Hi -

On 2022-03-02 8:03 AM, Joe Clarke (jclarke) wrote:
Yes, there are plans to add new additions.  If there is a new, paralell
registry for the sole use of this SNMP transport, then there should not
be a chance for TLS implementors to be confused.

Admittedly, this isn't completely optimal, but in light of other
options, which would involve larger MIB changes, it seems like a viable
path that does have some longevity to it.

So...  If I understand this "longevity" plan correctly, when TLS 1.4
comes along we'll need to create yet another registry to prevent
confused TLS 1.3 (as well as TLS 1.2) maintenance engineers from adding
inappropriate algorithms?

Randy

Joe

On 3/1/22 00:40, Randy Presuhn wrote:
Hi -

Wait...  are there or are there not any plans for additions to the
registry?  If there are no plans for additions, the argument about
confused TLS implementors seems hypothetical.  If there are plans for
additions, is it envisioned that any of the existing algorithms will
eventually be in some sense deprecated?  What terrible things will
happen if some confused maintenance engineer manages to bolt one of
these new algorithms onto their TLS 1.2 implementation, presumably
despite advice to the contrary in its registration?

Will creating a new registry really prevent these confused maintenance
engineers from making the same mistake?

Randy

On 2022-02-28 2:58 PM, Joe Clarke (jclarke) wrote:
Maybe "fear" is too string a word, but the sentiment was that it gave
mixed messages to start adding new values to that table (which they feel
is static at this point) and could lead to confusion with implementors.

Given that it seemed to me _this_ change in DESCRIPTION could be
considered semantically the same, I thought it wouldn't warrant a new
object and could be much smaller than a whole MIB rewrite.  I wanted Ken
to socialize that here.

Joe

On 2/28/22 13:45, Jürgen Schönwälder wrote:
Randy,

I assume it is fear of all of that, whether this is justified or not
can be debated. Frankly, we used a protocol registry because it was
handy and we likely did not like a proliferation of registries. In
hindsight, we would have been better off creating our own.

Does it make sense to republish an entire MIB module to just change
the registry location? Ideally this would not be required and we would
simply publish a document updating RFC 6353 and defining the new
registry (and even more so given that no registry content change is
envisioned).

/js

On Mon, Feb 28, 2022 at 10:24:53AM -0800, Randy Presuhn wrote:
Hi -

On 2022-02-28 6:28 AM, Kenneth Vaughn wrote:
To OPSAWG, especially MIB doctors and SNMP-experts:

We have contacted the TLS community about potentially allowing for the
continued use and maintenance of the IANA TLS HashAlgorithm Registry
(RFC 5246) in the update to RFC 6353 so that we do not have to redefine
its fingerprint algorithm. The TLS community expressed a valid concern
that if the registry is maintained by adding new values, it would imply
that those new values could be used within TLS 1.2; thus our proposal to
continue to reference the existing table was not accepted.
I don't understand the fear here.  Are they worried that:

     - someone would misconstrue additions to the IANA TLS HashAlgorithm
       Registry as somehow *requiring* TLS 1.2 implementations to be
       updated, even though they've been "designated obsolete"?

     - that despite TLS 1.2 having been "designated obsolete", folks
       maintaining those implementations would take it upon themselves
       to add support for later additions to the IANA TLS HashAlgorithm
       Registry?

     - that there might be a proliferation of TLS 1.2 deployments that
       attempt to use the additions to the IANA TLS HashAlgorithm
       Registry, despite TLS 1.2 having been "designated obsolete"?

     - that the possibility of adding these algorithms might somehow
       prolong the lifetime of existing TLS 1.2 deployments or even
       lead to new ones, despite it having been "designated obsolete"?

     - something else?

Randy

_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg
_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg



_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to