On Wed, Jul 30, 2014 at 11:54:21AM -0400, Stephen Kent wrote: > > 3. The draft variously permits or prohibits use of cleartext within > > the context of the defined term. This needs to be resolved, and carefully. > > I would say: > > "OS strives to greatly broaden the use of encryption in IETF protocols, > to combat PM. To facilitate incremental deployment, OS operates in > a fashion that may result in a plaintext connection/session." This is I think addressed by the "Encrypt by default" principle, but perhaps the below change helps to get the point across: diff --git a/draft-dukhovni-opportunistic-security b/draft-dukhovni-opportunistic-security index a708120..f957e25 100644 --- a/draft-dukhovni-opportunistic-security +++ b/draft-dukhovni-opportunistic-security @@ -128,7 +128,10 @@ <t hangText="Encrypt by default:"> An opportunistic security protocol MUST interoperably achieve at least unauthenticated encryption between peer systems that don't explicitly disable this - capability. Over time, as peer software is updated to support + capability. To facilitate incremental deployment, opportunistic + security protocols may tolerate cleartext connections or sessions + with peers that don't support + encryption. Over time, as peer software is updated to support opportunistic security, only legacy systems or a minority of systems where encryption is disabled should be communicating in cleartext. Whenever possible, opportunistic security should employ I am careful to avoid suggesting that there is a single protocol called "opportunistic security", umbrella (marketing) term and all that... So I used the phrase "opportunistic security protocols", which is already used elsewhere in the document. -- Viktor.