Re: [new-work] WG Review: Messaging Layer Security (mls)

Paul Wouters <paul@nohats.ca> Mon, 14 May 2018 14:59 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFFB812E871; Mon, 14 May 2018 07:59:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GmTcuK7ZufiA; Mon, 14 May 2018 07:58:58 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [IPv6:2a03:6000:1004:1::68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4326F12E86C; Mon, 14 May 2018 07:58:58 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 40l3k73jFvz1x9; Mon, 14 May 2018 16:58:55 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1526309935; bh=JTFWRB9TuvTaj2rY33BuEnUKic9v6mmcUocib7QLb2Y=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=lMR/2gxB+EoM7uYnKY2Zna/7k+V28iezQajJv//iIWpVflgM4kOA1rBwdyuKqSzeg dfCToiBmqWo1tFYzKKjswzlIX+Ri2VpOtT3/U94SCgmdgEzAIouNCu27Ny94DSfSAW 9o8WdUXiowYs06/cXDWktt/PBw/ur/3K1aX3B5Vg=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id 5s-xZPLYHeR6; Mon, 14 May 2018 16:58:52 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Mon, 14 May 2018 16:58:51 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id 3DBC179AAD; Mon, 14 May 2018 10:58:50 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 bofh.nohats.ca 3DBC179AAD
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 2BDE0412EC4B; Mon, 14 May 2018 10:58:50 -0400 (EDT)
Date: Mon, 14 May 2018 10:58:50 -0400
From: Paul Wouters <paul@nohats.ca>
To: The IESG <iesg@ietf.org>, ietf@ietf.org
cc: new-work@ietf.org
Subject: Re: [new-work] WG Review: Messaging Layer Security (mls)
In-Reply-To: <152630665840.10130.3108627350220292581.idtracker@ietfa.amsl.com>
Message-ID: <alpine.LRH.2.21.1805141027170.22169@bofh.nohats.ca>
References: <152630665840.10130.3108627350220292581.idtracker@ietfa.amsl.com>
User-Agent: Alpine 2.21 (LRH 202 2017-01-01)
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/YV1PNtGP-Ymk8rw_N8PPxE-1kL0>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 May 2018 14:59:03 -0000

On Mon, 14 May 2018, The IESG wrote:

> A new IETF WG has been proposed in the Security Area. The IESG has not made
> any determination yet. The following draft charter was submitted, and is
> provided for informational purposes only. Please send your comments to the
> IESG mailing list (iesg@ietf.org) by 2018-05-23.

I have very mixed feelings on this.

This area has been and will be dominated by big players who have a strong
commercial interest at keeping their users seperated from everyone elses
messaging system. A universal encryption message layer would not serve
many people and would be trivial to block by the transport layer provider.

In fact, that is why OTR (https://otr.cypherpunks.ca) was created. To
create something that the uses existing message layers as a transport
protocol. This allows an opensource chat client implementing multiple
protocols to have one implementation of the message security subsystem
and use that on top of any (proprietary) transport protocol.

None of the listed goals on the proposed charter are unsolved problems,
and by resolving these items again in another format won't improve the
standarization.

> Several widely-deployed applications have developed their own
> protocols to meet these needs. While these protocols are similar,
> no two are close enough to interoperate. As a result, each application
> vendor has had to maintain their own protocol stack and independently
> build trust in the quality of the protocol. The primary goal of this
> working group is to develop a standard messaging security protocol
> so that applications can share code, and so that there can be shared
> validation of the protocol (as there has been with TLS 1.3).

This assumes those vendors would actually want this. I strongly doubt
that. Also, there are basically only two real protocols for this work
currently deployed. OTRv3 and its derivative Signal. An OTRv4 (non-ietf)
spec has recently been published for peer review.

The Signal protocol has seen very wide adoption, yet it is completely
run on isolated islands with zero federation and mandatory identity
binding to a telephone number. I don't see this changing when the IETF
tries to involve itself here.

> It is not a goal of this group to enable interoperability/federation
> between messaging applications beyond the key establishment,
> authentication, and confidentiality services.  Full interoperability
> would require alignment at many different layers beyond security

So it will not add much to the existing OTR or Signal protocols, and the
real question is why don't we build on top of Signal or OTRv4?

We have seen a number of efforts to block inline encryption. For example
when you could still run XMPP with Facebook and you used an OTR plugin,
Facebook would drop the messages preventing end-to-end encryption.
Google also never tried to be more helpful when you used OTR over gtalk
and had a gmail browser window open (thus had multiple identities online
of which one could not speak OTR). Why would these players be nice to MLS?

Furthermore, large deployments that used to be based on XMPP are moving
from open to closed standards to prevent third party clients (and their
end to end encryption plugins). They won't accomodate or even support
MLS.

Meanwhile, there is a protocol war between iMessage and Android/RCS. The
result is that we have end to end encryption on one major phone vendor that
refuses to interop with other vendors, and the other major vendor trying
to punt this to the Telecom organisations which are all encumbered by
Lawful Interception requirements. So RCS will never see end-to-end
encryption.

I don't think there will be much harm from the IETF pursuing this goal,
but I don't think anything useful will come out of this either.

If the IETF does want to try and standarize this space, I think it must
really encode its message layer in a similar way to OTR, as the transports
between users that run through third party servers will simply never allow
passing any kind of binary data. However, such a goal comes dangerously
close to intentionally subverting the transport layer in a way that the
IETF normally does not engage in.

Within all these constrains, what can MLS really over that OTRv4 or
Signal does not offer already? And how will adding a third player
improve this space? Did the IETF engage the Signal or OTR communities
on how to consolidate this space into one protocol ?

With these considerations, I am neither opposed nor in favour of this
work being done at the IETF, with a slight preference of all of us
instead working in areas where we can make a difference.

Paul