On 03/24/2014 11:44 AM, Michael Richardson wrote:
Keith Moore <[email protected]> wrote:
     > I strongly doubt that this is appropriate advice for all (or even most)
     > applications or protocols.   In particular, if there's some reason to 
believe
     > that a server intended to provide a verifiable cert, if that cert is in 
fact
     > not verifiable, this is an error condition that shouldn't (inherently) be
     > masked by silently treating the connection as if it were cleartext.

If you have "some reason", then you must have pre-configuration of a
bilateral nature.    That clue can certainly be automatic; such as coming
 From a DNS(SEC) DANE certificate of the right type, or an application
asserting some kind of channel binding.

DANE isn't "pre-configuration of a bilateral nature" and no, "some reason" isn't limited to such pre-configuration.
     > Yes, it's more work and expense for a site to maintain valid CA-signed 
certs.

That is no longer the only option.

I didn't say it was.

     > cleartext operation, and so little affinity between clients and servers, 
that
     > it will be very difficult to do better than OE.

I really think it's important that people not think of OE as a step towards
something else.

I think it's silly to artificially limit the applicability of OE. We have few enough tools already without deliberately hampering our ability to use them.


Keith

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to