Re: [saag] new terminology ID posted
Stephen Kent <kent@bbn.com> Mon, 07 April 2014 14:14 UTC
Return-Path: <kent@bbn.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F367A1A0791 for <saag@ietfa.amsl.com>; Mon, 7 Apr 2014 07:14:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id piQtjr5S-gfi for <saag@ietfa.amsl.com>; Mon, 7 Apr 2014 07:14:40 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 019801A0452 for <saag@ietf.org>; Mon, 7 Apr 2014 07:14:39 -0700 (PDT)
Received: from dommiel.bbn.com ([192.1.122.15]:40880 helo=comsec.home) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1WXAJu-000GoT-0s; Mon, 07 Apr 2014 10:14:42 -0400
Message-ID: <5342B2C8.7060304@bbn.com>
Date: Mon, 07 Apr 2014 10:14:32 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: Nico Williams <nico@cryptonector.com>
References: <533AE246.9080806@bbn.com> <20140401163654.GD12559@mournblade.imrryr.org> <533B0993.80001@bbn.com> <20140405212023.GF2727@localhost>
In-Reply-To: <20140405212023.GF2727@localhost>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/saag/jx9cfp0JLhQXS-f6cqjv5StsURo
Cc: saag@ietf.org
Subject: Re: [saag] new terminology ID posted
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Apr 2014 14:14:45 -0000
Nico, > On Tue, Apr 01, 2014 at 02:46:43PM -0400, Stephen Kent wrote: >> Thus it may not result in as much encryption as a mechanism which does not >> impose that prerequisite. Folks will have to decide if we want to create a >> different term for DANE-enabled TLS (and IPsec) sessions, or broaden the >> definition of opportunistic security to encompass them. I'm happy to >> generate text to accommodate whatever folks decide. > Er, are you asking for a consensus call on this point? I'm definitely > for DANE-enabled TLS. Who wouldn't be? Can we hear some arguments > against? I'm curious about this. I was not asking for a consensus call, yet. And, even if I were, the issue is not whether DANE-enabled TLS is good or bad (I think it';s very good) but whether it will be included in a definition of OS. > Or, if we don't hear any such arguments, then I think we must have > consensus on this point. DANE-enabled TLS does not meet some of the posited requirements for OS, e.g., PFS, and encrypt first and authenticate later. Gee, that sounds a lot like "shoot first and ask questions later" now that I think about it :-). > Until then, what's the harm in including "DANE-enabled TLS" in your I-D? > How might we get feedback on that if you don't? Include it as what? I have included notes on what I viewed as "legacy" IETF security protocols. DANE-enabled TLS is rather new to be viewed as one of those. I don't want to discuss all of the proposals that are now on progress, lest we never complete this doc. In that sense DANE-enabled TLS tends to fall in the middle. If folks feel it's important to mention, then I will do so, but not as an example of OS. > As to IPsec, I really think there are two "correct" approaches to making > end-to-end IPsec work: > > - Apps (or the OS libraries/kernel) lookup IPsec-equivalents of TLSA > RRsets for the desired host/service name (not IP addresses!), then > arrange for local IPsec policy to require the remote's ID/credentials > for the address found in the DNS to match those found in the IPsec > DANE. > > and/or > > - Use IPsec connection latching and channel binding to IPsec channels > at the app layer. > > Note that the first effectively refers to connection latching. The > latter is only relevant when there's an app-layer authentication > mechanism with various properties, making the first approach the only > general one. I think this level of detail is beyond what needs to be discussed in this doc but, as above, let's see what other folks feel. Steve
- [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Stephen Farrell
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Salz, Rich
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Tero Kivinen
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Nico Williams
- Re: [saag] new terminology ID posted Nico Williams
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Paul Hoffman
- Re: [saag] new terminology ID posted Nico Williams
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Eliot Lear
- Re: [saag] new terminology ID posted Paul Hoffman
- Re: [saag] new terminology ID posted Nico Williams
- Re: [saag] new terminology ID posted Stephen Farrell
- [saag] area WGs (was: Re: new terminology ID post… Stephen Farrell
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Paul Hoffman
- Re: [saag] new terminology ID posted Olle E. Johansson
- Re: [saag] new terminology ID posted Nico Williams
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Stephen Kent
- Re: [saag] new terminology ID posted Viktor Dukhovni
- Re: [saag] new terminology ID posted Stephen Kent