RE: Further IESG feedback on draft-crispin-imapv-17.txt

"Larry Osterman" <larryo@exchange.MICROSOFT.com> Thu, 19 September 2002 18:13 UTC

Received: from localhost (localhost [[UNIX: localhost]]) by above.proper.com (8.11.6/8.11.3) id g8JIDXO17523 for ietf-imapext-bks; Thu, 19 Sep 2002 11:13:33 -0700 (PDT)
Received: from df-inet1.exchange.microsoft.com (df-inet1.exchange.microsoft.com [131.107.8.8]) by above.proper.com (8.11.6/8.11.3) with ESMTP id g8JIDVk17517 for <ietf-imapext@imc.org>; Thu, 19 Sep 2002 11:13:31 -0700 (PDT)
Received: from DF-VRS-01.redmond.corp.microsoft.com ([157.54.4.14]) by df-inet1.exchange.microsoft.com with Microsoft SMTPSVC(5.0.2195.5255); Thu, 19 Sep 2002 11:14:00 -0700
Received: from 10.197.0.60 by DF-VRS-01.redmond.corp.microsoft.com (InterScan E-Mail VirusWall NT); Thu, 19 Sep 2002 11:13:10 -0700
Received: from DF-MAX.platinum.corp.microsoft.com ([10.197.1.8]) by DF-YURI.platinum.corp.microsoft.com with Microsoft SMTPSVC(6.0.3663.0); Thu, 19 Sep 2002 11:13:21 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.0.6249.0
Content-Class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: RE: Further IESG feedback on draft-crispin-imapv-17.txt
Date: Thu, 19 Sep 2002 11:12:45 -0700
Message-ID: <72C5FDA4D9CC3045B80EA1B76DB86A99ED2CB0@DF-BOWWOW.platinum.corp.microsoft.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Further IESG feedback on draft-crispin-imapv-17.txt
thread-index: AcJgBXbPNz0uvR+6RbCSzHkobHp0ywAATD6Q
From: Larry Osterman <larryo@exchange.MICROSOFT.com>
To: ned.freed@mrochek.com, IMAP Mailing Liste <imap@u.washington.edu>, IMAP Extensions WG <ietf-imapext@imc.org>
Cc: paf@cisco.com, jis@mit.edu
X-OriginalArrivalTime: 19 Sep 2002 18:13:21.0906 (UTC) FILETIME=[3CFDB520:01C26008]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id g8JIDVk17519
Sender: owner-ietf-imapext@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-imapext/mail-archive/>
List-ID: <ietf-imapext.imc.org>
List-Unsubscribe: <mailto:ietf-imapext-request@imc.org?body=unsubscribe>

If you make this change, you instantly render the vast majority of the
installed base of IMAP servers non compliant (read: ALL).

And I think that would be a bad thing.

The reason for the SHOULD NOT was that it allowed existing
implementations enough weasel room to say they were compliant as long as
they allowed a configuration option to disallow plaintext
authentication, but the implementation could leave the plaintext
mechanism in the server (either enabled or disabled by default, at the
vendors desire).

If you make it a MUST NOT, then this implies that the plaintext
mechanism must be REMOVED except under the cover of an alternative
encryption mechanism.  And that breaks interoperability with the
majority of servers and clients that exist in the wild, which is a less
than optimal solution.



Larry Osterman 



-----Original Message-----
From: ned.freed@mrochek.com [mailto:ned.freed@mrochek.com] 
Sent: Thursday, September 19, 2002 10:34 AM
To: IMAP Mailing Liste; IMAP Extensions WG
Cc: ned.freed@mrochek.com; paf@cisco.com; jis@mit.edu
Subject: Further IESG feedback on draft-crispin-imapv-17.txt



The IESG had this on the agenda today. The various document nits seem to
have been satisfactorily addressed. The IESG is also happy with the
general way the big item in the previous feedback -- mandatory to
implement security -- has been dealt with.

One concern remains, however. The following note appears in 6.2.1:

Note: a server implementation SHOULD NOT permit any
      plaintext password mechanisms unless the STARTTLS
      command described in [IMAP-TLS] has been negotiated.
      Client and server implementations SHOULD implement
      additional SASL mechanisms which do not use plaintext
      passwords, such the GSSAPI mechanism described in [SASL]
      and/or the [DIGEST-MD5] mechanism.

The IESG would like to push back even harder on the use of plain text
passwords, and would like to see this changed to read:

Note: a server implementation MUST NOT permit any
      plaintext password mechanisms unless the STARTTLS
      command described in [IMAP-TLS] has been negotiated or some 
      other mechanism that protects the session from password
      snooping has been provided. Client and server implementations
      SHOULD implement additional SASL mechanisms which do not use
      plaintext passwords, such the GSSAPI mechanism described in
      [SASL] and/or the [DIGEST-MD5] mechanism.

The reason the IESG would like to see this change made  should be
obvious, but in case it is not: The IESG wants to mandate the use of
mechanisms that insure password snooping isn't possible but recognizes
that there are many ways to do this besides TLS: SSH, VPNs, physical
network security, etc.

How do people feel about making this change?

				Ned