14.7.3. Use of TLS and SSL by Other Protocols
In order for TLS and SSL to be useful, they have to be used in
conjunction with some higher-level protocol that actually exchanges
data between applications. In some cases, this is done by integrating
them into new protocols; for instance, version 2 of the Secure Shell
(SSH) protocol uses TLS. However, in other situations it's
useful to add TLS or SSL to an existing protocol. There are two basic
mechanisms for doing this. One way is to use a new port number for
the combination of the old protocol and the encrypting protocol; this
is the way SSL and HTTP were originally integrated to create HTTPS.
The other common way of integrating TLS or SSL into an existing
protocol is to add a command to the protocol that starts up an
encrypted session over the existing port; this is the approach taken
by ESMTP when using the STARTTLS extension.
Neither of these approaches is perfect. Using a new port number is
relatively easy to implement (you don't have to change command
parsers) and allows a firewall to easily distinguish between
protected and unprotected versions of the protocol (so that you can
require the use of TLS, for instance). However, it uses up port
numbers (and there are only 1024 in the reserved range to be
allocated), and it requires changing firewall configurations to
permit TLS-protected connections.
Adding a new command to start up a TLS connection makes more
efficient use of port numbers and increases the chances that the
upgraded protocol will work through firewalls (it may still be denied
by an intelligent proxy that's watching the commands that are
used). However, it's harder to implement. In particular,
it's hard to make sure that no important data is exchanged
before TLS is started up. Furthermore, it's critical for
programmers to be cautious about failure conditions. A server or
client that supports TLS needs to fail gracefully when talking to one
that doesn't. However, if both the server and the client
support TLS, it should not be possible for an attacker to force them
to converse unprotected by interfering with the negotiation to use
TLS.