Re: [ietf-privacy] draft-cooper-ietf-privacy-requirements-00.txt

Eliot Lear <lear@cisco.com> Tue, 24 September 2013 13:04 UTC

Return-Path: <lear@cisco.com>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D7AB621F9767 for <ietf-privacy@ietfa.amsl.com>; Tue, 24 Sep 2013 06:04:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.488
X-Spam-Level:
X-Spam-Status: No, score=-110.488 tagged_above=-999 required=5 tests=[AWL=0.111, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BttrltU4g7Ul for <ietf-privacy@ietfa.amsl.com>; Tue, 24 Sep 2013 06:04:37 -0700 (PDT)
Received: from ams-iport-4.cisco.com (ams-iport-4.cisco.com [144.254.224.147]) by ietfa.amsl.com (Postfix) with ESMTP id DB22921F90DC for <ietf-privacy@ietf.org>; Tue, 24 Sep 2013 06:04:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2458; q=dns/txt; s=iport; t=1380027876; x=1381237476; h=message-id:date:from:mime-version:to:cc:subject: references:in-reply-to:content-transfer-encoding; bh=yUDAh/qjHrjJBmFJkx8TY1qkiJ/wRjGAYD7VYb4rKsw=; b=W5W85sO0IbzLoptgjJPQGAV5r0SdLDiO1B9m7BgyDg/7qJ5lYeRdj7Nx 6P7Jcmu3MqdebIcMqzb2XUTg3Tjcn+6L9p8c3CHJbdl+9DJRM7rmGvR9k uOqSTMUCKEPg66VUEOgl1UVMtSPdf25vK1hEwu+8kwv3g/spuwTEDeTHv A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AgoFAO+MQVKQ/khM/2dsb2JhbABaFoJxOIN7vSeBHxZ0giUBAQECAQEjTwYBBQsLGgIFFgsCAgkDAgECAUUGDQEHAQGHewYMqkGSQYEpjF6BSgeCaIE1A5d8kXeDJjo
X-IronPort-AV: E=Sophos;i="4.90,970,1371081600"; d="scan'208";a="18244143"
Received: from ams-core-3.cisco.com ([144.254.72.76]) by ams-iport-4.cisco.com with ESMTP; 24 Sep 2013 13:04:32 +0000
Received: from ams3-vpn-dhcp5264.cisco.com (ams3-vpn-dhcp5264.cisco.com [10.61.84.143]) by ams-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id r8OD4U3a012596 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 24 Sep 2013 13:04:30 GMT
Message-ID: <52418DE3.6040806@cisco.com>
Date: Tue, 24 Sep 2013 15:04:35 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:17.0) Gecko/20130801 Thunderbird/17.0.8
MIME-Version: 1.0
To: Robin Wilton <wilton@isoc.org>
References: <52416C71.9000903@cisco.com> <524170C2.4080306@cs.tcd.ie> <20F43E57-4FD2-44C6-9399-9CC26D1B7457@isoc.org>
In-Reply-To: <20F43E57-4FD2-44C6-9399-9CC26D1B7457@isoc.org>
X-Enigmail-Version: 1.5.2
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Cc: ietf-privacy@ietf.org
Subject: Re: [ietf-privacy] draft-cooper-ietf-privacy-requirements-00.txt
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-privacy>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Sep 2013 13:04:42 -0000

Hi Robin and Stephen,

On 9/24/13 1:31 PM, Robin Wilton wrote:

> I tend to Stephen's point of view here. Two parties cannot "bootstrap" a TLS session out of nothing. Even if the person on the client side apparently does nothing, at the time, to establish an encrypted rather than unencrypted session, there are pre-requisites that have to be in place (i.e. pre-arranged).

Although he may not recognize it, I support Stephen's point of view as
well. I just don't think the document he cited does ;-)

>
> This may seem like a nit-pick, but I have reasons for drawing attention to it, and TLS is a good 'case study'. What I've observed in PKI is that there's an inverse relationship between adoption volumes and the extent of functionality exposed to the user. Put bluntly, if you want PKI to scale, keep the user away from it.

While I have tended to agree (it's a bit of a corollary to what I argued
in Section 5.4.1 in RFC 6837)...

>  At one level, there are sound reasons for that: if you leave it up to users, few can be bothered to fiddle with security settings, so the technology goes unused. However, there are also risks: the more you insulate the user from the realities of securing online interaction, the less likely they are to care whether it's happening or not; and, of course, the less likely they are to know if it is not happening at all. 

Indeed.  Serge Egelman did some related research on this, involving a
popular mobile operating system.[1]
>
> So, I wanted to draw out this aspect because deployments in this area have to satisfy quite tricky, but implicit, requirements. Users need information that is reliable (a little padlock icon is not useful if it can easily be spoofed) and usable (too much detail scares users away; too little means they can't make informed decisions if necessary). This means we may have to design systems that *appear* opportunistic (such as establishing a TLS session with no apparent, explicit action on the part of the user) even though they may actually rely on a good deal of prior work to put the pre-reqs in place. 
>
> Bottom line: we probably need to think carefully about how we define "opportunistic".
>

And that's where I was heading.  Moreover, nobody should take their eyes
off the prize when it comes to authenticate encryption.  And that's why
the authors of RFC4432 didn't go there.

Eliot
[1] http://www.guanotronic.com/~serge/papers/soups12-android.pdf