Re: [Uta] Adoption call for draft-sheffer-uta-rfc7525bis-00

Keith Moore <moore@network-heretics.com> Fri, 01 May 2020 21:47 UTC

Return-Path: <moore@network-heretics.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FAEA3A13FE for <uta@ietfa.amsl.com>; Fri, 1 May 2020 14:47:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=messagingengine.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xah0JL6LRYhk for <uta@ietfa.amsl.com>; Fri, 1 May 2020 14:47:20 -0700 (PDT)
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com [66.111.4.29]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A66AC3A0AC9 for <uta@ietf.org>; Fri, 1 May 2020 14:47:20 -0700 (PDT)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 861BB5C0402; Fri, 1 May 2020 17:47:19 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute4.internal (MEProxy); Fri, 01 May 2020 17:47:19 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=pV51lf HS6A6tgE7C8zc0yX/skEvZ2CGiSlu0ahyYEiU=; b=M+sRLzWg6tEmddOuoUS/ue kbBw0PBBO5oaadq0FmTdr7JQiTid+trsn92I6hiAIKrwlxGrAb37SVILYJUO/sE7 kohVYWdnuM7Zx2UKTIWRZtJ+ffLChF727uRiFomeIr1b8L9gzWDJAuJLIiFsQw2A 31Dqf1dEdaRqUqEhCiFgNy8NNIpVdrP/oLwaadl/5Aop2XwLXDD/YfzEIUL2P8js j4vzNwutsMpDs2TETownFb50xOr2+LlsQPQ3ymH18K1PBex/e62d3iWt1n6J7KS+ JceGbStgHjwb5c1llCSgSOl1nLvN4N+/D4zhn0EdOUrCaCzdmzOzyz/bCAZPCJig ==
X-ME-Sender: <xms:55isXv-YJS23dS6so8PM2UH2VFpj977ifbRFH_4VYr8d791LecCV5A>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduhedrieekgddtudcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurhepuffvfhfhkffffgggjggtsegrtderre dtfeejnecuhfhrohhmpefmvghithhhucfoohhorhgvuceomhhoohhrvgesnhgvthifohhr khdqhhgvrhgvthhitghsrdgtohhmqeenucggtffrrghtthgvrhhnpeevfeetudeigedtle dvvddtudefjeejffdvfeetjeeiueelgfdtgfegtdffkeetudenucfkphepuddtkedrvddv uddrudektddrudehnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilh hfrhhomhepmhhoohhrvgesnhgvthifohhrkhdqhhgvrhgvthhitghsrdgtohhm
X-ME-Proxy: <xmx:55isXnpRkl7sxx-hiKTdVv6PT47k0vHc7lTxONf562_C22ijiF418w> <xmx:55isXo28tNjTOYbEICsONQ5nbjG4UYX3rUvcIiN9zVeD4UBDYyK0-Q> <xmx:55isXjZWo6CRSjrXGnfvf_J-pFUdHHB9m374aHtCdrR1ATNZc8QVjA> <xmx:55isXugGU1w0O0VzJtGVdeY9YRZWHCfd8WAl-z1U-1f_s25M0FUdvg>
Received: from [192.168.1.97] (108-221-180-15.lightspeed.knvltn.sbcglobal.net [108.221.180.15]) by mail.messagingengine.com (Postfix) with ESMTPA id D5BDE3280064; Fri, 1 May 2020 17:47:18 -0400 (EDT)
To: uta@ietf.org
References: <004801d61bae$08a61590$19f240b0$@smyslov.net> <dfe39508-b37a-f008-91d3-cb36bcb84ae1@network-heretics.com> <54812a57-4ae8-2f79-fdc0-854f481aa5e9@mozilla.com>
From: Keith Moore <moore@network-heretics.com>
Message-ID: <c63bb864-7488-da9c-d3fa-3132aab860f6@network-heretics.com>
Date: Fri, 01 May 2020 17:47:18 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0
MIME-Version: 1.0
In-Reply-To: <54812a57-4ae8-2f79-fdc0-854f481aa5e9@mozilla.com>
Content-Type: multipart/alternative; boundary="------------0F5D1D63AFE27A74614BDA1A"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/ylkt9c2JVF9qHa-TBgpO1-05jfc>
Subject: Re: [Uta] Adoption call for draft-sheffer-uta-rfc7525bis-00
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 May 2020 21:47:25 -0000

On 5/1/20 5:02 PM, Peter Saint-Andre wrote:

> On 4/30/20 8:59 PM, Keith Moore wrote:
>> IMO RFC7525
> That ship sailed in 2015.

IETF isn't bound by /stare decisis/.

> I don't think we ever said anything to the contrary. BCP does stand for
> *best* current practice, after all.

If BCP really means Best /Current/ Practice, and we have a better 
understanding (perhaps informed by experience with existing documents) 
of what best practice is today, than we did in 2015, we should be able 
to say so.

> There are many reasons why a piece
> of software or hardware can't do what's currently best, but that doesn't
> make it evil or in "violation".

I am interested in what text best informs protocol designers and 
implementors' decisions.   Particularly for a document with such broad 
scope, I suspect the words "evil" and "violation" have narrow applicability.

>> I therefore find it difficult to make good advice of the form "don't use
>> TLS version x.y" that is appropriate across all applications and all
>> usage scenarios.
> Does a BCP necessarily apply to all applications and all usage
> scenarios? That strikes me as an impossible goal. Am I missing something?
What is our goal anyway?  Is it to provide good advice to protocol 
designers and implementors, or is it to expect them to read between the 
lines and "just know" when to bend or break those rules? Serious question.
>> Again, there's an important difference between "don't
>> use TLS x.y" and "don't consider TLS x.y secure".
> That's a subtlety which might be lost on the intended audience for this
> document.

Stated that way, I don't think it is a very subtle distinction.

More generally, what I've realized after several discussions about use 
of TLS in specific protocols is that different protocols necessarily use 
TLS in subtly different ways, with different assumptions about threat 
models.   Different protocols also have different backward compatibility 
issues, different means of error recovery and reporting.   For email, 
for example, I found that message relaying and UA-MSP interactions 
required very different advice even though both relaying and message 
submission use very similar protocols.   I tried to write text that 
covered both and it just didn't work.

Granted it's easy to drown people with details, but it's also easy to 
provide advice that is so generic that it's poor advice for very many 
use cases.

>> I also think it's odd that there are recommendations like this that say
>> "don't support TLS x.y" but say nothing about not supporting cleartext
>> for protocols that still have a cleartext mode.
> The title of RFC 7525 is "Recommendations for Secure Use of TLS and
> DTLS" - not "Recommendations for Secure Use of Internet Protocols". This
> document assumes that you're using TLS/DTLS and provides guidelines for
> how to do so most (or more) securely while striking an appropriate
> balance between aspiration and reality.

Yes, but when the document says "don't use TLS x.y"  and that is applied 
to a protocol for which the likely fallback is cleartext, maybe it's not 
describing best current practice.

>>    Even SSL 1.0 is
>> probably better than cleartext (at least from a security perspective, if
>> not from a support burden perspective) as long as it's not trusted to be
>> secure.
> Yes, "as long as". There's the rub.
Yes.   what's the best way to capture that so that implementors are well 
advised?
>> So in summary, either I don't support adoption of this draft, or I
>> support adoption of this draft only to the extent that it can be
>> significantly changed.
> Are you suggesting that it's better to stick with RFC 7525 and not
> update it?
No, I think that some change is needed.   The question in my mind is 
whether to start with this draft or with a clean slate.   I haven't 
formed an opinion about that yet.

Keith