I appreciate this answer, thank you

Sent with ProtonMail Secure Email.

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Friday 7 December 2018 23:48, Sean Turner <s...@sn3rd.com> wrote:

> There is no WG consensus to adopt this draft as no WG adoption call has been 
> made. draft-dkg-tls-reject-static-dh is an individual draft that is currently 
> being discussed on this list; in much the same way 
> draft-green-tls-static-dh-in-tls13 and draft-rhrd-tls-tls13-visibility were 
> individual drafts that were discussed on this list; there was no WG consensus 
> to adopt draft-rhrd-tls-tls13-visibility and there was never a call to adopt 
> draft-green-tls-static-dh-in-tls13.
>
> The chairs have been debating whether draft-dkg-tls-reject-static-dh is in 
> scope or whether the discussion should be moved elsewhere. Parts of this 
> draft we believe are in scope, e.g., providing guidance on handling key share 
> re-use and pitfalls for not following this guidance. (Note that how to handle 
> key share re-use is not the same thing as explicitly prohibiting re-use of 
> keys.) Other parts of the draft contain material for which we did not reach 
> consensus to address, such as Section 3.3 on prohibiting key-share reuse. We 
> are not the protocol police and have recently gotten out of that business, 
> e.g., by removing barriers for cipher suite code points. We do not want to 
> get back in that business.
>
> In order to ensure a focused discussion and avoid rehashing the previous 
> debate regarding draft-rhrd-tls-tls13-visibility, parts of this draft should 
> be rescoped or removed. Authors are free to take this material to an AD and 
> seek sponsorship, or to the ISE/IAB for further guidance.
>
> Cheers,
> Joe, Chris, and Sean
>
> > On Dec 6, 2018, at 21:19, Arnaud.Taddei.IETF 
> > Arnaud.Taddei.IETF=40protonmail....@dmarc.ietf.org wrote:
> > I am really surprised how the answers you don't like are systematically put 
> > on denial. Can you explain me what leads you to think that some people here 
> > are not concerned by the list of people you list? this is an assumption and 
> > the wrong assumption.
> > Perhaps on the contrary we are concerned BOTH by what these people endure 
> > but too by what other consistencies are basically removed rights to defend 
> > themselves.
> > As to the marketing aspect frankly this is an invention here and again I 
> > don't see what allows you to paint the answers you don't like because you 
> > don't like.
> > So I could on the contrary hightight the dogmatism that reins here, with a 
> > smell of intimidation, and to some degree the sectarianism back to the 
> > latin roots of the word
> > Regarding Human Rights, we DO care about Human Rights too and fact is that 
> > I had the chance to make more progress in 2 hours than I did in 2 years at 
> > IET and I had the chance to contribute to a magic moment with a Chinese 
> > Organization to comply a technical solution to Human Rights requirements. 
> > You know why? Because we took the time to TALK properly to each other, 
> > understand each other, learn from each other with no intimidation and no 
> > wrong assumptions that 'because we LOOK to be on the wrong side' we are 
> > foolish people, and respect to the fact that not everyone speaks and writes 
> > a proper English and sometimes words are dangerous when we don't know 
> > exactly the semantics in the right context
> > The assumption that you are the only one who cares is tiresome.
> > This group was offered a chance to control the development of a 360 degree 
> > solution for all parties and it was rejected. Fine. The ETSI took it and is 
> > taking its responsibly.
> > I don't know what leads you to think that a model where security resides 
> > only on the 2 ends of the communication IS the answer to all the problems.
> > The recent continuous scandals that are affecting a number of platforms and 
> > destroying trust, privacy and security is leading me to think about why 
> > should I trust this model. By analogy when I see how my body defends itself 
> > against bad stuff, it is using a battery of models, not one model.
> > In any negotiation you can look for what is the right battle, and those who 
> > understand that point will know that the right battle (and the one which is 
> > harder for the opposition) is on providing guarantees. This would have been 
> > a better battle to pick and would have given a chance to work more 
> > collaboratively and not by confrontation.
> > Now I don't understand what leads this group to try now to block the ETSI, 
> > can someone tell me and in particular the chairs if we have a consensus 
> > here?
> > Finally I am calling on the chairs of this group. It was very interesting 
> > to observe the many comments at the last IETF103 about the vile and toxic 
> > atmosphere that prevails here. I have all my time to work in these 
> > conditions but perhaps the chair could try to think about a more positive 
> > atmosphere of work.
> > A bon entendeur salut
> > Sent with ProtonMail Secure Email.
> > ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> > On Wednesday 5 December 2018 21:36, Daniel Kahn Gillmor 
> > d...@fifthhorseman.net wrote:
> >
> > > On Wed 2018-12-05 20:15:08 +0900, Bret Jordan wrote:
> > >
> > > > > On Dec 5, 2018, at 7:33 PM, Stephen Farrell stephen.farr...@cs.tcd.ie 
> > > > > wrote:
> > > > >
> > > > > > On 05/12/2018 10:22, Bret Jordan wrote:
> > > > > > I think we should be more open minded and look at the needs from a
> > > > > > 360 degree deployment perspective.
> > > > >
> > > > > I think we should avoid marketing speak.
> > > >
> > > > This is not marketing speak. This is understanding how these solutions
> > > > need to be deployed end to end in all of their scenarios from
> > > > consumer, to small business, to enterprise, to service provider, to
> > > > content provider, to telco, etc.
> > >
> > > Perhaps one of the reasons that this might across as marketing speak to
> > > some people is that your list of "all their scenarios" appears to be
> > > only business use cases (where the individual people involved are at
> > > most consumers of business products). You haven't mentioned
> > > journalists, disk jockeys, activists, flat earthers, dissidents,
> > > students, medical professionals, juggalos, community organizers, gun
> > > nuts, cryptozoologists, whistleblowers, LGBTQ folx, refugees, free
> > > software developers, elected officials, religious minorities, senior
> > > citizens, or any of the other non-business use cases that may depend on
> > > TLS for confidentiality, integrity, authenticity, or any of the other
> > > information security guarantees that are put at risk by proposals like
> > > this.
> > > One of the concerns the last time we danced this dance was that the
> > > proposal claimed to be interested in one use case only: "the enterprise
> > > data center", and yet offered no meaningful way to effectively limit its
> > > (ab)use outside the data center. This objection was raised clearly, and
> > > the proponents of the protocol change failed to address it. And now it
> > > appears that instead of addressing the concern, they forum-shopped until
> > > they found a place to publish the same approach without even
> > > acknowledging the concern that this could have an impact beyond the data
> > > center.
> > > A full 360 degree view might acknowledge that doing harm to the core
> > > priniciples of a security protocol that everyone relies on for the sake
> > > of one particular use case out of many might not be an appropriate step
> > > to take. (and that one use case might have other solutions, albeit
> > > perhaps more expensive or inconveient ones for people who have already
> > > made certain investments)
> > > I'm pretty sure we don't want TLS to be all things to all people, right?
> > > What are the core goals or guarantees of TLS that you would like to see
> > > preserved?
> > > --dkg
> >
> > TLS mailing list
> > TLS@ietf.org
> > https://www.ietf.org/mailman/listinfo/tls
>
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to