Re: On-path attackers (Was: Re: Diversity and offensive terminology in RFCs)

Toerless Eckert <tte@cs.fau.de> Fri, 21 September 2018 14:42 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0ED5D130E7D for <ietf@ietfa.amsl.com>; Fri, 21 Sep 2018 07:42:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.95
X-Spam-Level:
X-Spam-Status: No, score=-3.95 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.25, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Sb9Nt1iAXw7E for <ietf@ietfa.amsl.com>; Fri, 21 Sep 2018 07:42:19 -0700 (PDT)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [131.188.34.40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F310E130DF9 for <ietf@ietf.org>; Fri, 21 Sep 2018 07:42:18 -0700 (PDT)
Received: from faui48e.informatik.uni-erlangen.de (faui48e.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:51]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id 284C954806E; Fri, 21 Sep 2018 16:42:13 +0200 (CEST)
Received: by faui48e.informatik.uni-erlangen.de (Postfix, from userid 10463) id 1B9534E1BD2; Fri, 21 Sep 2018 16:42:13 +0200 (CEST)
Date: Fri, 21 Sep 2018 16:42:13 +0200
From: Toerless Eckert <tte@cs.fau.de>
To: Donald Eastlake <d3e3e3@gmail.com>
Cc: IETF Discussion <ietf@ietf.org>
Subject: Re: On-path attackers (Was: Re: Diversity and offensive terminology in RFCs)
Message-ID: <20180921144212.uvg6cphwg7idlhvw@faui48e.informatik.uni-erlangen.de>
References: <cafa1282-ae6a-93de-ea4a-d100af28d8b8@digitaldissidents.org> <CAKHUCzxL8xgn2D2W9G=Qk=AXzyw4mmcqPii6GKBSiByRyxbq+Q@mail.gmail.com> <c755471a7f744fdd958759c6c5001147@exchange02.office.nic.se> <20180920170939.GA68853@isc.org> <968547d5-7e96-5c31-69a3-20456baccf1a@comcast.net> <8EF9ACE5-7D4C-4511-B9B0-FDAE121FF2B6@tzi.org> <20180920194622.GB69847@isc.org> <7DF0DC82-B40A-441F-BFB0-78490121E530@piuha.net> <CAHbuEH5pPGaEjx=r68DDBndsqMV_4jDmL95=8Lkdkabmz5Xa4w@mail.gmail.com> <CAF4+nEEWDM0jem7knoYDs9A5fM5M=_vbtSNOkLhi57_x2mq4+A@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CAF4+nEEWDM0jem7knoYDs9A5fM5M=_vbtSNOkLhi57_x2mq4+A@mail.gmail.com>
User-Agent: NeoMutt/20170113 (1.7.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/_29fyQrb5GlIjk3bBVtSAxxOuzE>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Sep 2018 14:42:22 -0000

Less is more. We already refer to such entities as "middlebox".

"middlebox attack", "middlebox intervention". 

Box is the new Man ?

Toerless

On Fri, Sep 21, 2018 at 09:48:39AM -0400, Donald Eastlake wrote:
> On Fri, Sep 21, 2018 at 9:17 AM Kathleen Moriarty
> <kathleen.moriarty.ietf@gmail.com> wrote:
> >
> > On Fri, Sep 21, 2018 at 2:12 AM Jari Arkko <jari.arkko@piuha.net> wrote:
> >>
> >> Evan, Carsten, John, Yoav,
> >>
> >> > On Thu, Sep 20, 2018 at 09:10:51PM +0200, Carsten Bormann wrote:
> >> >> The up-to-date term of art is ???middleperson attack???
> >> >
> >> > Perhaps "on-path attack".
> >>
> >> I agree.
> >>
> >> I have actually preferred the use of the "on-path attacker??? for a long time, for reasons not associated with this thread. While I have certainly used the term man-in-the-middle (and it is a widely understood term), for some reason I have found it imprecise. With ???on-path??? I can be accurate about the location of the attacker. It is also IMHO more nicely enhanced with additional qualifiers and variations:
> >>
> >> on-path attacker
> >> on-path active attacker
> >> on-path passive attacker (or eavesdropper)
> >> off-path attacker
> 
> I don't quite agree. The essence of X-in-the-middle, say between B and
> C, is that B and C end up only conversing with X. That is to say,
> there are no messages directly between B and C because the attacker is
> blocking them or because the attack causes B and C to be confused and
> only exchange messages with X even though B and C could directly
> exchange messages if they tried. "on-path" only implies ability to
> observe messages. "active" only implies that the attacker initiates
> messages or interferes with existing messages.
> 
> Thus all X-in-the-middle attackers are "on-path active attackers" but
> not all "on-path active attackers" are X-in-the-middle attackers. For
> example I do not consider an on-line active attacker that observes
> traffic and just inserts new messages to mess things up, for example a
> replay attacker, to be an X-in-the middle attacker.
> 
> Thanks,
> Donald
> 
> > This sounds like a good suggestion to me, a direct and to the point description.
> >
> > Thanks,
> > Kathleen
> >>
> >>
> >> The principle that should apply is the description of something in clearly understandable language, using the characteristics of that something. And adding gender to those characteristics is just technically wrong, as John points out below.
> >>
> >> (There may be some other common attacks that deserve a good term. Or maybe I just don???t know what the term is. E.g., what is the name of an attack where there???s a central server between users, and it is the server that misbehaves?)
> >>
> >> > As an
> >> > example, I've always found "man-in-the-middle" terminology
> >> > problematic, but at least as much because it implies human
> >> > intervention rather than something more automated as because of
> >> > gender.
> >>
> >> +1
> >>
> >> > I don???t think we are promoting inclusiveness by resorting to obscure mythology
> >>
> >> +1
> >>
> >> Jari
> >>
> >
> >
> > --
> >
> > Best regards,
> > Kathleen

-- 
---
tte@cs.fau.de