Re: [ietf-privacy] [saag] Fwd: WGLC for draft-ietf-tzdist-service-05

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Mon, 02 February 2015 16:32 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B4AFD1A6FF0; Mon, 2 Feb 2015 08:32:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.001
X-Spam-Level:
X-Spam-Status: No, score=-0.001 tagged_above=-999 required=5 tests=[BAYES_20=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VIjVEwNU9ukP; Mon, 2 Feb 2015 08:32:20 -0800 (PST)
Received: from che.mayfirst.org (che.mayfirst.org [209.234.253.108]) by ietfa.amsl.com (Postfix) with ESMTP id BD4E01A1B43; Mon, 2 Feb 2015 08:32:20 -0800 (PST)
Received: from fifthhorseman.net (unknown [38.109.115.130]) by che.mayfirst.org (Postfix) with ESMTPSA id CC99CF984; Mon, 2 Feb 2015 11:32:17 -0500 (EST)
Received: by fifthhorseman.net (Postfix, from userid 1000) id CDF6420222; Mon, 2 Feb 2015 11:32:15 -0500 (EST)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: Eliot Lear <lear@cisco.com>, Daniel Migault <mglt.ietf@gmail.com>, saag@ietf.org, ietf-privacy@ietf.org
In-Reply-To: <54CCC5BA.9090101@cisco.com>
References: <CADZyTkkLu6qQ9LCqDkTHA9o+-YVvQuaUp33kqkAt=PRaQS-Jew@mail.gmail.com> <CADZyTkkCrvTam_ba7Tq6A-cHAVZn+ktKqwWsr_PNQaz2jyTkUQ@mail.gmail.com> <874mr9aucv.fsf@alice.fifthhorseman.net> <54CCC5BA.9090101@cisco.com>
User-Agent: Notmuch/0.18.2 (http://notmuchmail.org) Emacs/24.4.1 (x86_64-pc-linux-gnu)
Date: Mon, 02 Feb 2015 11:32:15 -0500
Message-ID: <877fw0gtps.fsf@alice.fifthhorseman.net>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf-privacy/aDz31_yrpWIOCXX1_FyTqawtCHE>
Cc: Time Zone Data Distribution Service <tzdist@ietf.org>
Subject: Re: [ietf-privacy] [saag] Fwd: WGLC for draft-ietf-tzdist-service-05
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-privacy/>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Feb 2015 16:32:23 -0000

Hi Eliot--

thanks for the feedback.

On Sat 2015-01-31 07:08:26 -0500, Eliot Lear wrote:

> I think there are several categories of issues that you've raised, and
> I'd like to break them out.  The first is the easy category: that which
> has been raised before and considered.  There is only one issue in that
> category as to whether or not everything should run atop TLS.  That
> issue need not be reconsidered, EXCEPT in as much as you have clarified
> the context (c2s versus s2s).

Clarifying the c2s vs. s2s scenarios for TLS would definitely be useful.

> There is another category of that which really must change.  Most (if
> not all) of what you mark as security is in this category.  The
> downgrade attack that is possible in the current text also does not
> match my understanding of the consensus of the working group.  That is-
> either a client uses HTTP or it uses HTTPS, but it may not "try" HTTPS
> first, and then back off to HTTP.  "Do.  Do not.  There is no try."

If we can spell this out explicitly in the draft, that would be good.  I
wonder if this is maybe something that would contribute to the idea of
"profiles of operation".  If there is a profile for low-power,
in-network devices, that profile could allow HTTP access, restricting
fetches from the local network's tzdist provider, and accept the
linkability implications (and the resulting lack of privacy for the
device).

This would suggest a second profile for other devices: those that have
higher bandwidth available, more compute power, and should not be
willing to make the linkability/privacy tradeoff in the same way.

Is there a third profile, some sort of device, service, or operating
system that fits in the middle here?  Naming the profiles explicitly and
being clear which features of the spec are intended for which profile
might make the privacy considerations easier to write.

It might also turn out that there are features that fit in no realistic
profile, and can therefore be dropped to simplify the spec.

> The other issues break down into two groups, I think.  Authenticated
> sessions versus unauthenticated sessions.  Because authentication is
> allowed, and because we do not specify a provisioning mechanism, likely
> there will be linkage between services.  But we should also be mindful
> of what mitigations are truly available to us with regard to the other
> functions.

Authenticated sessions clearly provide linkability between repeat
sessions of the same client to the server.  Depending on other choices
made by the network configurations involved (e.g. the use of stable TLS
session IDs, or padding/timeskew choices), those sessions may
*also* leak some linkable information to a passive network attacker (i
haven't yet considered an active network attacker whose goal is to link
sessions).

But unauthenticated sessions are not necessarily unlinkable, either to
the Provider, or to a network observer.  If the goal is unlinkability,
unauthenticated sessions are probably necessary but not sufficient.
It's important that the draft be clear about this.

          --dkg