Re: [arch-d] Off topic [was: IAB Statement on Encryption and Mandatory Client-side Scanning of Content]

Brian E Carpenter <brian.e.carpenter@gmail.com> Wed, 20 December 2023 04:19 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D430C239605 for <architecture-discuss@ietfa.amsl.com>; Tue, 19 Dec 2023 20:19:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.194
X-Spam-Level:
X-Spam-Status: No, score=-1.194 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, LOTS_OF_MONEY=0.001, NICE_REPLY_A=-0.091, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2SIWySrwAaQj for <architecture-discuss@ietfa.amsl.com>; Tue, 19 Dec 2023 20:19:23 -0800 (PST)
Received: from mail-pf1-x436.google.com (mail-pf1-x436.google.com [IPv6:2607:f8b0:4864:20::436]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 038C2C14CE44 for <architecture-discuss@ietf.org>; Tue, 19 Dec 2023 20:19:22 -0800 (PST)
Received: by mail-pf1-x436.google.com with SMTP id d2e1a72fcca58-6d741fb7c8eso2892861b3a.2 for <architecture-discuss@ietf.org>; Tue, 19 Dec 2023 20:19:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1703045962; x=1703650762; darn=ietf.org; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=J1goAP6GEJch4TBDT0gdmMhXVUzJcEjTMJlXE4fNB4w=; b=fqgwj3UG0ka8vRm1P+DWaxozefAXamm2v+LA6pLbEISIB1FVPQDECh1qOfesITLYIc OMDAdsGmdf12crVPx6F/KBcblvnd2EpK6yTy+3bXuawsE72ygIlITtjSYLDyVZeWE4Go qikqUc9sxVWiQ6ZsA3c3FiRPZqZR0bWjVbQuDM4X4bB8zEY4IiE7bl6aRKfG5lrYHeGs CRKNMYeDoC0rRHD48xsRRSa94lR9KvO3/m77XkypYD86/Dme8k8mGNAzX98W0m278C/g RuZuZcXWGn3iZcF0Wv0cNvQaPFOGXGgPSjQWivFRQwseHEEocnrW3MJfKYA0DIDStkBy ieoA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1703045962; x=1703650762; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=J1goAP6GEJch4TBDT0gdmMhXVUzJcEjTMJlXE4fNB4w=; b=csQdmrxPP1SrYqHfkVpM1RchUeM5SOIEf5eHaOXuOaxPN+1wKw46+WSjWWOiyoCt+j Xmac1wzvgAS9mlJouWljHipF90TaVOs77aOxeObs+OTZ4wDZHaMmeDIQYBV5QIB+n/sy OVS1WN7AUZjON918rOUKaAu2R/2s1SmOwUZb47qvrWTcbwC43ekdB51IyE89e9Eu3Fu3 6AXNp7+2FsalLTdNi1gZH/FxuAcUCwnT3wpdqddFwLfLPsKp5ybhbHYw5lemRE5asjsD 8L3mdfXZxSpZf+jtQWZVHkEPDiBUkn+6vL7ACZ1YPrUFiXQfHPtDauwewUC+QrTcrMzD VD4g==
X-Gm-Message-State: AOJu0YznCTHjvo17xlpttR26TKTRQZKQT9LkQd/klBn2tcNMkiULlswK Yr1gfGmhCgw2SuAH3C8awdM=
X-Google-Smtp-Source: AGHT+IEq1xgg9Y92pt8T7XJG/6RBCh5RQ0u3Vhswfajan29o95gDlYNgAJnEBkXCzTR/wsUNs9LtKg==
X-Received: by 2002:aa7:9243:0:b0:6d9:447a:963a with SMTP id 3-20020aa79243000000b006d9447a963amr818321pfp.34.1703045962170; Tue, 19 Dec 2023 20:19:22 -0800 (PST)
Received: from ?IPV6:2404:4400:541d:a600:44b7:2c2e:2bc6:8707? ([2404:4400:541d:a600:44b7:2c2e:2bc6:8707]) by smtp.gmail.com with ESMTPSA id u4-20020a62d444000000b006d95eb50a2csm135457pfl.192.2023.12.19.20.19.20 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 19 Dec 2023 20:19:21 -0800 (PST)
Message-ID: <08a7b802-de2c-b9a9-bf7e-1c32926c612d@gmail.com>
Date: Wed, 20 Dec 2023 17:19:15 +1300
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.10.0
Content-Language: en-US
To: Phillip Hallam-Baker <phill@hallambaker.com>
Cc: architecture-discuss@ietf.org, Hesham ElBakoury <helbakoury@gmail.com>
References: <170266952162.33107.14325064798861197261@ietfa.amsl.com> <6.2.5.6.2.20231216110256.18d0acd0@elandnews.com> <CWXP265MB5153610FBB98A7B06AF81040C290A@CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM> <CAKr6gn2Hf4N+DgKHKyO+i3T3OJyYRBJhH1AdQf-uXZ0xKmJ4Eg@mail.gmail.com> <CWXP265MB515381523714FF99524410CFC290A@CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM> <790032a6-24f6-60d1-fb60-4b44bd447bde@gmail.com> <fadd9250-4b31-4bf5-aa76-4f37d24fd650@cdt.org> <02ae01da31f2$80580630$81081290$@olddog.co.uk> <c96e396d-fc05-4bdd-a047-012cbf7366c1@cdt.org> <CAFvDQ9ouHUpn8PqcNLxT0yKGh+mPeOZE_g7a8Nz+rOzEViVL=g@mail.gmail.com> <e9f0c20a-f06c-eb8c-3261-b9c5a7f21b5f@gmail.com> <CAFvDQ9oSa62BG2DBQa72=h4=dB-yHyDtoKdA_9FrtoARKZrU7Q@mail.gmail.com> <CAMm+LwgQYN9zHiH1MTGvVVB-Tq_mRO9eAKaCmcCJkzdKjqfWMA@mail.gmail.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
In-Reply-To: <CAMm+LwgQYN9zHiH1MTGvVVB-Tq_mRO9eAKaCmcCJkzdKjqfWMA@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/5xlT7vrwthNXK3EupxTVZysSGis>
Subject: Re: [arch-d] Off topic [was: IAB Statement on Encryption and Mandatory Client-side Scanning of Content]
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Dec 2023 04:19:27 -0000

On 20-Dec-23 13:54, Phillip Hallam-Baker wrote:
> If that is the way it works, it does not.

If the user doesn't have to configure it with their private keys, the only way it can work is by inserting itself in code paths inside the TLS implementation.

> The only cases where anything like that has happened have been nation state actors getting deep into the supply chain. Cases like Crypto AG.

If what they are doing is using a virus-like technique to hot patch compiled open source code, I don't think you can say they're *in* the supply chain.

After a brief search, the relevant patent appears to be US11805107. It uses the word "instrument" in a context where most of us would use "infect", e.g. when discussing "instrumenting" /usr/lib/libssl.so.1.1 to extract keys.

Certainly, this subverts the purpose of TLS, by subverting the host implementation. So, not a protocol issue. However, it means that users cannot know whether their encrypted session is being read by their friendly web service provider, possibly under government orders.

For example, it appears that any AWS service you use might be affected:
https://aws-quickstart.github.io/quickstart-nubeva-tlsdecrypt/

    Brian

> 
> 
> 
> 
> On Tue, Dec 19, 2023 at 6:13 PM Hesham ElBakoury <helbakoury@gmail.com <mailto:helbakoury@gmail.com>> wrote:
> 
>     Brian,
>     The way it works is described here:
>     https://www.nubeva.com/pillar/get-session-keys <https://www.nubeva.com/pillar/get-session-keys>
> 
>     Nubeva is in AWS market place. It is used with AWS VPC:
>     https://aws.amazon.com/marketplace/pp/prodview-aex37bzqx6hxi <https://aws.amazon.com/marketplace/pp/prodview-aex37bzqx6hxi>
> 
>     Hesham
> 
>     On Tue, Dec 19, 2023, 2:00 PM Brian E Carpenter <brian.e.carpenter@gmail.com <mailto:brian.e.carpenter@gmail.com>> wrote:
> 
>         Hesham,
>         On 19-Dec-23 11:59, Hesham ElBakoury wrote:
> 
>          > Nubeva has developed technology to extract TLS keys to be used by 3rd party tools to decrypt and inspect the traffic [https://www.nubeva.com/hubfs/Downloadables/Nubeva%20SSL%20Solution%20Brief_Nov%202019.pdf <https://www.nubeva.com/hubfs/Downloadables/Nubeva%20SSL%20Solution%20Brief_Nov%202019.pdf>].
>          >
>          > Would this violates client privacy?
>          >
> 
>         I may be missing something, but I don't understand how this product could work unless the "Sensor" component is configured with the server's private keys. Is that correct?
> 
>              Brian
> 
>     _______________________________________________
>     Architecture-discuss mailing list
>     Architecture-discuss@ietf.org <mailto:Architecture-discuss@ietf.org>
>     https://www.ietf.org/mailman/listinfo/architecture-discuss <https://www.ietf.org/mailman/listinfo/architecture-discuss>
>