Re: PRISM and HTTP/2.0

Roberto Peon <grmocg@gmail.com> Sun, 14 July 2013 00:19 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFD7721F9EE1 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sat, 13 Jul 2013 17:19:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.549
X-Spam-Level:
X-Spam-Status: No, score=-10.549 tagged_above=-999 required=5 tests=[AWL=0.049, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o501Cp0T7Vio for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sat, 13 Jul 2013 17:18:54 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) by ietfa.amsl.com (Postfix) with ESMTP id 8318B21F9E7C for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sat, 13 Jul 2013 17:18:54 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1UyA0D-0004XD-PQ for ietf-http-wg-dist@listhub.w3.org; Sun, 14 Jul 2013 00:17:25 +0000
Resent-Date: Sun, 14 Jul 2013 00:17:25 +0000
Resent-Message-Id: <E1UyA0D-0004XD-PQ@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <grmocg@gmail.com>) id 1UyA05-0004WD-Mg for ietf-http-wg@listhub.w3.org; Sun, 14 Jul 2013 00:17:17 +0000
Received: from mail-oa0-f48.google.com ([209.85.219.48]) by lisa.w3.org with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16) (Exim 4.72) (envelope-from <grmocg@gmail.com>) id 1UyA04-00023a-Ia for ietf-http-wg@w3.org; Sun, 14 Jul 2013 00:17:17 +0000
Received: by mail-oa0-f48.google.com with SMTP id f4so14464068oah.35 for <ietf-http-wg@w3.org>; Sat, 13 Jul 2013 17:16:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=dWuUvvLq2n0RkP7Wg/t1KWAsOumc1bkFzCtCpB25tKk=; b=i3uRjicXy6RIYY1OhQgTBDw86jfUgY5ZAH7To0FyEV1dBr7Rczrde2saCkrVpE6h7/ aQVrs/ChsGmt6iL6yx308lh1EOwfjwt/TOi2QRj/ad+nmdUjUKzJUcbOzG0Fii4bMwmx 7QDPInkVflvloyRmUTVuKO0ikz8axBHtIh0h1OJSQXqCBECKTDgfiO2lMfGcl6tF7oxT 2qAPhfv9bQjNK9MRMCgQfTjnBA6M0xPnGSCIs0ZJj2Ozhli+k8VSFQbpyO8FKoKtw0na FOViInLRm1q7NmOOZBX+3syRERzK50vkx/mLosg8T2s7uvtWXGl9yhQCBBFRSsEb6xJm NmQg==
MIME-Version: 1.0
X-Received: by 10.60.52.16 with SMTP id p16mr39939234oeo.29.1373761010517; Sat, 13 Jul 2013 17:16:50 -0700 (PDT)
Received: by 10.76.91.229 with HTTP; Sat, 13 Jul 2013 17:16:50 -0700 (PDT)
In-Reply-To: <51E1D7AF.20708@jrn.me.uk>
References: <5672.1373710085@critter.freebsd.dk> <51E1D7AF.20708@jrn.me.uk>
Date: Sat, 13 Jul 2013 17:16:50 -0700
Message-ID: <CAP+FsNekY4WWdsYdUX3_vUWm1pqepWOH7PdiS9ZxpFwkHnqXWA@mail.gmail.com>
From: Roberto Peon <grmocg@gmail.com>
To: J Ross Nicoll <jrn@jrn.me.uk>
Cc: Poul-Henning Kamp <phk@phk.freebsd.dk>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="001a11330b2209caed04e16da9f6"
Received-SPF: pass client-ip=209.85.219.48; envelope-from=grmocg@gmail.com; helo=mail-oa0-f48.google.com
X-W3C-Hub-Spam-Status: No, score=-3.5
X-W3C-Hub-Spam-Report: AWL=-2.689, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001
X-W3C-Scan-Sig: lisa.w3.org 1UyA04-00023a-Ia ae47a40f59e7963eb4392a074215c253
X-Original-To: ietf-http-wg@w3.org
Subject: Re: PRISM and HTTP/2.0
Archived-At: <http://www.w3.org/mid/CAP+FsNekY4WWdsYdUX3_vUWm1pqepWOH7PdiS9ZxpFwkHnqXWA@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/18761
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

I have a difficult time believing that any solution, short of new
physics-based technologies, will overcome the tradition of users'
ambivalence when faced with any obstacle to convenience.
-=R


On Sat, Jul 13, 2013 at 3:41 PM, J Ross Nicoll <jrn@jrn.me.uk> wrote:

> With regards to #1, I'm not sure the concept of "more encryption" is
> really what's meant here. Minimum key lengths could be increased, perhaps
> different encryption methods merged such that if one approach is broken
> then the message is still secure... however I think we can fairly
> realistically assume no-one's going to try tackling the encryption itself
> head-on.
>
> Bogus certificates and server-side backdoors seem inevitable, at least in
> the current political climate. I don't think any realistic changes at the
> transport layer will affect that (unrealistic changes would include "move
> to a web of trust"). Equally I don't think there's any need for changes to
> enable access; they're doing that just fine without us, and inevitably any
> such hooks are weaknesses that can potentially be exploited by an attacker.
>
> About the only changes I could suggest from a technical point of view
> would be user-interface related. Indicate when a server certificate
> changes, for example, especially if the previous certificate's expiry
> wasn't due for a while. The same sort of defences that are relevant against
> phishing attacks, are useful for evading other forms of site impersonation.
>
> I think this is a discussion worth having, because even "There is nothing
> to be changed" is a concrete conclusion to come to, but that may be the
> answer here.
>
> Ross
>
>
> On 13/07/2013 11:08, Poul-Henning Kamp wrote:
>
>> I would like to advocate that everybody spends a little bit of time
>> reconsidering how we design protocols after the PRISM disclosures.
>>
>> We don't need to have a long discussion about the actual legality
>> of the US spy operation, the sheer scale and the kind of efforts
>> that went in to it is the relevant message to us.
>>
>> The take-home message is that encryption will be broken, disabled,
>> circumvented og watered down, if it gets in the way of political
>> objectives.
>>
>> We can do three things in light of this:
>>
>> 1) We can try to add more encryption to fight back.
>>
>> 2) We can recognize that there needs to be hooks for duly authorized
>> access.
>>
>> 3) We can change or at least influence the political objectives
>>
>> I think PRISM is ample evidence that #1 will have the 100% certain
>> result is that all encryption will be circumvented, with bogus CA
>> certs all the way up to PRISM and designed-in backdoors, and the
>> net result is less or even no privacy for anybody everywhere.
>>
>> In my view, that would be very counterproductive.
>>
>> #2 is not without challenges, but at least there are plausible paths
>> from there to a state of affairs where innocent people might still
>> have access to private communications, and it might seem to be a
>> necessary precondition for any hope on #3
>>
>> #3 is clearly not inside HTTPbis scope, but it may be time for
>> all good nerds to come to the aid of their country and humanity.
>>
>> A "market based" argument can be made under #3, that if we design
>> protocols with the necessary access (#2), programs like PRISM will
>> not be cost effective, but that will take some serious effort
>> of education and politics.
>>
>> Anyway:  Edward Snowden has moved the rug under the HTTP/2.0
>> standardization process, and we should not ignore that.
>>
>> Think about it.
>>
>>
>
>