Re: [Uta] Proposed definition of opportunistic encryption using TLS: draft-hoffman-uta-opportunistic-tls-00.txt

Paul Hoffman <paul.hoffman@vpnc.org> Mon, 03 February 2014 21:38 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A1F01A0210 for <uta@ietfa.amsl.com>; Mon, 3 Feb 2014 13:38:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.347
X-Spam-Level:
X-Spam-Status: No, score=-1.347 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_COM=0.553] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q3IsnD3mWe_Z for <uta@ietfa.amsl.com>; Mon, 3 Feb 2014 13:38:43 -0800 (PST)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 7EB4A1A01EE for <uta@ietf.org>; Mon, 3 Feb 2014 13:38:43 -0800 (PST)
Received: from [10.20.30.90] (50-1-98-67.dsl.dynamic.sonic.net [50.1.98.67]) (authenticated bits=0) by hoffman.proper.com (8.14.7/8.14.7) with ESMTP id s13LIeOR008177 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 3 Feb 2014 14:18:41 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
X-Authentication-Warning: hoffman.proper.com: Host 50-1-98-67.dsl.dynamic.sonic.net [50.1.98.67] claimed to be [10.20.30.90]
Content-Type: multipart/signed; boundary="Apple-Mail=_16924162-7B01-4543-A899-348FA6C71E90"; protocol="application/pgp-signature"; micalg="pgp-sha1"
Mime-Version: 1.0 (Mac OS X Mail 7.1 \(1827\))
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <52EFD713.3080303@fifthhorseman.net>
Date: Mon, 03 Feb 2014 13:38:31 -0800
Message-Id: <8413D3EE-B527-4F9E-90DE-2B952656D0D3@vpnc.org>
References: <20140203045910.9714.53880.idtracker@ietfa.amsl.com> <B8691415-07F3-4081-8247-E103A60E5CF0@vpnc.org> <52EFD713.3080303@fifthhorseman.net>
To: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
X-Mailer: Apple Mail (2.1827)
Cc: uta@ietf.org
Subject: Re: [Uta] Proposed definition of opportunistic encryption using TLS: draft-hoffman-uta-opportunistic-tls-00.txt
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Feb 2014 21:38:44 -0000

On Feb 3, 2014, at 9:51 AM, Daniel Kahn Gillmor <dkg@fifthhorseman.net> wrote:

> I understand that the purpose of the draft is not to document technical
> mechanisms for doing this opportunistic encryption, but i can't help
> trying to think through how it would work for HTTPS (i note that SMTP
> already has a mechanism, more people just need to turn it on).

The HTTP people should define "how it would work for HTTPS" (from the charter, HTTP 1.1 only), and the SMTP people should define "how it would work for SMTP".

The purpose of this document is to give them a single model of "opportunistic encryption using TLS" to work from for their definition.

> It occurs to me that one possibility is that user agents . . .

There are many possibilities, and at least one should be defined in this WG for each of the protocols listed in our charter (and maybe more). However, this document should not attempt to cover them all or it will literally never be finished.

--Paul Hoffman