Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt
Kurt Zeilenga <Kurt.Zeilenga@isode.com> Fri, 01 August 2008 10:01 UTC
Return-Path: <owner-ietf-sasl@mail.imc.org>
X-Original-To: ietfarch-sasl-archive-Zoh8yoh9@core3.amsl.com
Delivered-To: ietfarch-sasl-archive-Zoh8yoh9@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0B6693A67AD for <ietfarch-sasl-archive-Zoh8yoh9@core3.amsl.com>; Fri, 1 Aug 2008 03:01:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.939
X-Spam-Level:
X-Spam-Status: No, score=-1.939 tagged_above=-999 required=5 tests=[AWL=0.107, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ec5OruHnqAyj for <ietfarch-sasl-archive-Zoh8yoh9@core3.amsl.com>; Fri, 1 Aug 2008 03:01:50 -0700 (PDT)
Received: from balder-227.proper.com (Balder-227.Proper.COM [192.245.12.227]) by core3.amsl.com (Postfix) with ESMTP id BF4A33A6847 for <sasl-archive-Zoh8yoh9@ietf.org>; Fri, 1 Aug 2008 03:01:50 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id m719tCEw074997 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 1 Aug 2008 02:55:13 -0700 (MST) (envelope-from owner-ietf-sasl@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id m719tCiE074996; Fri, 1 Aug 2008 02:55:12 -0700 (MST) (envelope-from owner-ietf-sasl@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-sasl@mail.imc.org using -f
Received: from boole.openldap.org (boole.openldap.org [204.152.186.50]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id m719tB7I074989 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-sasl@imc.org>; Fri, 1 Aug 2008 02:55:12 -0700 (MST) (envelope-from Kurt.Zeilenga@Isode.com)
Received: from nomad.meeting.ietf.org ([130.129.21.36]) (authenticated bits=0) by boole.openldap.org (8.13.8/8.13.8) with ESMTP id m719t82l050366 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Fri, 1 Aug 2008 09:55:10 GMT (envelope-from Kurt.Zeilenga@Isode.com)
Cc: ietf-sasl@imc.org
Message-Id: <5DC27857-D46B-4446-A838-FCBE43A6AE6D@Isode.com>
From: Kurt Zeilenga <Kurt.Zeilenga@isode.com>
To: Lyndon Nerenberg <lyndon@orthanc.ca>
In-Reply-To: <E4DA63C6-5132-4B0B-894C-2B2F24EBC290@orthanc.ca>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v928.1)
Subject: Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt
Date: Fri, 01 Aug 2008 10:55:06 +0100
References: <20080714184503.5761D28C158@core3.amsl.com><834E1C1F0C308FD6EF2E133A@446E7922C82D299DB29D899F> <ldv8wvmuzjz.fsf@cathode-dark-space.mit.edu> <g6k7cq$3iv$1@ger.gmane.org> <E4DA63C6-5132-4B0B-894C-2B2F24EBC290@orthanc.ca>
X-Mailer: Apple Mail (2.928.1)
Sender: owner-ietf-sasl@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-sasl/mail-archive/>
List-ID: <ietf-sasl.imc.org>
List-Unsubscribe: <mailto:ietf-sasl-request@imc.org?body=unsubscribe>
I see the WG as having needs to choose between three possible approaches: 1) revise the CRAM-MD5 specification, resolving known technical issues, such that it is suitable for progression (eventually all the way to Internet Standard) on the Standards Track, 2) seek a waiver from the IESG of certain requirements placed upon SASL mechanism specifications (such as RFC 4422 requirement that mechanism specifications detail how character data inputs to cryptographic functions be precisely specified to ensure interoperability), or 3) documenting existing CRAM-MD5 practice in an Informational document, noting the known technical issues. Consensus has been, and continued to be, that fixing known technical issues would be too disruptive to existing deployments (which as you note are quite significant). With this consensus, the third path seems quite appropriate as seems to make no sense to progress a document on the standard track that you wouldn't put on the standards track if considered anew. It seems to me that what you and others seek is an IESG waiver from various requirements placed this technical specification. It is unclear to me whether the IESG which, if any, requirements the IESG might be willing to waive in this case. To to able to even consider granting a waiver, they would from us a statement of the specific requirements we wish to have waived and why we believe the waiver is justified. I suspect this approach would face a number of challenges and is likely to fail. In particular, given the WG consensus not to disruptive to deployments of CRAM-MD5, the intent seems to be never to revise the specification to met the requirements. As such, the specification would ever be suitable for Draft (or better) status. It seems inappropriate to keep such a specification on the standards track. Another challenge is that the RFC 2026 specifically warns deployments of Proposed Standard specifications of the likelihood that subsequent revision will be disruptive to deployers and hence a request for waivers based upon such disruption is weak at best. Anyways, I ask that those who advocate that certain requirements be waived prepare text detail why they should be waived. I do think it reasonable for those believing the specification fails to met requirements placed upon it, enumerate those requirements. With that in mind, one requirement I see (off hand) failing to met is RFC 4422 mandatory requirement that SASL mechanisms specifications precisely specify how character data is to be prepared for input to cryptographic to ensure interoperability between implementations of the specification. I do believe there are other requirements. I encourage others to detail them on the list. I note that little work is needed to accomplish 3 (make the changes recently discussed on the list). 2 requires a some amount of work: namely documenting the requirements to be waived and why. 1 has no support for actually making the changes required under this approach. -- Kurt
- I-D ACTION:draft-ietf-sasl-crammd5-10.txt Internet-Drafts
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Chris Newman
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Tom Yu
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Frank Ellermann
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Chris Newman
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Lyndon Nerenberg
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Kurt Zeilenga
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Frank Ellermann
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Jeffrey Hutzelman
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Frank Ellermann
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Chris Newman
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Kurt Zeilenga
- Re: I-D ACTION:draft-ietf-sasl-crammd5-10.txt Kurt Zeilenga
- Appendix B in crammd5-10, IANA #178703 (was: I-D … Frank Ellermann
- Re: Appendix B in crammd5-10, IANA #178703 (was: … Kurt Zeilenga