Proposed wording updates to address some of Steve Kent's comments (plus one or two minor other fixes). Note, this is not a major rewrite or restructuring. Just nit fixes. diff --git a/draft-dukhovni-opportunistic-security b/draft-dukhovni-opportunistic-security index ff29c55..c3ff1a3 100644 --- a/draft-dukhovni-opportunistic-security +++ b/draft-dukhovni-opportunistic-security @@ -55,7 +55,7 @@ comprehensive protection against both passive and active attacks - for peers capable and motivated to absorb the associated costs. + for peers able and motivated to absorb the associated costs. Since protection against active attacks relies on authentication, which at Internet scale is not universally available, while - communications traffic was sometimes strongly protected, more - typically it was not protected at all. The fact that most + communications traffic is sometimes strongly protected, more + typically it is not protected at all. The fact that most traffic is unprotected facilitates nation-state pervasive @@ -67,4 +67,4 @@ accessible to most if not all peers, and protection against - active attacks still available where required by policy or - opportunistically negotiated. + active attacks still employed where unconditionally required + by policy or else discovered to be possible with a given peer. </t> @@ -74,10 +74,10 @@ management at Internet scale remains an incompletely solved - problem. The PKIX (<xref target="RFC5280"/>) key management + problem. The Web PKI key management model, which is based on broadly trusted public certification authorities (CAs), introduces costs that not all peers are - willing to bear. PKIX is not sufficient to secure communications + willing to bear. Web PKI public CAs are not sufficient to secure communications when the peer reference identity (<xref target="RFC6125"/>) is obtained indirectly over an insecure channel or communicating - parties don't agree on a mutually trusted CA. DNSSEC (<xref - target="RFC4033"/>) is not at this time sufficiently widely + parties don't agree on a mutually trusted CA. At this time, + DNSSEC (<xref target="RFC4033"/>) is not sufficiently widely adopted to make DANE (<xref target="RFC6698"/>) a viable @@ -93,3 +93,3 @@ When protocols only offer the options of authenticated secure - channels or else cleartext, most traffic is sent in the clear. + channels or cleartext, most traffic is sent in the clear. Therefore, in order to make encryption more ubiquitous, @@ -97,5 +97,6 @@ communication is not possible, unauthenticated encryption is - still substantially stronger than cleartext. Opportunistic + preferable to cleartext transmission, in that it addresses + pervasive monitoring <xref target="RFC7258">. Opportunistic security encourages peers to employ as much security as possible, - without falling back to unnecessarily weak options. In + without falling back on unnecessarily weak options. In particular, opportunistic security encourages unauthenticated @@ -159,4 +160,5 @@ goal of designs that feature opportunistic security is to be - able to communicate with any reasonably configured peer. If - many peers are only capable of cleartext, then it is acceptable + able to communicate with any correctly configured peer. If a + non-negligible number of potential peers are only capable of + cleartext, then it is acceptable to fall back to cleartext when encryption is not possible. If @@ -164,10 +166,12 @@ acceptable to authenticate only those peers and not the rest. - Interoperability must be possible without a need for the + Interoperability must be possible without a prior need for the administrators of communicating systems to coordinate security - settings. Applications employing opportunistic security need + policy. Applications employing opportunistic security need to be deployable at Internet scale, with each peer independently configured to meet its own security needs (within the practical - bounds of the application protocol). Opportunistic security + bounds of the employed protocol). Opportunistic security must not get in the way of the peers communicating if neither - end is misconfigured. </t> + end is misconfigured (i.e., neither publishes or negotiates + security services that are not available or don't function + correctly). </t> @@ -176,7 +180,7 @@ security strives to maximize security based on the capabilities - of the peer (or peers). For some opportunistic security + of the peers. For some opportunistic security protocols the maximal protection possible may be just unauthenticated encryption to address passive monitoring. For - others, protection against active MiTM attacks may be an option. - Opportunistic security protocols may at times refuse to operate + others, protection against active attacks may be an option. + Opportunistic security protocols may, when applicable, refuse to communicate with peers for which higher security is expected, but for some @@ -192,3 +196,3 @@ this capability. To facilitate incremental deployment, - opportuistic security protocols may tolerate cleartext connections + opportunistic security protocols may tolerate cleartext connections or sessions with peers that don't support encryption. Over @@ -213,6 +217,6 @@ encompasses protocol designs that remove barriers to the - widespread use of encryption in the Internet. The actual + widespread use of encryption on the Internet. The actual protection provided by opportunistic security depends on the - capabilities of the communicating peers; opportunistic security - MUST attempt to at least encrypt network traffic, while allowing + capabilities of the communicating peers. Opportunistic security + MUST at least aim to encrypt network traffic, while allowing fallback to cleartext with peers that do not appear to be @@ -228,3 +232,3 @@ MAY be a reason to abort a connection to a peer that is expected - to be authenticated, it MUST NOT instead lead to communication + to be authenticated, it MUST NOT then lead to communication in cleartext when encryption is an option. Some Message -- Viktor.