Re: Further IESG feedback on draft-crispin-imapv-17.txt

"Jeffrey I. Schiller" <jis@mit.edu> Fri, 20 September 2002 17:22 UTC

Received: from localhost (localhost [[UNIX: localhost]]) by above.proper.com (8.11.6/8.11.3) id g8KHMin25344 for ietf-imapext-bks; Fri, 20 Sep 2002 10:22:44 -0700 (PDT)
Received: from jis.mit.edu (JIS.MIT.EDU [18.7.21.84]) by above.proper.com (8.11.6/8.11.3) with ESMTP id g8KHMgk25337 for <ietf-imapext@imc.org>; Fri, 20 Sep 2002 10:22:42 -0700 (PDT)
Received: from jis.tzo.com (localhost [127.0.0.1]) by jis.mit.edu (8.9.2/8.9.3) with ESMTP id NAA22305; Fri, 20 Sep 2002 13:22:39 -0400 (EDT)
Received: from mit.edu (jis.tzo.com [127.0.0.1]) by jis.tzo.com (8.12.3/8.12.3) with ESMTP id g8KHMPlt002642; Fri, 20 Sep 2002 13:22:25 -0400
Message-ID: <3D8B5951.2090104@mit.edu>
Date: Fri, 20 Sep 2002 13:22:25 -0400
From: "Jeffrey I. Schiller" <jis@mit.edu>
Organization: Massachusetts Institute of Technology
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.0.0) Gecko/20020607
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Larry Osterman <larryo@exchange.MICROSOFT.com>
CC: ned.freed@mrochek.com, IMAP Mailing Liste <imap@u.washington.edu>, IMAP Extensions WG <ietf-imapext@imc.org>, paf@cisco.com
Subject: Re: Further IESG feedback on draft-crispin-imapv-17.txt
References: <72C5FDA4D9CC3045B80EA1B76DB86A99ED2CB0@DF-BOWWOW.platinum.corp.microsoft.com>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-imapext@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-imapext/mail-archive/>
List-ID: <ietf-imapext.imc.org>
List-Unsubscribe: <mailto:ietf-imapext-request@imc.org?body=unsubscribe>

So what is the lesser of two evils.

1)It is possible, and in fact done universally, the implement an IETF
   Standard that sends passwords in the clear, even though we say that we
   want secure protocols in the IETF and it has been at least three years
   since we declared that the IETF would not standardize things with
   plain text passwords...

2)We render all existing implementations non-conformant.

An alternative that we discussed on the call which I don't believe Ned 
described was to reword the paragraph so that it was a MUST NOT unless 
the implementation or its user knew that the underlying transport was 
providing security (aka running IMAP over an SSH tunnel).

			-Jeff


Larry Osterman wrote:
> If you make this change, you instantly render the vast majority of the
> installed base of IMAP servers non compliant (read: ALL).
> 
> And I think that would be a bad thing.
> 
> The reason for the SHOULD NOT was that it allowed existing
> implementations enough weasel room to say they were compliant as long as
> they allowed a configuration option to disallow plaintext
> authentication, but the implementation could leave the plaintext
> mechanism in the server (either enabled or disabled by default, at the
> vendors desire).
> 
> If you make it a MUST NOT, then this implies that the plaintext
> mechanism must be REMOVED except under the cover of an alternative
> encryption mechanism.  And that breaks interoperability with the
> majority of servers and clients that exist in the wild, which is a less
> than optimal solution.
> 
> 
> 
> Larry Osterman 
> 
> 
> 
> -----Original Message-----
> From: ned.freed@mrochek.com [mailto:ned.freed@mrochek.com] 
> Sent: Thursday, September 19, 2002 10:34 AM
> To: IMAP Mailing Liste; IMAP Extensions WG
> Cc: ned.freed@mrochek.com; paf@cisco.com; jis@mit.edu
> Subject: Further IESG feedback on draft-crispin-imapv-17.txt
> 
> 
> 
> The IESG had this on the agenda today. The various document nits seem to
> have been satisfactorily addressed. The IESG is also happy with the
> general way the big item in the previous feedback -- mandatory to
> implement security -- has been dealt with.
> 
> One concern remains, however. The following note appears in 6.2.1:
> 
> Note: a server implementation SHOULD NOT permit any
>       plaintext password mechanisms unless the STARTTLS
>       command described in [IMAP-TLS] has been negotiated.
>       Client and server implementations SHOULD implement
>       additional SASL mechanisms which do not use plaintext
>       passwords, such the GSSAPI mechanism described in [SASL]
>       and/or the [DIGEST-MD5] mechanism.
> 
> The IESG would like to push back even harder on the use of plain text
> passwords, and would like to see this changed to read:
> 
> Note: a server implementation MUST NOT permit any
>       plaintext password mechanisms unless the STARTTLS
>       command described in [IMAP-TLS] has been negotiated or some 
>       other mechanism that protects the session from password
>       snooping has been provided. Client and server implementations
>       SHOULD implement additional SASL mechanisms which do not use
>       plaintext passwords, such the GSSAPI mechanism described in
>       [SASL] and/or the [DIGEST-MD5] mechanism.
> 
> The reason the IESG would like to see this change made  should be
> obvious, but in case it is not: The IESG wants to mandate the use of
> mechanisms that insure password snooping isn't possible but recognizes
> that there are many ways to do this besides TLS: SSH, VPNs, physical
> network security, etc.
> 
> How do people feel about making this change?
> 
> 				Ned
>