On Sat, 18 Oct 2025 at 17:32, Daniel Gultsch <daniel(a)gultsch.de> wrote:
I want to bump this email from an earlier LC of 0440
On Wed, May 8, 2024 at 5:16 PM Marvin W <xmpp(a)larma.de> wrote:
I didn't want to suggest specific wording,
but the more I think about
it, the more I am against of any RFC style wording in the Security
Considerations section of 0440. If it's part of the protocol described
in 0440 and RFC style wording makes sense, it should be outside the
Security Considerations (it maybe repeated there for emphasis). If it's
not part of the protocol of 0440, then it shouldn't be using RFC style
wording in first place. Many Security Considerations (especially those
related to the security of channel binding types) apply no matter if
0440 is implemented, so why would be put anything normative about their
security in 0440?
The whole "Which channel-binding types should be supported?" IMO
belongs somewhere else, not in 0440. Security Considerations can
provide some guidance here (and also some rationale as to why it might
be reasonable to implement tls-server-end-point even if tls-exporter is
more secure), but those shouldn't be normative in any capacity.
Yes. Basically this. ^
FWIW, I've argued for decades that MTI levels and protocols ought not to be
combined in a single specification.
But anyway.
Yes, the MTI advice in this document is indeed a bit weird.
tls-server-endpoint is MUST, but with little background information, but it
then goes on to say that tls-exporter is preferable.
I did a little bit of digging and it seems that the making endpoint a
MUST got introduced by Thilo presumably because iOS doesn’t do unique.
However that was 5 years ago and while that is still true we live in a
TLS 1.3 world now and export seems to be fairly widely supported.
Again I’m not saying that the XEP should explicitly recommend against
endpoint but also not require it (neither as MUST nor as SHOULD (it
was should prior to Thilo‘s change))
Stock Java still doesn't support tls-exporter. You can use Bouncy Castle,
though (and even unto FIPS), and get access - if local policy allows, which
it might not. Otherwise you're stuck with tls-server-endpoint - which is
still better than nothing of course.
The web browser doesn't support anything useful at all, you're entirely out
for channel binding - and therefore may wish to support "non channel
binding" versions.
Any server operating behind a load balancer that terminates TLS cannot do
anything but tls-server-endpoint, of course.
At minimum, I think a document, somewhere, should provide advice on what
security stuff to implement and why in 2025, and include the MTIs for such
things, and be kept current. That could I suppose be the compliance docs,
though those have typically concentrated on features rather than security
MTIs.
At the moment that seems to be this document for channel bindings, which is
not ideal, I agree.
(If nobody else fancies writing a separate document, I'd be up for making a
start on one?)
So yeah, basically what Marvin said 1.5 years ago.
cheers
Daniel
_______________________________________________
Standards mailing list -- standards(a)xmpp.org
To unsubscribe send an email to standards-leave(a)xmpp.org