Re: Last Call: Recognising RFC1984 as a BCP

Stewart Bryant <stbryant@cisco.com> Thu, 13 August 2015 14:48 UTC

Return-Path: <stbryant@cisco.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DF841A6EF1 for <ietf@ietfa.amsl.com>; Thu, 13 Aug 2015 07:48:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level:
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OVLKSCKYgxRY for <ietf@ietfa.amsl.com>; Thu, 13 Aug 2015 07:48:28 -0700 (PDT)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7263E1A3B9C for <ietf@ietf.org>; Thu, 13 Aug 2015 07:48:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9916; q=dns/txt; s=iport; t=1439477307; x=1440686907; h=reply-to:subject:references:to:cc:from:message-id:date: mime-version:in-reply-to; bh=i5TYtmeXB+mM9ukt11bIJdjIPMXYAJvGqmq2vWr73E8=; b=iVsoRwsywIrknNAGxtJ0RK43mbZMvS3vteWijp55ZdeAUp5cBsGGzqYg TrJvU+/QbpVcIfnhEKsNQm7VR+sFFgskHDb97sB5g1YJXYlF95Fb9l4io iNpC3czycLc6svq9EDZYdCQs5NPOMxpJIQs/BfnmwC1X5/WZ3Kqa5DET1 k=;
X-IronPort-AV: E=Sophos;i="5.15,670,1432598400"; d="scan'208,217";a="603117986"
Received: from aer-iport-nat.cisco.com (HELO aer-core-3.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Aug 2015 14:48:25 +0000
Received: from [64.103.106.119] (dhcp-bdlk10-data-vlan300-64-103-106-119.cisco.com [64.103.106.119]) by aer-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id t7DEmPnp007308; Thu, 13 Aug 2015 14:48:25 GMT
Subject: Re: Last Call: Recognising RFC1984 as a BCP
References: <20150810171306.11047.24159.idtracker@ietfa.amsl.com> <C4962381-2D30-471E-92B1-C282926CB140@vpnc.org> <935C93F4-687E-4A56-A768-704D5910068E@gbiv.com> <55C92069.5020500@gmail.com> <C70EF655-BC22-408F-8375-A26AE08251F5@gbiv.com> <55C97760.4060200@gmail.com> <EC68E240-296D-44F6-8241-00687D9D992D@gbiv.com> <55CBB2C5.1080808@cisco.com>
To: Eliot Lear <lear@cisco.com>
From: Stewart Bryant <stbryant@cisco.com>
Message-ID: <55CCAE38.3050105@cisco.com>
Date: Thu, 13 Aug 2015 15:48:24 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.1.0
MIME-Version: 1.0
In-Reply-To: <55CBB2C5.1080808@cisco.com>
Content-Type: multipart/alternative; boundary="------------030101030803080509020108"
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/cqHwgwX8vplae4Ah3ecotuIVDWY>
Cc: IETF <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: stbryant@cisco.com
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Aug 2015 14:48:30 -0000

Eliot's two quotes nicely illustrate the dilemma of perfect encryption.

As engineers we should aim to address this dilemma rather than
simply declare it impossible, and opt for data privacy at all costs.

We have a social responsibility to design an internet that is rugged
from attack, that is fit for use by law-abiding people but does not
provide an impregnable conduit for the use of people that seek to
harm us.

My concern is that by elevating the status of RFC1984 we fail to
acknowledge the dilemma, and do not set a goal of designing
technologies that allow the internet to be used to reliably and
safely carry information for the law abiding, but still provide
the ability for those that we trust to protect us from harm
to perform that task.

- Stewart

On 12/08/2015 21:55, Eliot Lear wrote:
> Hi,
>
> On 8/12/15 10:21 PM, Roy T. Fielding wrote:
>
>> I think you completely missed my point. The document says it is an 
>> opinion piece by the IAB and IESG. Everything in it is phrased as 
>> such to avoid pissing off the people in the IETF who believe the 
>> institution should not be playing politics. The result is fine in the 
>> context of an informational RFC. It is not fine for a BCP, even if 
>> that document is brought to the IESG with full consensus of all 
>> working groups. 
>
> This is not simply politics, although we cannot deny that there are 
> some.  But to put it only in those terms demonstrates a 
> misunderstanding of RFC 1984.  The document represents what was and 
> is, I believe, a strong consensus view that key escrow, key length 
> limitations, and export restrictions are technically harmful to 
> Internet users for all the reasons stated in the draft.  The points 
> made in the draft were technically indisputable then and are 
> indisputable now.  If we had to open up 1984 we simply wouldn't change 
> much, but we *would* make it a BCP. So why not just do so?
>
>> BTW, I think the choice of 1984 as an RFC number was atypically 
>> juvenile. I don't think anyone outside the echo-chamber has taken 
>> RFC1984 seriously, regardless of its status; instead, the opinions it 
>> described have been adopted because the alternatives it argues 
>> against are inherently stupid. ....Roy 
>
> That didn't stop governments from imposing export restrictions or 
> proposing key escrow and other bad ideas.  That we are here again now 
> is disheartening.
>
>  But I'll say one more thing about this: there is, I think, value in 
> delving into the substance of the law enforcement is raising. Today 
> there was an editorial by Cyrus Vance, Jr. amongst others in the New 
> York Times that called out Apple and Google on their approach.[1]  
> Last week there was an article in that same paper about how 
> wiretapping brought down a huge scam at Brazilian oil producer 
> Petrobras.[2]  Applying the sound logic of 1984 to these new examples 
> probably would be very helpful.  In addition, there have been massive 
> security failures involving escrowed keys. Highlighting that would 
> also be helpful.  All of these points would emphasize just how 
> timeless RFC 1984 truly is, and so should be recognized as a BCP.  
> Doing so may also facilitate a very much needed dialog between law 
> enforcement and the technical community.
>
> As to any process issues, we have the ability as a community to make 
> exceptions, if we believe a process exception is needed. Rough 
> consensus gives us that freedom.
>
> Eliot
>
> [1] 
> http://www.nytimes.com/2015/08/12/opinion/apple-google-when-phone-encryption-blocks-justice.html
> [2] 
> http://www.nytimes.com/2015/08/09/business/international/effects-of-petrobras-scandal-leave-brazilians-lamenting-a-lost-dream.html


-- 
For corporate legal information go to:

http://www.cisco.com/web/about/doing_business/legal/cri/index.html