Re: [Cfrg] NSA sabotaging crypto standards

"Dan Harkins" <dharkins@lounge.org> Fri, 07 February 2014 08:31 UTC

Return-Path: <dharkins@lounge.org>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 34FDB1A039D for <cfrg@ietfa.amsl.com>; Fri, 7 Feb 2014 00:31:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.867
X-Spam-Level:
X-Spam-Status: No, score=-3.867 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K7-_VATsDF5L for <cfrg@ietfa.amsl.com>; Fri, 7 Feb 2014 00:31:10 -0800 (PST)
Received: from colo.trepanning.net (colo.trepanning.net [69.55.226.174]) by ietfa.amsl.com (Postfix) with ESMTP id D7E5D1A0058 for <cfrg@irtf.org>; Fri, 7 Feb 2014 00:31:10 -0800 (PST)
Received: from www.trepanning.net (localhost [127.0.0.1]) by colo.trepanning.net (Postfix) with ESMTP id 4B5CC10224008; Fri, 7 Feb 2014 00:31:10 -0800 (PST)
Received: from 69.12.173.8 (SquirrelMail authenticated user dharkins@lounge.org) by www.trepanning.net with HTTP; Fri, 7 Feb 2014 00:31:10 -0800 (PST)
Message-ID: <c2077ef440412f1158e7bacdfc8f8db7.squirrel@www.trepanning.net>
In-Reply-To: <CACsn0cmFpQEBbv=3EWvUff3EnNuuiqyzjJqFR6Dy97VjLREVVg@mail.gmail.com>
References: <20140203192451.6268.76511.idtracker@ietfa.amsl.com> <14AB44E0-4C90-4E4C-A656-885A31CF4C02@checkpoint.com> <CACsn0cmDT-FAN8uMZ0w8TX6GKPAZjnrexLeFQd7QhRfoY6AGFQ@mail.gmail.com> <75e1e853dc391b418062ee5e51adeb2f.squirrel@www.trepanning.net> <CABqy+sr7ZKrACj4Ga2_75d9Kea0aKbrp2P5fWWu4YZP53zijxw@mail.gmail.com> <CACsn0cmS152wYQWHiX8ykzaMM=6b=r=fwVuLfPj_u0wmoq0jKw@mail.gmail.com> <7BAC95F5A7E67643AAFB2C31BEE662D018B81B7F7C@SC-VEXCH2.marvell.com> <CACsn0c=a5PvZOZgVRjHaJ2avGCPHF6b6nOpNh+iT0909X-jUFA@mail.gmail.com> <52F23D52.4090509@cisco.com> <EFA9E215-3B01-43C6-A8F0-3F98E3ED2E26@netapp.com> <3E30D764-7E19-45DB-9D6D-63949F5B36CB@netapp.com> <255B9BB34FB7D647A506DC292726F6E1153AE65F2E@WSMSG3153V.srv.dir.telstra.com> <570B8BE5-1362-4D08-A22D-FE86FC4A77DC@netapp.com> <CACsn0ckm95r4x7VBrW81+f7Resf7RcS6iOBPx3yqu9m1VuELhw@mail.gmail.com> <6F8C22FA-B968-4B3C-8A8D-C24F1DFC5021@vpnc.org> <CACsn0cmFpQEBbv=3EWvUff3EnNuuiqyzjJqFR6Dy97VjLREVVg@mail.gmail.com>
Date: Fri, 07 Feb 2014 00:31:10 -0800
From: Dan Harkins <dharkins@lounge.org>
To: Watson Ladd <watsonbladd@gmail.com>
User-Agent: SquirrelMail/1.4.14 [SVN]
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Cc: "cfrg@irtf.org" <cfrg@irtf.org>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [Cfrg] NSA sabotaging crypto standards
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Feb 2014 08:31:13 -0000

On Thu, February 6, 2014 11:10 am, Watson Ladd wrote:
> On Thu, Feb 6, 2014 at 10:48 AM, Paul Hoffman <paul.hoffman@vpnc.org>
> wrote:
>> On Feb 6, 2014, at 9:00 AM, Watson Ladd <watsonbladd@gmail.com> wrote:
>>
>>> IETF working groups will follow suit if they see that some new
>>> protocol is documented by the CFRG.
>>
>> Can you give examples of that? Having been active in many IETF WGs for
>> 15+ years, I can't think of one, but I could have forgotten some.
>
> Dragonfly in TLS was the first time this happened. Had Rene Struik not
> noticed that CFRG hadn't done anything, life would be interesting.
> My understanding was that CFRG existed so that IETF WGs without
> cryptographers could borrow some temporarily from us. That's what the
> HTTP
> auth people are doing, and what TLS did with Dragonfly.

  I don't want to perpetuate this unfortunate thread but I would like
to correct the record. I came up with the dragonfly exchange quite
a long time ago and have been promoting its use in different
protocols-- EAP, IKE, 802.11, TLS. All that activity precedes the
CFRG draft.

  Rene's review of the CFRG draft was, as he notes in the title of his email,
"triggered by" the TLS-pwd last call. Note that the hullabaloo over
TLS-pwd was triggered by Trevor Perrin's realization (after 2 years)
that TLS-pwd existed and his subsequent incorporation of dragonfly
into a conspiracy theory involving the NSA. So actually, had Trevor
paid as little attention to the TLS WG that week as he did the previous
2 years, things would've been less "interesting" (to use your word).

  Basically, the timeframe and the process you're suggesting is a
little off.

  Also, note your "understanding was that CFRG existed so that IETF
WGs without cryptographers could borrow some temporarily" is
without basis. The WG that produced IPsec and IKE had such notable
cryptographers as Krawczyk, Canetti, Orman, and Bellovin, as active
participants (and I commit a sin of omission here by failing to mention
others, my apologies). Other working groups have similar participation
by very well-respected experts.

  Now, you may have issues with IPsec, IKE, TLS, or whatever but
please realize that is most likely the result of the sausage making
function of a standards process. I have lots of problems with IKE but
none of them were the result of the brilliant cryptographers that
helped produce it, they were the result of engineering shortcuts,
compromise among differing viewpoints in order to achieve
consensus (some of which appear in hindsight quite ridiculous),
haste to get the standards out there, and a failure to specify the
protocol properly.

  The rubber hits the road in an IETF WG. If you want to make sure
that a particular IETF protocol is done right than engage there.
The CFRG should be, in my opinion, a bridge between theory and
practice.

  regards,

  Dan.