Well, I guess you're right... Thanks for detecting this error. Could you open an erratum please?

Thanks,
        Yaron

On 21/12/16 23:16, Julien ÉLIE wrote:
Hi Yaron,

Actually I think the paragraph reads better in Sec. 2.2 because Sec. 2.1
is all about HTTP, but we should have picked a more inclusive heading
for 2.2, maybe "STARTTLS and the STARTTLS Command Injection Attack
(CVE-2011-0411)".

In that case, there would be a reference problem with RFC 7525 because
Section 3.2 of RFC 7525 mentions Section 2.1 for lack of STARTTLS (and
not 2.2):

   The following recommendations are provided to help prevent SSL
   Stripping (an attack that is summarized in Section 2.1 of [RFC7457]):

   o  Application protocols typically provide a way for the server to
      offer TLS during an initial protocol exchange, and sometimes also
      provide a way for the server to advertise support for TLS (e.g.,
      through a flag indicating that TLS is required); unfortunately,
      these indications are sent before the communication channel is
      encrypted.  A client SHOULD attempt to negotiate TLS even if these
      indications are not communicated by the server.


_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to