Re: [IAB] IAB report to the community for IETF 103

Ted Lemon <mellon@fugue.com> Wed, 21 November 2018 13:48 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18B8612777C for <ietf@ietfa.amsl.com>; Wed, 21 Nov 2018 05:48:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t75zinUcJVQt for <ietf@ietfa.amsl.com>; Wed, 21 Nov 2018 05:48:18 -0800 (PST)
Received: from mail-qt1-x834.google.com (mail-qt1-x834.google.com [IPv6:2607:f8b0:4864:20::834]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BFBE8126CB6 for <ietf@ietf.org>; Wed, 21 Nov 2018 05:48:17 -0800 (PST)
Received: by mail-qt1-x834.google.com with SMTP id k12so3831933qtf.7 for <ietf@ietf.org>; Wed, 21 Nov 2018 05:48:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=J8tZ7HfPyZwxxE0/IhyEZS1G5gjOpL6aQprPMPzZMm0=; b=Tue122ptNTlPqhGNm8YalsG4rYS0t0kG0chrGcv37NN9HXUghU87yjtXTrUQjCsCcy nmoV4yjLYcEYLwQj8r18ZSsowgtJTokYMCzULKJEVVMC+iN7mUFzvFVxHpaqqmTYzlyI WWdQlG3W6R99aHtE4Kleme0Lvx7/1F4s5t7q0uMZRs+bvEoYFK9U3zAnKJMuByGTfvBZ FDvxHK9oPPEBkZHIO1Nhw8UjAm7tSM4jdS6eDDJA30b/vzoncE0zqu206LKS1+Xa7min mV2vxh5nK+1z7sVs7vtU3m+SbIgBvdbC0WgnU4Asn6raA0lEo8G9wMUhjrj0AY3vmzEH xRpA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=J8tZ7HfPyZwxxE0/IhyEZS1G5gjOpL6aQprPMPzZMm0=; b=e3nM7zq1WbTiIGPsrLuy8G44VzCYh5KFV1Xg+yOZUIJ4UKgpdsD4RuYXgfrm5B9SKA SGXsIJnRWtBX8h3eNN/2Xs4OrgPpCcOh3V/i0aDR9M8/M3IcczwezBbf6Y/XV70+C4fp 9Wj/eWBi2i2XpbLK+OGfGu67nNlRinc9smWxEBhkY0DVbWnOv44BEh9CIawzI5xdHnjx z++N8hyOxeRxYrUMGphGJ0rjK6kL/ecWzYHxkAjk9fu79WEv3PyPXaU1Qdc8H/7KmV53 0pQzwRwoYdaToytuTXaXoaZXiOCPXuQ9f8MSVPz13lq87Mdj5CNbC8LrZsc77yEy72PQ hnJA==
X-Gm-Message-State: AGRZ1gIl5QWQULfUzomoBdNVzw/m3ZDilDBsWSIfwMatC+A4Q9rlAlqt Rtem1aHNXUk1+gzNKcYz3QhCNW0RgIWZYzV4lqxksO15g2E=
X-Google-Smtp-Source: AJdET5fQ71qkGpkDVDMKpg90MLzYcMxgTVCluvTujL/A+t8dVRpqH3NAdcIwEKlfT2l1izwybY85RKSBmlw9U6cuF6Q=
X-Received: by 2002:ac8:18fa:: with SMTP id o55mr6113336qtk.256.1542808096823; Wed, 21 Nov 2018 05:48:16 -0800 (PST)
MIME-Version: 1.0
References: <CA+9kkMDEP-JKDwcwRMT7QUs-yQi+PsuKo22mFZxB6yKTEqTuSQ@mail.gmail.com> <6.2.5.6.2.20181111093128.0bd80f60@elandnews.com> <CA+9kkMAcJSixn2-S-OwK0tojyJLQZ=mrhr4NT7OM9+ji0vb=GA@mail.gmail.com> <3a90ee88-8801-45b7-5449-da59620c4576@network-heretics.com> <8911.1542633984@localhost> <5157400F-42D3-4F2B-BFE1-94D1E1B656E4@huitema.net> <49390263-2BE7-4EA1-B732-84AA9D873A83@nohats.ca> <396690372.6606044.1542761090230@mail.yahoo.com> <ac2cb94c-c155-d6fb-a321-f18ccd4f34e1@network-heretics.com>
In-Reply-To: <ac2cb94c-c155-d6fb-a321-f18ccd4f34e1@network-heretics.com>
From: Ted Lemon <mellon@fugue.com>
Date: Wed, 21 Nov 2018 08:47:40 -0500
Message-ID: <CAPt1N1kc=saPbipLmnMsonzVgWQv5aQ3GDWSYCOZJA-6x+_aUQ@mail.gmail.com>
Subject: Re: [IAB] IAB report to the community for IETF 103
To: moore@network-heretics.com
Cc: ietf <ietf@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000917718057b2d00ac"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/QWr-netd1F95AeieF5UAb9zFLSY>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Nov 2018 13:48:21 -0000

I would suggest being more explicit:

TLS 1.3 [RFC8446] is intended to address the following use cases [cite use
cases that do not include eavesdropping, and do include preventing
eavesdropping and providing forward secrecy].

It has come to the attention of the IETF that ETSI has published a TLS 1.3
specification which addresses a different set of use cases [cite use
cases].   We wish to point out that some of the use cases addressed by
RFC8446 are not addressed by ETSI.   The ETSI specification should not be
used in cases where addressing these use cases is required [give
examples].   The IETF takes no position on whether the ETSI specification
successfully addresses these use cases.   However, it definitely does not
address the complete set of use cases addressed in RFC 8446.

Use of the TLS variant described in this ETSI specification was considered
by the IETF and did not gain consensus.   As such, use of this variant is
not recommended by the IETF.

I think publishing this as a very brief RFC would be quite appropriate.


On Wed, Nov 21, 2018 at 8:05 AM Keith Moore <moore@network-heretics.com>
wrote:

> On 11/20/18 7:44 PM, Lloyd Wood wrote:
>
> >>> That belongs in the to be written RFC "ETSI extensions to TLS
> considered harmful".
> >>> Of course, we may debate whether we want to publish such RFC.
> >
> > Perhaps a more general 'Security protocols designed by any other
> > organisations considered harmful' is the way to go.
>
> I doubt that such a direction would enhance our reputation or that of
> our documents.   I'd much rather see us make specific technical
> arguments, e.g.
>
> - If an IETF RFC cites TLS x.y, that citation only applies to TLS x.y as
> published by IETF, not some other *TLS published by some other
> organization.   Just because something else is named *TLS doesn't mean
> it's secure or an acceptable substitute, especially when some of them
> have deliberately been made in such a way as to compromise the users'
> security.
>
> - If one party to a connection discloses the information in the
> connection to a third party, whether by choice or to meet some
> organizational or legal requirement, that's their business and IETF
> isn't questioning that.  But intercepting the traffic at the IP layer is
> not a good way to implement such disclosures for several reasons - e.g.
> it effectively constrains the applications to only work over particular
> network segments, which harms the flexibility of the Internet as a
> general-purpose communications fabric; it discourages transparency and
> accountability that such record-keeping should require; etc.   (It's not
> the record-keeping that's being questioned; it's the very notion that
> packet interception is a suitable way to accomplish that.   Packet
> interception is a poor architectural choice, and yes that includes
> deep-inspecting firewalls and monitors.)
>
> - For similar transparency arguments a communications protocol that is
> designed to effectively appear as TLS to the endpoints and/or its users,
> but which lacks the end-to-end confidentiality properties of TLS, should
> be discouraged by every means available.
>
> - The introduction of TLS variants that are designed to leak private
> information seems likely to introduce yet another destructive tussle, as
> privacy-conscious users try to determine whether their hosts and
> applications are leaking their information, while the spooks try to
> evade such detection.   (Yes I'm aware that some such proposals provide
> explicit information to their endpoints.)
>
> etc.
>
> Keith
>
>
>