Those fixes are fine with me.

On Fri, Feb 20, 2015 at 11:43 AM, Peter Saint-Andre - &yet <pe...@andyet.net
> wrote:

> Modulo a few nits (inline), this seems acceptable to me.
>
> On 2/20/15 9:23 AM, Richard Barnes wrote:
>
>>
>>
>> On Fri, Feb 20, 2015 at 9:42 AM, Peter Saint-Andre - &yet
>> <pe...@andyet.net <mailto:pe...@andyet.net>> wrote:
>>
>>     On 2/20/15 3:45 AM, Ralph Holz wrote:
>>
>>         Hi Viktor,
>>
>>              Basically, I'm fine with "raising the ceiling" as high as
>>         it seems
>>              to make sense, but once the floor is raised too high, the
>>         BCP no
>>              longer applies to opportunistic TLS.
>>
>>
>>         Thanks for jumping in and providing a good summary.
>>
>>         In my opinion, the purposes of this BCP *and* of OS are best
>>         served if
>>         we leave the BCP wording as it is - we address the authenticated
>> use
>>         case only. There are more than enough deployments that are
>>         covered by
>>         the BCP's recommendations. For OS, I would be happy to see a
>>         different
>>         document to focus on that use case, and do it well - as indeed
>>         the WG
>>         consensus was, too.
>>
>>
>>     +1
>>
>>
>> I am also +1 to a separate document for opportunistic.  It's just the
>> "unauthenticated" stuff that I object to, and the fact that the two are
>> confused with each other in 5.2.  We need to disentangle the two to be
>> clear about what we're talking about.
>>
>> It's also important to keep in mind that while opportunistic usage of
>> TLS may imply skipping authentication, the converse is not necessarily
>> true -- there are use cases for unauthenticated TLS that not
>> opportunistic (i.e., they will not fall back to plaintext).
>>
>> With those considerations in mind, I would propose the  following
>> revisions to sections 5.1 and 5.2 (replacing one paragraph in 5.1 and
>> all of 5.2):
>>
>> """
>> 5.1.
>>
>> ...
>>
>>     With regard to authentication, TLS enables authentication of one or
>>     both end-points in the communication.  In the context of opportunistic
>>     security [RFC7435], TLS may be used without authentication.
>>
>
> Instead of "may", I'd prefer "can be" or "is sometimes" or "is often"
> because "may" implies permission (let some other spec say it's acceptable).
>
>  As
>>     discussed in Section 5.2, considerations for opportunistic security
>>     are not in scope for this document.
>>
>> ...
>>
>>
>> 5.2.  Opportunistic Security
>>
>>     There are several important applications in which the use of TLS
>> itself
>>     is optional, i.e. the client decides dynamically ("opportunistically")
>>     whether to use TLS with a particular server or to connect in the
>> clear.
>>     This practice, often called "opportunistic security", is described at
>>     length in [RFC7435].  These scenarios also often involve support for
>>     legacy equipment.
>>
>
> Instead of "equipment", I'd prefer "deployments" because "equipment" makes
> it sound a hardware issue.
>
>      In such cases, some of the recommendations in this document might
>>     be too strict, since adhering to them could cause fallback to
>> plaintext,
>>     a worse outcome than using TLS with an outdated protocol version
>>     or ciphersuite.  The sense of the UTA Working Group was to complete
>>     work on this document about best practices for TLS in general, and to
>>     initiate work on a separate document about opportunistic TLS.
>> """
>>
>
> +1 otherwise.
>
> Peter
>
>
>
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to