Re: Requesting comments on draft-cheney-safe-02.txt

Rich Kulawiec <rsk@gsp.org> Fri, 07 August 2009 10:02 UTC

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n77A23iP053208 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 7 Aug 2009 03:02:04 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n77A23sR053207; Fri, 7 Aug 2009 03:02:03 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-smtp@mail.imc.org using -f
Received: from taos.firemountain.net (taos.firemountain.net [207.114.3.54]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n77A1vPE053185 for <ietf-smtp@imc.org>; Fri, 7 Aug 2009 03:02:00 -0700 (MST) (envelope-from rsk@gsp.org)
Received: from squonk.gsp.org (bltmd-207.114.25.206.dsl.charm.net [207.114.25.206]) by taos.firemountain.net (8.14.1/8.14.1) with ESMTP id n77A1tfK029690 for <ietf-smtp@imc.org>; Fri, 7 Aug 2009 06:01:56 -0400 (EDT)
Received: from avatar.gsp.org (avatar.gsp.org [192.168.0.11]) by squonk.gsp.org (8.14.1/8.14.1) with ESMTP id n779st8n013607 for <ietf-smtp@imc.org>; Fri, 7 Aug 2009 05:54:56 -0400 (EDT)
Received: from avatar.gsp.org (localhost [127.0.0.1]) by avatar.gsp.org (8.14.3/8.14.3/Debian-4) with ESMTP id n77A1n7l016694 for <ietf-smtp@imc.org>; Fri, 7 Aug 2009 06:01:50 -0400
Received: (from rsk@localhost) by avatar.gsp.org (8.14.3/8.14.3/Submit) id n77A1lvJ016691 for ietf-smtp@imc.org; Fri, 7 Aug 2009 06:01:47 -0400
Date: Fri, 07 Aug 2009 06:01:47 -0400
From: Rich Kulawiec <rsk@gsp.org>
To: ietf-smtp@imc.org
Subject: Re: Requesting comments on draft-cheney-safe-02.txt
Message-ID: <20090807100147.GA16131@gsp.org>
References: <f6fecbd18af7.4a721c99@us.army.mil> <4A720D35.1000306@cybernothing.org> <f6e091e580a6.4a7258af@us.army.mil>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <f6e091e580a6.4a7258af@us.army.mil>
User-Agent: Mutt/1.5.18 (2008-05-17)
Sender: owner-ietf-smtp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smtp/mail-archive/>
List-ID: <ietf-smtp.imc.org>
List-Unsubscribe: <mailto:ietf-smtp-request@imc.org?body=unsubscribe>

On Fri, Jul 31, 2009 at 02:36:31AM +0400, Cheney, Edward A SSG RES USAR USARC wrote:
> The idea is that security vulnerabilities on the internet occur
> most significantly as a result of client-side scripting from documents
> transmitted across HTTP.

Even we grant for the purpose of argument that these are the "most
significant", and I see no evidence that they are, these are not
Internet security vulnerabilities.

These are (a) web browser and (b) operating system vulnerabilities,
and are quite readily mitigated by making sensible choices about both.
Further mitigation is possible by using in-band filtering/blocking
(such as HTTP proxies which filter or block traffic) or by using
browser extensions (e.g., NoScript).  These are much simpler and directed
solutions that are available immediately, without any need for protocol
engineering.

If, on the other hand, poor choices of web browser and/or operating system
(or mail client, for that matter) are made, then it really doesn't matter
whether traffic moves via HTTP or SMTP or anything else: those systems
WILL be compromised.

---Rsk