Re: [ietf-privacy] "Opportunistic encryption" and a need for a definition

Stephen Farrell <stephen.farrell@cs.tcd.ie> Tue, 19 November 2013 10:04 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A93801AD943 for <ietf-privacy@ietfa.amsl.com>; Tue, 19 Nov 2013 02:04:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.425
X-Spam-Level:
X-Spam-Status: No, score=-2.425 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.525] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Tc3utOQC_-g for <ietf-privacy@ietfa.amsl.com>; Tue, 19 Nov 2013 02:04:07 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id 35E751AD8F6 for <ietf-privacy@ietf.org>; Tue, 19 Nov 2013 02:04:07 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id B5F3ABE5C; Tue, 19 Nov 2013 10:04:00 +0000 (GMT)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lfnwO7sFk7MG; Tue, 19 Nov 2013 10:04:00 +0000 (GMT)
Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 85FD0BE5B; Tue, 19 Nov 2013 10:04:00 +0000 (GMT)
Message-ID: <528B3790.2020302@cs.tcd.ie>
Date: Tue, 19 Nov 2013 10:04:00 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.1.0
MIME-Version: 1.0
To: Stephane Bortzmeyer <bortzmeyer@nic.fr>, Eliot Lear <lear@cisco.com>
References: <20131119093343.GA9282@nic.fr> <528B31B4.5050005@cisco.com> <20131119094626.GA11078@nic.fr>
In-Reply-To: <20131119094626.GA11078@nic.fr>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: ietf-privacy@ietf.org
Subject: Re: [ietf-privacy] "Opportunistic encryption" and a need for a definition
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-privacy/>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Nov 2013 10:04:09 -0000

Hiya,

On 11/19/2013 09:46 AM, Stephane Bortzmeyer wrote:
> On Tue, Nov 19, 2013 at 10:39:00AM +0100,
>  Eliot Lear <lear@cisco.com> wrote 
>  a message of 55 lines which said:
> 
>> in fact there are several different forms.
> 
> I find three:
> 
> 1) Encryption without a peer-specific arrangement. This is the meaning
> used in RFC 4322. Can be safe.

So I (1) that to mean that there's a not-so-secure way to
validate that the right key for a peer is being used, in
4322 via DNS without DNSSEC. Adding DNSSEC gets you beyond
OE I'd say.

> 2) Encryption without authentication. This is the meaning used in RFC
> 5386. Safe only against a purely passive attacker.
> 
> 3) Encryption with a fallback to unencrypted mode. This is the
> Wikipedia definition. Certainly unsafe.
> 
> draft-cooper-ietf-privacy-requirements-01 mixes 1) and 2)

That's a fair comment. Since the draft is calling for a minimum
I think (2) is more appropriate for now since there will be some
places where its not feasible to get (1).

When we push out another rev, we'll make that clear, specific
text suggestions are welcome too of course.

>> As such, it's a good opportunity for an informational document.
> 
> Volunteers are welcome to start from the list above :-)

Actually, I'd like (if possible) to go a bit further than
simply definitions, I think the info document we want is
a "HOWTO pimp my protocol with OE" spec, but for that to
be done well, I think we need an author or two who's recently
e.g. implemented ECDH in protocols. I've asked someone but
they're busy, if you know someone who could do that then
either twist their arm yourself or point me at 'em. (Or if
that describes you, then either write something or get in
touch with me.) Trying to get an implementer like that does
make it a bit harder to get started, but if the resulting
RFC is to be really useful, I think it'll need to be fairly
high quality since it could end up being used in lots of
protocols, probably via ^C^V, so getting it right will be
more important than usual perhaps.

Cheers,
S.




> _______________________________________________
> ietf-privacy mailing list
> ietf-privacy@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf-privacy
> 
>