Re: [IAB] IAB report to the community for IETF 103

Keith Moore <moore@network-heretics.com> Wed, 21 November 2018 13:56 UTC

Return-Path: <moore@network-heretics.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E44A12777C for <ietf@ietfa.amsl.com>; Wed, 21 Nov 2018 05:56:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=messagingengine.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k-fRPLmkgvDI for <ietf@ietfa.amsl.com>; Wed, 21 Nov 2018 05:56:55 -0800 (PST)
Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B69E9126CB6 for <ietf@ietf.org>; Wed, 21 Nov 2018 05:56:54 -0800 (PST)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id 6C7F022239; Wed, 21 Nov 2018 08:56:53 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163]) by compute6.internal (MEProxy); Wed, 21 Nov 2018 08:56:53 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm1; bh=65LHPRKFmwSSBKFlUaZ2MEldEc8QdStmNM1zG6yVJ XY=; b=lKK96FLcwZt8EVzfB5UC0q24ehK635XpKU2Va8NO1qogVmSwAcPmDqdGD +nbBZQ2ZHH1n0w6CnvzjKg1m07X0+OLeyiqpNRnd8Nd3Ctvjv4ShZ9zb0v/713FQ ukHqoYjvgk55nysPeI0nUtmHdTSGaAa+Zs2W5ETvOjYInTVm27GIbgD4EZ9KoUF0 33tsYe9LNBHc0YeMLUNQy7UBE3M7l19FTfuW/Gww5hNjtW5CvCfzci6rJfzsANSN rH53a8uE0A80K+WUfmVtMlat/2JFhhw7KXuhwIZvx6zVERBAXtceuvkRNuOPabgc F/3kEutpqwNEFpf0aDqis+fcXJFJw==
X-ME-Sender: <xms:JGT1W0MpKWnWFpDduN4Xb6aLzTFHz31P-j796HQhiH5Syy6V2Lbv9g>
X-ME-Proxy: <xmx:JGT1WwUywf_5fLRQ48743v_3Q61X0_PfnyY58Mrlxuf6JlLNHCDX-g> <xmx:JGT1W1XTQSxkfoHF37tyZAm6BmaDoY4olDgMJAC5SZuo-dyJRRLK1A> <xmx:JGT1W9SIBrK1ofwhdzsZ7ThnwQfsqAwqvCRXJ1BnP4iYsKQF_56lJg> <xmx:JGT1W3NQxewRKbP3awkw5po0EDgRvRdbrUDMOCiQXrzzOAvepz4D-A> <xmx:JGT1W5vVINUEkw_nKweIkEY-xFrQ5L_uS-A0MPjQoU7cZyxgmL_pXg> <xmx:JWT1W-zcyLLfzFnvm97N3J2h1ePGzMXjftpuG1b5SyubmR8Q9gDbaQ>
Received: from [29.64.130.248] (ip-66-87-152-248.nsvltn.spcsdns.net [66.87.152.248]) by mail.messagingengine.com (Postfix) with ESMTPA id 63C46102DD; Wed, 21 Nov 2018 08:56:52 -0500 (EST)
Content-Type: multipart/alternative; boundary="Apple-Mail-845A1C61-A91A-4ED7-9545-08009E0448D9"
Mime-Version: 1.0 (1.0)
Subject: Re: [IAB] IAB report to the community for IETF 103
From: Keith Moore <moore@network-heretics.com>
X-Mailer: iPhone Mail (15G77)
In-Reply-To: <CAPt1N1kc=saPbipLmnMsonzVgWQv5aQ3GDWSYCOZJA-6x+_aUQ@mail.gmail.com>
Date: Wed, 21 Nov 2018 08:53:59 -0500
Cc: ietf <ietf@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <119FFF2A-598E-4EE5-9E8B-75735A4AA788@network-heretics.com>
References: <CA+9kkMDEP-JKDwcwRMT7QUs-yQi+PsuKo22mFZxB6yKTEqTuSQ@mail.gmail.com> <6.2.5.6.2.20181111093128.0bd80f60@elandnews.com> <CA+9kkMAcJSixn2-S-OwK0tojyJLQZ=mrhr4NT7OM9+ji0vb=GA@mail.gmail.com> <3a90ee88-8801-45b7-5449-da59620c4576@network-heretics.com> <8911.1542633984@localhost> <5157400F-42D3-4F2B-BFE1-94D1E1B656E4@huitema.net> <49390263-2BE7-4EA1-B732-84AA9D873A83@nohats.ca> <396690372.6606044.1542761090230@mail.yahoo.com> <ac2cb94c-c155-d6fb-a321-f18ccd4f34e1@network-heretics.com> <CAPt1N1kc=saPbipLmnMsonzVgWQv5aQ3GDWSYCOZJA-6x+_aUQ@mail.gmail.com>
To: Ted Lemon <mellon@fugue.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/HqwcVJWuVTh5t-Gs6XZ1Uj-tpQE>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Nov 2018 13:56:57 -0000

Facilitating “eavesdropping “ is NEVER a valid use case.

Sent from my iPhone

> On Nov 21, 2018, at 8:47 AM, Ted Lemon <mellon@fugue.com> wrote:
> 
> I would suggest being more explicit:
> 
> TLS 1.3 [RFC8446] is intended to address the following use cases [cite use cases that do not include eavesdropping, and do include preventing eavesdropping and providing forward secrecy].
> 
> It has come to the attention of the IETF that ETSI has published a TLS 1.3 specification which addresses a different set of use cases [cite use cases].   We wish to point out that some of the use cases addressed by RFC8446 are not addressed by ETSI.   The ETSI specification should not be used in cases where addressing these use cases is required [give examples].   The IETF takes no position on whether the ETSI specification successfully addresses these use cases.   However, it definitely does not address the complete set of use cases addressed in RFC 8446.
> 
> Use of the TLS variant described in this ETSI specification was considered by the IETF and did not gain consensus.   As such, use of this variant is not recommended by the IETF.
> 
> I think publishing this as a very brief RFC would be quite appropriate.
> 
> 
>> On Wed, Nov 21, 2018 at 8:05 AM Keith Moore <moore@network-heretics.com> wrote:
>> On 11/20/18 7:44 PM, Lloyd Wood wrote:
>> 
>> >>> That belongs in the to be written RFC "ETSI extensions to TLS considered harmful".
>> >>> Of course, we may debate whether we want to publish such RFC.
>> >
>> > Perhaps a more general 'Security protocols designed by any other
>> > organisations considered harmful' is the way to go.
>> 
>> I doubt that such a direction would enhance our reputation or that of 
>> our documents.   I'd much rather see us make specific technical 
>> arguments, e.g.
>> 
>> - If an IETF RFC cites TLS x.y, that citation only applies to TLS x.y as 
>> published by IETF, not some other *TLS published by some other 
>> organization.   Just because something else is named *TLS doesn't mean 
>> it's secure or an acceptable substitute, especially when some of them 
>> have deliberately been made in such a way as to compromise the users' 
>> security.
>> 
>> - If one party to a connection discloses the information in the 
>> connection to a third party, whether by choice or to meet some 
>> organizational or legal requirement, that's their business and IETF 
>> isn't questioning that.  But intercepting the traffic at the IP layer is 
>> not a good way to implement such disclosures for several reasons - e.g. 
>> it effectively constrains the applications to only work over particular 
>> network segments, which harms the flexibility of the Internet as a 
>> general-purpose communications fabric; it discourages transparency and 
>> accountability that such record-keeping should require; etc.   (It's not 
>> the record-keeping that's being questioned; it's the very notion that 
>> packet interception is a suitable way to accomplish that.   Packet 
>> interception is a poor architectural choice, and yes that includes 
>> deep-inspecting firewalls and monitors.)
>> 
>> - For similar transparency arguments a communications protocol that is 
>> designed to effectively appear as TLS to the endpoints and/or its users, 
>> but which lacks the end-to-end confidentiality properties of TLS, should 
>> be discouraged by every means available.
>> 
>> - The introduction of TLS variants that are designed to leak private 
>> information seems likely to introduce yet another destructive tussle, as 
>> privacy-conscious users try to determine whether their hosts and 
>> applications are leaking their information, while the spooks try to 
>> evade such detection.   (Yes I'm aware that some such proposals provide 
>> explicit information to their endpoints.)
>> 
>> etc.
>> 
>> Keith
>> 
>>