opportunistic security
    are not in scope for this document.

...


5.2.  Opportunistic Security

    There are several important applications in which the use of TLS itself
    is optional, i.e. the client decides dynamically ("opportunistically")
    whether to use TLS with a particular server or to connect in the clear.
    This practice, often called "opportunistic security", is described at
    length in [RFC7435].  These scenarios also often involve support for
    legacy equipment.

Instead of "equipment", I'd prefer "deployments" because "equipment" makes it sound a hardware issue.

    In such cases, some of the recommendations in this document might
    be too strict, since adhering to them could cause fallback to plaintext,
    a worse outcome than using TLS with an outdated protocol version
    or ciphersuite.  The sense of the UTA Working Group was to complete
    work on this document about best practices for TLS in general, and to
    initiate work on a separate document about opportunistic TLS.
"""

+1 otherwise.

Peter


_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to