OK, I'm trying to digest all of this.

It seems clear to me that TLS+AUTH=PLAIN will be a solution, and will be
required of all IMAP server implementations.  I have not seen any
objection to either "TLS+AUTH=PLAIN is a solution" or "TLS+AUTH=PLAIN is
required of all server implementations."

What is under debate is whether or not TLS+AUTH=PLAIN is *the* solution.

Is a client is required to implement TLS+AUTH=PLAIN?

If the answer is "yes", we have the option of declaring the problem
solved, put it in the document, and submit to IESG.

If the answer is "no", then we must select one or more AUTH=xxx methods
that are MANDATORY for server implementation.  A client, on the other
hand, only needs to implement one of the server-mandatory methods.

After careful consideration, I have concluded that if Kerberos (GSSAPI and
KERBEROS_V4) is not suitable, then CRAM-MD5 and DIGEST-MD5 are also
unsuitable.  Like Kerberos, CRAM-MD5 and DIGEST-MD5 make demands upon the
server's authentication capabilities that some servers may be unable to
fufill.  Kerberos requires the services of a KDB, and CRAM-MD5 and
DIGEST-MD5 require the server to have a plaintext equivalent of the
password.

Modern operating systems store passwords in a one-way encrypted form.  If
a server implementation is required to use the host operating system's
userids and passwords (particularly if a system call is needed to log in),
then CRAM-MD5 and DIGEST-MD5 are unimplementable.

This, by itself, indicates to me that we should rule out making either
CRAM-MD5 or DIGEST-MD5 be mandatory to implement on a server.

I therefore recommend to the group that we declare that:
 . *the* solution is TLS+AUTH=PLAIN
 . TLS+AUTH=PLAIN is mandatory to implement on both client and server
 . the problem is solved
and abandon alternatives.

-- Mark --

http://staff.washington.edu/mrc
Science does not emerge from voting, party politics, or public debate.

Reply via email to