Re: @EXT: RE: United Nations report on Internet standards

Bron Gondwana <brong@fastmailteam.com> Fri, 03 April 2020 00:20 UTC

Return-Path: <brong@fastmailteam.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AF133A08F8 for <ietf@ietfa.amsl.com>; Thu, 2 Apr 2020 17:20:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.088
X-Spam-Level:
X-Spam-Status: No, score=-2.088 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fastmailteam.com header.b=aGrQK9Eg; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=U9NPBLtG
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dWOQyQTlV88e for <ietf@ietfa.amsl.com>; Thu, 2 Apr 2020 17:20:16 -0700 (PDT)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70FA53A0934 for <ietf@ietf.org>; Thu, 2 Apr 2020 17:19:52 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 7C66E5C02EC for <ietf@ietf.org>; Thu, 2 Apr 2020 20:19:51 -0400 (EDT)
Received: from imap7 ([10.202.2.57]) by compute1.internal (MEProxy); Thu, 02 Apr 2020 20:19:51 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= fastmailteam.com; h=mime-version:message-id:in-reply-to :references:date:from:to:subject:content-type; s=fm2; bh=D95p5Pb 755rlhwMSLtYPL4rDzKzfv3GDir5g2DhA12M=; b=aGrQK9EgUBLPwZQj39APT4u yPfyWgqlmJJJloVHHBT/SH/4nKOWW6MYhx7uju1iZ9e24Tlt6ovwu3jgGok3pHxd lhOcf8Kh/wQsgRlk/n8Tr8RF2QokyemDMv9zS0xXRmMzoMXbYVxeAsDVayNJGwYs yKb7vPfPnSMZb4bM6af8dhBMxj5B8PWUE6B32GqN5chVK8+8IqhvMxKWsDrwm3Bd 499UkpfB/ij8QqfYIjalGWTBf1S2TfMRuoik8V/fHHEEuGdqYlDevWZOeONYgK01 ILSP+J8nUPFVY4udyX+MnG9s/GR5d5jmrT3Ce70Zqbsrf3Z6ge3cbDCya3+6HSg= =
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=D95p5P b755rlhwMSLtYPL4rDzKzfv3GDir5g2DhA12M=; b=U9NPBLtGvn9nGeYrPCR2D3 l+0uMQ6J63CfjLrYfceGLbaNSV7nWTA5J7iYvnB9OSTZnRKr+ERI78fdSljaAbSb dJxc/iOz6XdXkahOzTdA31tSlaPJwQFwFTVPPQAj7Vbo7vjOb1H7k7D0XA4R6I+E KK+7nyqGjqPrc4Mf7smqtKgGRLPByyOAPTy9bQz55VyyME6GNp27SWRBHLrAL6Yh CLjICs0srCCqkQ8apREewNe4mNSeArwN7DeLupQDcFxVw7RniVxW1Z3X6JbrUT4k Yk1+jcFv2COokrftmZ2Cyf3A9Ba04yYTa4byjqCZ8oVhS/thDFg9WTBGAGCVR8PQ ==
X-ME-Sender: <xms:J4GGXonU56gwNWsVSwkmI21Yo0PPl4u1swNoW-0_42Zr2YVKzlhcSw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduhedrtdehgdefudcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurhepofgfggfkjghffffhvffutgesrgdtre erreertdenucfhrhhomhepfdeurhhonhcuifhonhgufigrnhgrfdcuoegsrhhonhhgsehf rghsthhmrghilhhtvggrmhdrtghomheqnecuvehluhhsthgvrhfuihiivgeptdenucfrrg hrrghmpehmrghilhhfrhhomhepsghrohhnghesfhgrshhtmhgrihhlthgvrghmrdgtohhm
X-ME-Proxy: <xmx:J4GGXjvUsThE-jnkLv7PU8xl-0I3-KJ4cVKLPz3HCNuD0eRwCntkPA> <xmx:J4GGXvdvpCovSjadDXqmJKKGc43mPoi04zWHgbJyzHGqCmqbMOTm8g> <xmx:J4GGXtboFx2cDGMEO1l10uPgoQFew7eeLSf2IYbCL4yik6zBx-RudA> <xmx:J4GGXvBU0dV4vEk4bJ9JZW8Vbabb9YOGgqsHpNXkhnQQd8q3MMVK7A>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 1D9A1180090; Thu, 2 Apr 2020 20:19:51 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.1.7-1080-gca5de7b-fmstable-20200402v5
Mime-Version: 1.0
Message-Id: <02194c15-ce18-477b-a492-6e3406c305a0@dogfood.fastmail.com>
In-Reply-To: <17D85408-6815-4E22-ABAF-6037DBF2FB6D@gmail.com>
References: <68ab4f9e057d49b0972f97a907f45ced@elvas.europol.eu.int> <4668b6f7-cf7e-b577-3ece-30d1bdf3a4bc@network-heretics.com> <713270061.4157.1585575906743@appsuite-dev-gw1.open-xchange.com> <17D85408-6815-4E22-ABAF-6037DBF2FB6D@gmail.com>
Date: Fri, 03 Apr 2020 11:19:28 +1100
From: Bron Gondwana <brong@fastmailteam.com>
To: ietf@ietf.org
Subject: Re: @EXT: RE: United Nations report on Internet standards
Content-Type: multipart/alternative; boundary="7360fefecc054be7aa5c3c4dd0f411da"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/eHLJItE0a-qyJdghbicsrXSiRDQ>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 00:20:38 -0000
X-List-Received-Date: Fri, 03 Apr 2020 00:20:38 -0000

On Fri, Apr 3, 2020, at 03:54, Fred Baker wrote:
> Let me put a finer point on Keith's comment. "...privileging encryption over security" is a fairly interesting statement. The encryption people would, I think, tell you that encryption is a technology whose fundamental purpose is security, so it cannot be privileged over security. Now, on the other hand, in the TLS 1.3 discussion we have had people talking about privileging creating a new security key for every session over being able to debug operational problems in an operational environment, and I would say that is in fact very different; when security prevents people from debugging problems, that's something that I want the security people helping operators to solve.

Malware detection
Exfiltration detection of private keys
Enumeration attack detection

Pretty much anything which looks for behaviour patterns across multiple endpoints is severely hampered by inability to correlate multiple datapoints. By pushing all the security out to the endpoints, they either have to coordinate threat information with each other by some side channel, or each is operating entirely in a vacuum.

"encryption is a technology whose fundamental purpose is security, so it cannot be privileged over security" is an extremist position that admits no nuance or tradeoffs - of which debugging that you already noted is just one.

For sure that in the antispam world, the ability to see patterns across a large set of messages is invaluable for classifying messages, and looking at each message right at the endpoints in isolation is much less effective.

Bron.



--
 Bron Gondwana, CEO, Fastmail Pty Ltd
 brong@fastmailteam.com