[arch-d] Off topic [was: IAB Statement on Encryption and Mandatory Client-side Scanning of Content]

Brian E Carpenter <brian.e.carpenter@gmail.com> Tue, 19 December 2023 22:00 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EEDDC14F616 for <architecture-discuss@ietfa.amsl.com>; Tue, 19 Dec 2023 14:00:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uoMefgc7HIdP for <architecture-discuss@ietfa.amsl.com>; Tue, 19 Dec 2023 14:00:27 -0800 (PST)
Received: from mail-oi1-x22d.google.com (mail-oi1-x22d.google.com [IPv6:2607:f8b0:4864:20::22d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D5A9C14F615 for <architecture-discuss@ietf.org>; Tue, 19 Dec 2023 14:00:27 -0800 (PST)
Received: by mail-oi1-x22d.google.com with SMTP id 5614622812f47-3ba00fe4e98so3843501b6e.2 for <architecture-discuss@ietf.org>; Tue, 19 Dec 2023 14:00:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1703023227; x=1703628027; darn=ietf.org; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=xzyQHV3hA0QI0EXc5e416BRKiCovX7uJcfFdQSfzf3c=; b=VuWU4YOebif5NMiBa+oeNajkL+/PPt+V58ufqnvxpmUclxBSXv6QZO8VZwxQ1Vg4sO VFM9s+s0i0mfYxGYg0LwhobH5105UUH/Fmh4+/8HE2O+WkPXg8EUejlSZiUCp+qsIkN1 BvikOmXrE/zmn17Pt4QdGrXId0g6uaz+NZYdFhyz7GsKsd+vShtk23x59qgmfheon1QZ vVSl+eX41z3AeswzNqgT6do+md/4UaBGysudvCoGvSnTwcWiYnjIoi/C4QTMpOlctv6E tz6nueUCvu/eFb6cU31uEx6ain7eU7CFyHDlRitG9YdEANcnEwO4Nza1laLAfP217ph8 PXUQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1703023227; x=1703628027; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=xzyQHV3hA0QI0EXc5e416BRKiCovX7uJcfFdQSfzf3c=; b=t6xJ4X9IxkVeErRmZCDRlavsUfR8gEUL44KN9MDW880H001MwqRkmeKu1fx/7Zu5Rr fQUmMOef3ST7KUYM9a7NppRLC5UmdzLwPikhAccufr7L0d2NmABw1OnMjCUw1XN9LQ+r WmZw4yohy4Q7/8a/2dCh5kubVCnTRezSRv+h+MTMeiwHFjtSxYcNj5g97XXThhaPEfTq xWNXEZw06ebZbWt1N+bGX2+Dz4xjI+q6KsgnXSjCrA4eQ9t97Qjti16thfaDdMG99Rrb tq/6+mvK4g4qtot61dl8yfd3qYGaAnC435NOLugcSseWoRPmlNDa1tOzt7B8r9b6ql4/ MFIg==
X-Gm-Message-State: AOJu0YwmA9F7beN8BFCkA3BRA0G4jBMcRZiTU8NKcI4jC3Z+zgyI3rK8 9iAvaCQ0ZG4a0EXORypl4Ro=
X-Google-Smtp-Source: AGHT+IFVA8gyOkVFNUG/A+UlZnU/e3CVKCh5iCqvbxrdcAstxlodMI8KqQaqSwANRjOzoTObB85TjQ==
X-Received: by 2002:a05:6808:2dcb:b0:3ba:54d:3fc with SMTP id gn11-20020a0568082dcb00b003ba054d03fcmr27749496oib.51.1703023226676; Tue, 19 Dec 2023 14:00:26 -0800 (PST)
Received: from ?IPV6:2404:4400:541d:a600:44b7:2c2e:2bc6:8707? ([2404:4400:541d:a600:44b7:2c2e:2bc6:8707]) by smtp.gmail.com with ESMTPSA id d6-20020aa78e46000000b006d088356541sm16704739pfr.104.2023.12.19.14.00.25 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 19 Dec 2023 14:00:26 -0800 (PST)
Message-ID: <e9f0c20a-f06c-eb8c-3261-b9c5a7f21b5f@gmail.com>
Date: Wed, 20 Dec 2023 11:00:22 +1300
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.10.0
Content-Language: en-US
To: Hesham ElBakoury <helbakoury@gmail.com>
Cc: architecture-discuss@ietf.org
References: <170266952162.33107.14325064798861197261@ietfa.amsl.com> <6.2.5.6.2.20231216110256.18d0acd0@elandnews.com> <CWXP265MB5153610FBB98A7B06AF81040C290A@CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM> <CAKr6gn2Hf4N+DgKHKyO+i3T3OJyYRBJhH1AdQf-uXZ0xKmJ4Eg@mail.gmail.com> <CWXP265MB515381523714FF99524410CFC290A@CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM> <790032a6-24f6-60d1-fb60-4b44bd447bde@gmail.com> <fadd9250-4b31-4bf5-aa76-4f37d24fd650@cdt.org> <02ae01da31f2$80580630$81081290$@olddog.co.uk> <c96e396d-fc05-4bdd-a047-012cbf7366c1@cdt.org> <CAFvDQ9ouHUpn8PqcNLxT0yKGh+mPeOZE_g7a8Nz+rOzEViVL=g@mail.gmail.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
In-Reply-To: <CAFvDQ9ouHUpn8PqcNLxT0yKGh+mPeOZE_g7a8Nz+rOzEViVL=g@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/XKKI8vEVNYnp7r8P7ILszCNpOAI>
Subject: [arch-d] Off topic [was: IAB Statement on Encryption and Mandatory Client-side Scanning of Content]
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Dec 2023 22:00:31 -0000

Hesham,
On 19-Dec-23 11:59, Hesham ElBakoury wrote:

> Nubeva has developed technology to extract TLS keys to be used by 3rd party tools to decrypt and inspect the traffic [https://www.nubeva.com/hubfs/Downloadables/Nubeva%20SSL%20Solution%20Brief_Nov%202019.pdf].
> 
> Would this violates client privacy?
> 

I may be missing something, but I don't understand how this product could work unless the "Sensor" component is configured with the server's private keys. Is that correct?

    Brian