As part of the authors' work on addressing WG feedback, Yaron has provisionally added the following statement to draft-ietf-uta-tls-bcp:

   Combining unprotected and TLS-protected communication opens
   the way to SSL Stripping and similar attacks. Clients and Servers
   SHOULD prefer strict TLS configuration, as opposed to dynamic
   upgrade from unencrypted to TLS-protected traffic, such as STARTTLS.

This statement strikes me as potentially problematic. Here's why:

For reasons other than security (e.g., see RFC 6335), TLS-only ports have been deprecated and discouraged over the years in various application protocols. For example, in Jabber/XMPP we once used port 5223 for SSL-only communications (this was in 1999-2004), and used port 5222 for unencrypted communications (similar to the HTTP convention of the day). When XMPP was standardized at the IETF in RFC 3920, the IESG told the XMPP WG to use STARTTLS upgrade on port 5222 (not a TLS-only port of 5223), and we complied. The advice that Yaron has added might lead naive implementers of XMPP to believe that they should use port 5223 even though it was never standardized and was actively discouraged by RFC 3920 (and reinforced by RFC 6120). IMHO such behavior would be bad, and would violate the spirit and letter of RFC 3920 / RFC 6120.

I suggest instead:

   Combining unprotected and TLS-protected communication opens
   the way to SSL Stripping and similar attacks. In cases where an
   application protocol allows implementations or deployments a choice
   between strict TLS configuration and dynamic upgrade from
   unencrypted to TLS-protected traffic (such as STARTTLS), clients and
   servers SHOULD prefer strict TLS configuration.

Peter

--
Peter Saint-Andre
https://stpeter.im/

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to