Re: [icnrg] Vessel Container Format

"David R. Oran" <daveoran@orandom.net> Mon, 14 November 2022 15:20 UTC

Return-Path: <daveoran@orandom.net>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0D54C1526FC for <icnrg@ietfa.amsl.com>; Mon, 14 Nov 2022 07:20:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=crystalorb.net header.b=f+r2Nt+R; dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=crystalorb.net header.b=wTz78lD8
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KDQyoFvX7L6H for <icnrg@ietfa.amsl.com>; Mon, 14 Nov 2022 07:20:28 -0800 (PST)
Received: from crystalorb.net (omega.crystalorb.net [IPv6:2600:3c01:e000:42e::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A0C4C1526FB for <icnrg@irtf.org>; Mon, 14 Nov 2022 07:20:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=crystalorb.net; s=mail; h=Content-Type:MIME-Version:References:In-Reply-To: Message-ID:Date:Subject:Cc:To:From:From:Sender:Reply-To:Subject:Date: Message-ID:To:Cc:MIME-Version:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=NPefJTBCmu24EXXItYP03bucsA+3xkbD2C4B4g44N9I=; b=f+r2Nt+RbitykeIiboVLZvi1kD Ot7B5NEBQoqyKyqLXjA5kjwOfdq03cYwFUWotztpoL6oy3GeVo5eTHgCEti7MuUFGzzcWWvieHRAM VLxMe8Z+klomGJbUjxMff4Dkg2OtwUbJbPhK8G5xWS/nRKiNy7+lZ5JY8YZZR8UUhPas=;
DKIM-Signature: v=1; a=ed25519-sha256; q=dns/txt; c=relaxed/relaxed; d=crystalorb.net; s=omegamail; h=Content-Type:MIME-Version:References: In-Reply-To:Message-ID:Date:Subject:Cc:To:From:From:Sender:Reply-To:Subject: Date:Message-ID:To:Cc:MIME-Version:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=NPefJTBCmu24EXXItYP03bucsA+3xkbD2C4B4g44N9I=; b=wTz78lD8l1saIe/bZAXllZkSCF an4VZ+4MjXhfORiohriUC2Oqfx8+kfLzpT+VxiypYKfYrjqaacnKtVc5/0CQ==;
Received: from [2601:184:407f:80cf:19da:781e:46d4:6ce5] (helo=[192.168.15.242]) by crystalorb.net with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <daveoran@orandom.net>) id 1oubEV-00ExfS-Al; Mon, 14 Nov 2022 07:18:47 -0800
From: "David R. Oran" <daveoran@orandom.net>
To: Jens Finkhaeuser <jens@interpeer.io>
Cc: ICNRG <icnrg@irtf.org>
Date: Mon, 14 Nov 2022 10:20:24 -0500
X-Mailer: MailMate (1.14r5927)
Message-ID: <73E00979-061D-41FD-BCFB-4C041F47622B@orandom.net>
In-Reply-To: <044C4C1E-87B7-45D3-A5C6-F94A3657EDB5@orandom.net>
References: <-k8uPW5PEPBYD_TwxvsfIgxKhhv5DvtOiAVeef52DGc5QRzjQBAANyBXQ_CibQNHVHSEJOEyJBA0LSBusP9y6jS0xc-uCVQZrTqCEyz5H-0=@interpeer.io> <044C4C1E-87B7-45D3-A5C6-F94A3657EDB5@orandom.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=_MailMate_59A3A423-AE71-4B51-AB02-BB1CA4296B5B_="; micalg="pgp-sha512"; protocol="application/pgp-signature"
X-SA-Exim-Connect-IP: 2601:184:407f:80cf:19da:781e:46d4:6ce5
X-SA-Exim-Mail-From: daveoran@orandom.net
X-SA-Exim-Scanned: No (on crystalorb.net); SAEximRunCond expanded to false
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/stuEd28w5l5zHFJw1AHNBcTTvS8>
Subject: Re: [icnrg] Vessel Container Format
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Nov 2022 15:20:33 -0000

Continuing on this theme folks may find this Hotnets paper (being presented today) relevant:

[Global Content Revocation on the Internet: A Case Study in Technology Ecosystem Transformation](https://conferences.sigcomm.org/hotnets/2022/papers/hotnets22_galstyan.pdf)


On 10 Nov 2022, at 14:26, David R. Oran wrote:

> On 10 Nov 2022, at 4:14, Jens Finkhaeuser wrote:
>
>> Hi,
>>
>> after my presentation on Tuesday, one question was raised that I feel I did not respond to satisfactorily, which I would like to address now: why focus on deletion so much?
>>
>> There are two answers.
>>
>> 1.  It's the law. I am not a lawyer, of course, so the actual legal interpretation of such things remains to be seen. But I would doubt that when faced with someone legally requesting the deletion of PII, a judge would look kindly upon an answer that is effectively "I forgot I have it". The exact measure of "reasonable effort" is not up to me, but I think a slightly better answer than that is going to be required if such a thing is tested (I recall similar arguments surrounding the notion of legally copying IP-protected data).
>
> It’s in my view a fools errand to make a protocol design / architecture way more complicated and less resilient to pursue a property like deterministic deletion that cannot in practice be achieved.
>
> The law on this will eventually catch up, as it has in other similar areas, like how “fair use” restrictions used to prohibit caching of copyrighted video (in Germany), and forced “cloud DVR” systems to keep a physical copy of recorded content per-user and not de-duplicate (in the U.S.).
>
> The actual legal property that’s needed is to ensure that no system holding the physical bits also holds the decryption keys. This is quite hard, of course, but at least not completely infeasible as would be tracking down and blasting all the copies of the bits using secure erase (so they can’t be recovered from discarded media).
>
>> 2.  Relying on cryptography assumes everything working well, until the cryptographic solution fails, at which point all bets are off.
>
> That’s right. All bets are off if the cryptographic system fails. Not just deletion but many many things that are a lot more damaging. Of all the things to depend on, crypto is probably the least likely to have catastrophic failures. The failures we’ve seen have been primarily in the implementations, particularly of the key management. What leads anyone to believe that the implementations of deletion by secure erase would be any less susceptible to error?
>
>> But there are plenty on scenarios that are not that binary. Specifically, it is not guaranteed that a malicious party that comes into possession of a compromised key does so after already having received encrypted content blocks. In such a scenario, of course, deletion does nothing.
> Correct.
>
>>     But in a more opportunistic scenario where the malicious party requests content only as a result of having acquired a key, deletion can protect against leaking of sensitive data. Such mitigation also relies on a specific sequence of events (deletion to occur before requesting), but this sequence is far from improbable.
> If you can throw away the content, why can’t you throw away the key?
> While the fundamental problem is recursive (the keys are themselves data that needs to be deleted) dealing with keys is in many ways easier:
> - many fewer bits
> - held in secure enclaves that unless compromised by implementation errors, can expire keys in a timely fashion and require that they be refreshed.
> - depending on keys protects better against zombie failure modes where some cache or other repository goes offline for a long time (e.g. longer than the key lifetimes) and then comes back online way after the state you kept to enforce deletion has been itself thrown away.
>
> (Funny historical reference: on the 20 or 30th anniversary of the ITS timesharing system - I forget which - somebody booted up an old backup and emails that were in the send queue when it was shut down went out!).
>
> -
>>
>>
>> In summary, I consider it somewhat negligent not to include deletion as a first class problem into ICN solutions, but YMMV of course.
> I respectfully disagree. I do not think that rapid enough content deletion is in practice achievable and adds a non-trivial amount of complexity to the system which increases the probability of other more serious failure modes.
>
>>
>> At any rate, thank you very much for this feedback! At minimum, it's become clear that I need to stress these points in the draft.
>>
>> Jens
>
>> _______________________________________________
>> icnrg mailing list
>> icnrg@irtf.org
>> https://www.irtf.org/mailman/listinfo/icnrg
> DaveO
DaveO

DaveO