Re: IAB statement on draft-farrell-perpass-attack-00

SM <sm@resistor.net> Wed, 27 November 2013 19:04 UTC

Return-Path: <sm@resistor.net>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84FD81ADFF5 for <ietf@ietfa.amsl.com>; Wed, 27 Nov 2013 11:04:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 02yl29anvPiI for <ietf@ietfa.amsl.com>; Wed, 27 Nov 2013 11:04:31 -0800 (PST)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id E7AB81AD72A for <ietf@ietf.org>; Wed, 27 Nov 2013 11:04:30 -0800 (PST)
Received: from SUBMAN.resistor.net (IDENT:sm@localhost [127.0.0.1]) (authenticated bits=0) by mx.elandsys.com (8.14.5/8.14.5) with ESMTP id rARJ4PFP020412 for <ietf@ietf.org>; Wed, 27 Nov 2013 11:04:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1385579070; bh=Z1XcUnCm4GMCs5kgGtJxLSYLcaVl4WpiOa3AViiO468=; h=Date:To:From:Subject:In-Reply-To:References; b=e0ba6ZPOA+sQSr12XJM5qk/yvTzjOw65ARqfP2dbFuuGPsYLdKzzRkTxTK4QHzi4b FvL5ys6m1kGnca/692Xthe/TmMwNBkC8+J2fHx7moLYSz+yVL0NL3tN4uFN+W/ryI8 IkJqB2PqgkyuzpXk+25xLrl+bnEbyQDtQRpPXX6U=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=resistor.net; s=mail; t=1385579070; i=@resistor.net; bh=Z1XcUnCm4GMCs5kgGtJxLSYLcaVl4WpiOa3AViiO468=; h=Date:To:From:Subject:In-Reply-To:References; b=RstjvuVA8xxqfQc5nIzJLpXsA17hCppjG7wIVJtFpezSeaDResd+sZ6ktNSdV1UVK AfhCLYCdYWkCAqW0jizM5dyimvDZYmAbm42CDmP+3xCBtk2Hwri4GBuRTitMr3kudq wGGs7FWgrxwsAkIXkYEGWNciqbW6xgEsk4NjPM7A=
Message-Id: <6.2.5.6.2.20131127084710.0dd761c0@resistor.net>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Wed, 27 Nov 2013 10:56:53 -0800
To: ietf@ietf.org
From: SM <sm@resistor.net>
Subject: Re: IAB statement on draft-farrell-perpass-attack-00
In-Reply-To: <E2DA1477-C86E-441E-A33D-D47A0D67AFF3@iab.org>
References: <E2DA1477-C86E-441E-A33D-D47A0D67AFF3@iab.org>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Nov 2013 19:04:33 -0000

At 08:13 27-11-2013, IAB Chair wrote:
>At the Vancouver IETF meeting, the IAB held a technical plenary that 
>discussed pervasive monitoring.  The IAB believes that pervasive 
>monitoring represents an attack on the

The minutes for that plenary is not available at the moment.  I would 
appreciate if the minutes could be published.

>  Internet in as much as large amounts of information that is 
> intended to be confidential between sets of individuals is in fact 
> gathered and aggregated by third parties.  Such a broad scale 
> attack can undermine confidence in the infrastructure, no matter 
> the intent of those collecting the information.
>
>draft-farrell-perpass-attack-00 is intended to establish an IETF 
>community consensus on this matter.  We encourage the community to 
>read and engage in discussion about this draft, and also to take 
>practical measures to limit pervasive monitoring within their environments.

In Section 1:

   "that should be mitigated where possible via the design of protocols
    that make pervasive monitoring significantly more expensive or
    infeasible"

That sounds like an arms race [1].

   "A fuller problem statement with more examples and description can be
   found in [ProblemStatement]"

That document is not available.

   "In particular, the term, when used technically, implies nothing about
    the motivation of the bad-actor mounting the attack, who is still
    called a bad-actor no matter what one really thinks about their
    motivation."

The usual term in the IETF is "adversary" and not "bad-actor".  "bad 
actor" is sometimes defined as "contentious individual".

The Security Considerations section that the intended BCP is all 
about privacy.  The Introduction section mentions "illegal purposes 
by criminals".  I would describe the problem as having different 
angles; bad people could capture the information being exchanged and 
use it for nefarious purposes, nation states [2] can capture the 
information and use it to find out what the people are discussing.

The draft is well-written.  Given the catchy title I am left to 
wonder which parts of the document is polite fiction (a social 
scenario in which all participants are aware of a truth, but pretend 
to believe in some alternative version of events to avoid conflict or 
embarrassment).  In very simplistic terms the draft says:

   "consensus to design protocols so as to mitigate the attack, where
    possible."

Quoting  Martin Thomson: we trusted you; we were naive; never again.

Regards,
-sm

1. the continuing competitive attempt by two or more nations each to 
have available to it more and more powerful weapons than the other(s).

2. 
http://ir.elbitsystems.com/phoenix.zhtml?c=61849&p=irol-newsArticle&ID=1810121&highlight=