[ietf-nntp] draft-ietf-nntpext-tls-nntp-01.txt

Russ Allbery rra at stanford.edu
Tue Mar 9 11:21:22 PST 2004


Ken Murchison <ken at oceana.com> writes:

> The server has complete control over the negotiation.  Its provides a
> list of options from which the client can choose.  The server should
> only provide those options that it is willing to accept, and shouldn't
> have to decide *after* the negotiation is complete whether or not it is
> happy with the outcome.  As a result, I think the case where TLS
> negotiation is successful but the server then refuses other commands
> with 483 (or some other code) is, and should be, nonexistent.  Either
> TLS succeeds, or it fails, period.  Obviously, if TLS fails, then
> issuing 483 for subsequent commands makes sense, but the client should
> already expect this.

This makes our lives massively easier.  Thank you for the information!
Given this, I agree that we're worrying too much about this case; the only
case that we actually have to talk about is the case where TLS negotiation
fails entirely.

-- 
Russ Allbery (rra at stanford.edu)             <http://www.eyrie.org/~eagle/>



More information about the ietf-nntp mailing list