Re: PRISM and HTTP/2.0
J Ross Nicoll <jrn@jrn.me.uk> Sat, 13 July 2013 22:42 UTC
Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DB6221F9CE6 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sat, 13 Jul 2013 15:42:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wjmu9TewRVMn for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sat, 13 Jul 2013 15:42:45 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) by ietfa.amsl.com (Postfix) with ESMTP id 192FC21F9C70 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sat, 13 Jul 2013 15:42:39 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1Uy8WH-0000sq-T7 for ietf-http-wg-dist@listhub.w3.org; Sat, 13 Jul 2013 22:42:25 +0000
Resent-Date: Sat, 13 Jul 2013 22:42:25 +0000
Resent-Message-Id: <E1Uy8WH-0000sq-T7@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <jrn@jrn.me.uk>) id 1Uy8W8-0000s7-OH for ietf-http-wg@listhub.w3.org; Sat, 13 Jul 2013 22:42:16 +0000
Received: from caiajhbdcaib.dreamhost.com ([208.97.132.81] helo=homiemail-a8.g.dreamhost.com) by maggie.w3.org with esmtp (Exim 4.72) (envelope-from <jrn@jrn.me.uk>) id 1Uy8W7-0007wu-Qg for ietf-http-wg@w3.org; Sat, 13 Jul 2013 22:42:16 +0000
Received: from homiemail-a8.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a8.g.dreamhost.com (Postfix) with ESMTP id 8AD42D22070; Sat, 13 Jul 2013 15:41:54 -0700 (PDT)
Received: from [192.168.0.2] (cpc8-sgyl32-2-0-cust820.18-2.cable.virginmedia.com [82.44.11.53]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: jrn@jrn.me.uk) by homiemail-a8.g.dreamhost.com (Postfix) with ESMTPSA id CDC20D22069; Sat, 13 Jul 2013 15:41:53 -0700 (PDT)
Message-ID: <51E1D7AF.20708@jrn.me.uk>
Date: Sat, 13 Jul 2013 23:41:51 +0100
From: J Ross Nicoll <jrn@jrn.me.uk>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130620 Thunderbird/17.0.7
MIME-Version: 1.0
To: Poul-Henning Kamp <phk@phk.freebsd.dk>, HTTP Working Group <ietf-http-wg@w3.org>
References: <5672.1373710085@critter.freebsd.dk>
In-Reply-To: <5672.1373710085@critter.freebsd.dk>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Received-SPF: none client-ip=208.97.132.81; envelope-from=jrn@jrn.me.uk; helo=homiemail-a8.g.dreamhost.com
X-W3C-Hub-Spam-Status: No, score=0.0
X-W3C-Hub-Spam-Report: RCVD_IN_DNSWL_NONE=-0.0001
X-W3C-Scan-Sig: maggie.w3.org 1Uy8W7-0007wu-Qg c07964680f3a28f9a1c22eb7f23d556a
X-Original-To: ietf-http-wg@w3.org
Subject: Re: PRISM and HTTP/2.0
Archived-At: <http://www.w3.org/mid/51E1D7AF.20708@jrn.me.uk>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/18760
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>
With regards to #1, I'm not sure the concept of "more encryption" is really what's meant here. Minimum key lengths could be increased, perhaps different encryption methods merged such that if one approach is broken then the message is still secure... however I think we can fairly realistically assume no-one's going to try tackling the encryption itself head-on. Bogus certificates and server-side backdoors seem inevitable, at least in the current political climate. I don't think any realistic changes at the transport layer will affect that (unrealistic changes would include "move to a web of trust"). Equally I don't think there's any need for changes to enable access; they're doing that just fine without us, and inevitably any such hooks are weaknesses that can potentially be exploited by an attacker. About the only changes I could suggest from a technical point of view would be user-interface related. Indicate when a server certificate changes, for example, especially if the previous certificate's expiry wasn't due for a while. The same sort of defences that are relevant against phishing attacks, are useful for evading other forms of site impersonation. I think this is a discussion worth having, because even "There is nothing to be changed" is a concrete conclusion to come to, but that may be the answer here. Ross On 13/07/2013 11:08, Poul-Henning Kamp wrote: > I would like to advocate that everybody spends a little bit of time > reconsidering how we design protocols after the PRISM disclosures. > > We don't need to have a long discussion about the actual legality > of the US spy operation, the sheer scale and the kind of efforts > that went in to it is the relevant message to us. > > The take-home message is that encryption will be broken, disabled, > circumvented og watered down, if it gets in the way of political > objectives. > > We can do three things in light of this: > > 1) We can try to add more encryption to fight back. > > 2) We can recognize that there needs to be hooks for duly authorized access. > > 3) We can change or at least influence the political objectives > > I think PRISM is ample evidence that #1 will have the 100% certain > result is that all encryption will be circumvented, with bogus CA > certs all the way up to PRISM and designed-in backdoors, and the > net result is less or even no privacy for anybody everywhere. > > In my view, that would be very counterproductive. > > #2 is not without challenges, but at least there are plausible paths > from there to a state of affairs where innocent people might still > have access to private communications, and it might seem to be a > necessary precondition for any hope on #3 > > #3 is clearly not inside HTTPbis scope, but it may be time for > all good nerds to come to the aid of their country and humanity. > > A "market based" argument can be made under #3, that if we design > protocols with the necessary access (#2), programs like PRISM will > not be cost effective, but that will take some serious effort > of education and politics. > > Anyway: Edward Snowden has moved the rug under the HTTP/2.0 > standardization process, and we should not ignore that. > > Think about it. >
- PRISM and HTTP/2.0 Poul-Henning Kamp
- Re: PRISM and HTTP/2.0 Stephen Farrell
- Re: PRISM and HTTP/2.0 Mike Belshe
- Re: PRISM and HTTP/2.0 J Ross Nicoll
- Re: PRISM and HTTP/2.0 Roberto Peon
- Re: PRISM and HTTP/2.0 Nicolas Mailhot
- Re: PRISM and HTTP/2.0 Mark Nottingham
- Re: PRISM and HTTP/2.0 Poul-Henning Kamp
- Re: PRISM and HTTP/2.0 Reto Bachmann-Gmür
- Re: PRISM and HTTP/2.0 Nico Williams
- Re: PRISM and HTTP/2.0 Amos Jeffries
- Re: PRISM and HTTP/2.0 Reto Bachmann-Gmür
- Re: PRISM and HTTP/2.0 Nico Williams
- Re: PRISM and HTTP/2.0 Reto Bachmann-Gmür