On 10.09.2013 22:00, Scott Brim wrote:
On Tue, Sep 10, 2013 at 2:46 PM, Hannes Tschofenig
<[email protected]>  wrote:
One approach to focus the discussion is to limit it to what the IETF can do.

Sounds good.

Within that category one could also focus on specific applications to make
it (a) down-to-earth and (b) have a bit time for preparation.

Want to start with the drafts recently discussed here?

Do you think that the drafts need some face-to-face discussion time? We should be able to finalize them before the IETF meeting.

draft-sheffer-tls-bcp-00.txt lists well-known attacks and makes reasonable suggestions. Of course there is always room for improvement in the write-up.

draft-trammell-perpass-ppa-00.txt introduces the terminology for a new adversary model and that looks good to me.

draft-saintandre-xmpp-tls-00.txt is a bit related to Yaron's document but also makes sense. Maybe there is room for alignment with draft-sheffer-tls-bcp-00.txt.

I personally believe that the difficult aspects are elsewhere, namely

* mandating an secure protocol design only (e.g. HTTP 2.0 with TLS-on always)
 * choice of trust models (think about ZRTP vs. DTLS-SRTP; PGP vs. S/MIME)
* limiting ourselves to fewer choices (unlike in the SIP world where we have documents like http://tools.ietf.org/html/draft-ietf-avt-srtp-not-mandatory-13) * avoiding standardization of security solutions that are designed to support lawful intercept.

Ciao
Hannes




_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to