On 2014-07-30 15:45, Paul Hoffman wrote:
> On Jul 24, 2014, at 3:36 PM, Kohei Kasamatsu <[email protected]> 
> wrote:
> 
>> I strongly believe that BCP needs to include alternative algorithms
>> - with different design policy from algorithm which your I-D recommends
>> - which are widely implemented
>> - which are internationally standardized
>>
>> Because when protocols depend on single primitive and vulnerability
>> related to the primitive is found it takes a lot of time to migrate from
>> insecure primitive to secure one.
> 
> Based on long experience in the IETF, this seems like the opposite of a BCP. 
> Protocols that have had multiple mandatory-to-implement algorithms "in case 
> there was a crypto failure" have led to interoperability failures and 
> confusion for users. Clearly, TLS needs to have crypto agility in case of 
> crypto failures, but the current BCP does not prevent that. But "alternative 
> algorithms" has been shown to have negative effects.

I agree. The purpose of a BCP is to document the best possible current
behaviour, not create a wish-list.

When at some time in the future alternative algorithms have been shown
to be better and deployable, the BCP will be revised to reflect that.

        Cheers Leif

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to