Hi Ben, thanks for the review.

On 4/21/15 3:53 PM, Ben Campbell wrote:
Ben Campbell has entered the following ballot position for
draft-ietf-uta-xmpp-06: Yes

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
http://datatracker.ietf.org/doc/draft-ietf-uta-xmpp/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

3.4, paragraph 3:

Would you offer different guidance about the multi-tenant problem if POSH
and DNA were finished? I don't suggest delaying for that, even though
they are both post-WGLC. But I wonder if there is something here we need
to clean up after POSH and DNA are published?

I think it's not a question of "published" but of "widely implemented and deployed". Thus, unfortunately, I would not foresee being able to absolutely mandate server-to-server authentication for at least a few years. However, that is certainly the goal. Do you think that additional text would be helpful here?

Paragraph 4:

By "unauthenticated connections", I assume it means "unauthenticated TLS
[or encrypted] connections". Is this correct?


Good point: I think it would be best to make the following change.

OLD
   Given the pervasiveness of eavesdropping [RFC7258], even an
   unauthenticated connection might be better than an unencrypted
   connection in these scenarios (this is similar to the "better than
   nothing security" approach for IPsec [RFC5386]).  Unauthenticated
   connections include connections negotiated using anonymous Diffie-
   Hellman mechanisms or using self-signed certificates, among others.
   In particular for XMPP server-to-server interactions, it can be
   reasonable for XMPP server implementations to accept unauthenticated
   but encrypted connections when Server Dialback keys [XEP-0220] are
   used; such keys on their own provide only weak identity verification
   (made stronger through the use of DNSSEC [RFC4033]), but this at
   least enables encryption of server-to-server connections.  The DNA
   prooftypes described above are intended to mitigate the residual need
   for unauthenticated connections in these scenarios.

NEW
   Given the pervasiveness of eavesdropping [RFC7258], even an
   encrypted but unauthenticated connection might be better than an
   unencrypted connection in these scenarios (this is similar to the
   "better than nothing security" approach for IPsec [RFC5386]).
   Encrypted but unauthenticated connections include connections
   negotiated using anonymous Diffie-Hellman mechanisms or using
   self-signed certificates, among others.  In particular for XMPP
   server-to-server interactions, it can be reasonable for XMPP server
   implementations to accept encrypted but unauthenticated connections
   when Server Dialback keys [XEP-0220] are used; such keys on their
   own provide only weak identity verification (made stronger through
   the use of DNSSEC [RFC4033]), but this at least enables encryption
   of server-to-server connections.  The DNA prooftypes described above
   are intended to mitigate the residual need for encrypted but
   unauthenticated connections in these scenarios.

Rationale: the contrast is between (a) connections that are encrypted but not authenticated and (b) connections that are both encrypted and authenticated.

Peter

--
Peter Saint-Andre
https://andyet.com/

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to