Re: Requesting comments on draft-cheney-safe-02.txt

Hector Santos <hsantos@santronics.com> Fri, 07 August 2009 22:10 UTC

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n77MAb4w001904 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 7 Aug 2009 15:10:37 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n77MAbhn001903; Fri, 7 Aug 2009 15:10:37 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-smtp@mail.imc.org using -f
Received: from winserver.com (news.winserver.com [208.247.131.9]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n77MAVbr001890 for <ietf-smtp@imc.org>; Fri, 7 Aug 2009 15:10:36 -0700 (MST) (envelope-from hsantos@santronics.com)
Received: by winserver.com (Wildcat! SMTP Router v6.3.452.7) for ietf-smtp@imc.org; Fri, 07 Aug 2009 18:10:48 -0400
Received: from hdev1 ([99.3.147.93]) by winserver.com (Wildcat! SMTP v6.3.452.9) with ESMTP id 2931404375; Fri, 07 Aug 2009 18:10:47 -0400
Message-ID: <4A7CA653.5020001@santronics.com>
Date: Fri, 07 Aug 2009 18:10:27 -0400
From: Hector Santos <hsantos@santronics.com>
Organization: Santronics Software, Inc.
User-Agent: Thunderbird 2.0.0.0 (Windows/20070326)
MIME-Version: 1.0
To: Rich Kulawiec <rsk@gsp.org>
CC: ietf-smtp@imc.org
Subject: Re: Requesting comments on draft-cheney-safe-02.txt
References: <f6fecbd18af7.4a721c99@us.army.mil> <4A720D35.1000306@cybernothing.org> <f6e091e580a6.4a7258af@us.army.mil> <20090807100147.GA16131@gsp.org>
In-Reply-To: <20090807100147.GA16131@gsp.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-smtp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smtp/mail-archive/>
List-ID: <ietf-smtp.imc.org>
List-Unsubscribe: <mailto:ietf-smtp-request@imc.org?body=unsubscribe>

+1

Rich Kulawiec wrote:

> On Fri, Jul 31, 2009 at 02:36:31AM +0400, Cheney, Edward A SSG RES USAR USARC wrote:
>> The idea is that security vulnerabilities on the internet occur
>> most significantly as a result of client-side scripting from documents
>> transmitted across HTTP.
> 
> Even we grant for the purpose of argument that these are the "most
> significant", and I see no evidence that they are, these are not
> Internet security vulnerabilities.
> 
> These are (a) web browser and (b) operating system vulnerabilities,
> and are quite readily mitigated by making sensible choices about both.
> Further mitigation is possible by using in-band filtering/blocking
> (such as HTTP proxies which filter or block traffic) or by using
> browser extensions (e.g., NoScript).  These are much simpler and directed
> solutions that are available immediately, without any need for protocol
> engineering.
> 
> If, on the other hand, poor choices of web browser and/or operating system
> (or mail client, for that matter) are made, then it really doesn't matter
> whether traffic moves via HTTP or SMTP or anything else: those systems
> WILL be compromised.
> 
> ---Rsk
> 
> 
> 



-- 
Sincerely

Hector Santos
http://www.santronics.com