Hi Viktor,

draft-ietf-uta-email-deep-05 defines "Implicit TLS" in Section 4:
'amechanism where TLS is negotiated immediately at connection start on a
separate port (referred to in this document as "Implicit TLS")'

This choice of language is sensible, since the use of TLS is implicit
in the (choice of) transport endpoint, rather than explicitly negotiated
via STARTTLS.

whereas published RFC 7525 uses the terminology "strict TLS".  It is the title 
of
Section 3.2, which mentions 'a choice between strict TLS configuration and 
dynamic
upgrade from unencrypted to TLS-protected traffic (such as STARTTLS)'.

While the language in 7525 is unfortunate, since 'strict TLS' is not
clearly defined in that document, and the name suggests that it is an
alternative to 'opportunistic TLS', rather than an alternative to
STARTTLS.  While STARTTLS is often used opportunistically, that is not
always the case.  While RFC 7672 calls this "mandatory TLS", I would
expect "strict" and "mandatory" to be synonymous.

I perfectly understand your arguments, and I agree with you.

Shouldn't an erratum be added to RFC 7525 so as to at least add a definition of "strict TLS"? It is indeed missing!


I've updated the wording in draft-elie-nntp-tls-recommendations so as to use "implicit TLS" like draft-ietf-uta-email-deep.

   In particular, this document updates [RFC4642] by specifying that
   NNTP implementations and deployments MUST follow the best current
   practices documented in the "Recommendations for Secure Use of TLS
   and DTLS" [RFC7525].  This includes stronger recommendations
   regarding SSL/TLS protocol versions, fallback to lower versions, TLS
   negotiation immediately upon connection on a separate port (referred
   to in this document as "implicit TLS"), TLS-level compression, TLS
   session resumption, cipher suites, public key lengths, forward
   secrecy, and other aspects of using TLS with NNTP.

[...]

   o  NNTP implementations and deployments SHOULD prefer implicit TLS
      and therefore use strict TLS configuration (Section 3.2 of
      [RFC7525]), that is to say they SHOULD use a port dedicated to
      NNTP over TLS, and begin the TLS negotiation immediately upon
      connection (contrary to a dynamic upgrade from unencrypted to TLS-
      protected traffic via the use of the STARTTLS command, as Section
      1 of [RFC4642] was encouraging).  For the same reasons, transposed
      to NNTP, as those given in Appendix A of [MUA-STS] (whose one of
      the authors was also one of the authors of [RFC4642]), implicit
      TLS is the preferred way of using TLS with NNTP.


It is the only paragraph where I still mention "strict TLS configuration" because I reference RFC 7525. In all other parts of the draft, only "implicit TLS" terminology is now used.
Thanks for your suggestion!

--
Julien ÉLIE

« J'ai le pied gauche qui est jaloux du pied droit. Quand j'avance le
  pied droit, le pied gauche, qui ne veut pas rester en arrière…
  passe devant… le pied droit en fait autant… et moi… comme un
  imbécile… je marche. » (Raymond Devos)

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to