Hi Peter,

I am actually fine with your new text. And just for context, this section also talks about HSTS.

Thanks,
        Yaron

On 06/22/2014 04:29 AM, Peter Saint-Andre wrote:
As part of the authors' work on addressing WG feedback, Yaron has
provisionally added the following statement to draft-ietf-uta-tls-bcp:

    Combining unprotected and TLS-protected communication opens
    the way to SSL Stripping and similar attacks. Clients and Servers
    SHOULD prefer strict TLS configuration, as opposed to dynamic
    upgrade from unencrypted to TLS-protected traffic, such as STARTTLS.

This statement strikes me as potentially problematic. Here's why:

For reasons other than security (e.g., see RFC 6335), TLS-only ports
have been deprecated and discouraged over the years in various
application protocols. For example, in Jabber/XMPP we once used port
5223 for SSL-only communications (this was in 1999-2004), and used port
5222 for unencrypted communications (similar to the HTTP convention of
the day). When XMPP was standardized at the IETF in RFC 3920, the IESG
told the XMPP WG to use STARTTLS upgrade on port 5222 (not a TLS-only
port of 5223), and we complied. The advice that Yaron has added might
lead naive implementers of XMPP to believe that they should use port
5223 even though it was never standardized and was actively discouraged
by RFC 3920 (and reinforced by RFC 6120). IMHO such behavior would be
bad, and would violate the spirit and letter of RFC 3920 / RFC 6120.

I suggest instead:

    Combining unprotected and TLS-protected communication opens
    the way to SSL Stripping and similar attacks. In cases where an
    application protocol allows implementations or deployments a choice
    between strict TLS configuration and dynamic upgrade from
    unencrypted to TLS-protected traffic (such as STARTTLS), clients and
    servers SHOULD prefer strict TLS configuration.

Peter


_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to