RE: Last Call: <draft-farrell-perpass-attack-02.txt> (Pervasive Monitoring is an Attack) to Best Current Practice

<l.wood@surrey.ac.uk> Wed, 01 January 2014 23:07 UTC

Return-Path: <l.wood@surrey.ac.uk>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A968B1ADF6E for <ietf@ietfa.amsl.com>; Wed, 1 Jan 2014 15:07:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.701
X-Spam-Level:
X-Spam-Status: No, score=-0.701 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ay9l-p2aGp-V for <ietf@ietfa.amsl.com>; Wed, 1 Jan 2014 15:07:56 -0800 (PST)
Received: from mail1.bemta3.messagelabs.com (mail1.bemta3.messagelabs.com [195.245.230.164]) by ietfa.amsl.com (Postfix) with ESMTP id 88BE21ADF70 for <ietf@ietf.org>; Wed, 1 Jan 2014 15:07:55 -0800 (PST)
Received: from [195.245.230.131:28372] by server-4.bemta-3.messagelabs.com id 82/1B-10414-3CF94C25; Wed, 01 Jan 2014 23:07:47 +0000
X-Env-Sender: l.wood@surrey.ac.uk
X-Msg-Ref: server-6.tower-78.messagelabs.com!1388617667!32506948!1
X-Originating-IP: [131.227.200.39]
X-StarScan-Received:
X-StarScan-Version: 6.9.16; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 27743 invoked from network); 1 Jan 2014 23:07:47 -0000
Received: from exht012p.surrey.ac.uk (HELO EXHT012P.surrey.ac.uk) (131.227.200.39) by server-6.tower-78.messagelabs.com with AES128-SHA encrypted SMTP; 1 Jan 2014 23:07:47 -0000
Received: from EXMB01CMS.surrey.ac.uk ([169.254.1.22]) by EXHT012P.surrey.ac.uk ([131.227.200.39]) with mapi; Wed, 1 Jan 2014 23:07:46 +0000
From: l.wood@surrey.ac.uk
To: tbray@textuality.com, lear@lear.ch
Date: Wed, 01 Jan 2014 23:07:45 +0000
Subject: RE: Last Call: <draft-farrell-perpass-attack-02.txt> (Pervasive Monitoring is an Attack) to Best Current Practice
Thread-Topic: Last Call: <draft-farrell-perpass-attack-02.txt> (Pervasive Monitoring is an Attack) to Best Current Practice
Thread-Index: Ac8HI+lxCEO6bffLSsCUvOXjAB35OwAHaVks
Message-ID: <290E20B455C66743BE178C5C84F1240847E51037C8@EXMB01CMS.surrey.ac.uk>
References: <20131203174852.21387.26099.idtracker@ietfa.amsl.com> <A3B306E3-846C-45BA-8ED9-13B96AA645A3@piuha.net> <002501cef266$b0b8a540$4001a8c0@gateway.2wire.net> <52A23B16.4060306@gmail.com> <CC5864F92767060505B97E0A@JcK-HP8200.jck.com> <52A8D6C4.2050006@cs.tcd.ie> <55026AF53DB6CBD3D29B2040@JcK-HP8200.jck.com> <52C35FFD.607@dcrocker.net> <00cb01cf06dc$c6d7d8c0$54878a40$@riw.us> <m2ob3vpoji.wl%randy@psg.com>, <CAHBU6iuyMiLcRNS1Oc0xkZ=Rd2WoquE9b8fxexvO3QyJub26nQ@mail.gmail.com>
In-Reply-To: <CAHBU6iuyMiLcRNS1Oc0xkZ=Rd2WoquE9b8fxexvO3QyJub26nQ@mail.gmail.com>
Accept-Language: en-US, en-GB
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US, en-GB
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jan 2014 23:07:59 -0000

Actually, no, similar holdups do not occur for concerns of error-handling. Examples:

in DTNRG (which, though IRTF, is highly relevant, being chaired as it is by the now security AD):
- LTP was developed with no error detection: RFC5326. Managed to get some shoehorned in at
the last moment in the NULL bits of RFC5237, but that was not a holdup.
- the bundle protocol was developed with no error detection, and no following of the
end-to-end principle. That took ten years or so, a lot of researchers, a national space agency...

but in DTNRG, security was paramount in the design (and focused on by the chairs). Those are the results.
The judgement calls come down in favour of security concerns above all else.

In the IETF:
RFCs 6935 and 6936, which relax the endpoint payload and pseudoheader check by
allowing zero checksums in IPv6, because tunnelled payloads with their own checks 
just don't need it. (That other applications do because IPv6 itself is lax on
reliability checks, has no header-only check and the closest it would get to an endpoint
header check would be UDP-lite, and the applications can be polluted by mis-arriving
errored  zero-checksum UDP packets, is neither here nor there. This is arguably the
predictable outcome of some poor design decisions in IPv6 twenty years ago.)

I'd welcome counterexamples where errors forced a holdup and rethink. I know of none.

We're heading into a world where security is paramount, and the only reason we have
any reliability in protocols at all is as a sideeffect of the security rejecting perceived attacks,
and not because we actually know how to design error-rejecting protocols. (How many
people here could design a CRC? How many design secure systems?)

There will be no further internet engineering (which, given that 6935/6936 are
proposed standards, never mind the horse-designed-by-committee IPv6 camel,
may actually not be a bad thing); any internet engineering done, or any
reliability obtained in implementations, will just be an unintended sideeffect
of security as a discipline.

Lloyd Wood
http://about.me/lloydwood

http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf
________________________________________
From: Tim Bray [tbray@textuality.com]

> There are very few (any?) absolutes in any of the protocols we build, just a wealth
> of often-conflicting design criteria, which force us to trade off and make judgment calls.
>  draft-perpass-attack says that mitigation of pervasive surveillance should be seen as
> one of the design criteria, and it’s not OK to ignore it. A reasonable take is that a specification
> could be held up if there are plausible arguments that this criterion has not been given appropriate
> consideration, and I see nothing wrong with that. Similar hold-ups regularly occur when there are
> concerns that there hasn’t been appropriate consideration for efficiency or error-handling or, well, lots of other criteria.