Re: Is traffic analysis really a target (was Re: [saag] Is opportunistic unauthenticated encryption a waste of time?)

Michael StJohns <mstjohns@comcast.net> Sun, 24 August 2014 19:06 UTC

Return-Path: <mstjohns@comcast.net>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 413DF1A068C for <ietf@ietfa.amsl.com>; Sun, 24 Aug 2014 12:06:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.171
X-Spam-Level:
X-Spam-Status: No, score=-2.171 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, MISSING_MID=0.497, RP_MATCHES_RCVD=-0.668, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uJehfGv4sgMG for <ietf@ietfa.amsl.com>; Sun, 24 Aug 2014 12:06:31 -0700 (PDT)
Received: from qmta04.westchester.pa.mail.comcast.net (qmta04.westchester.pa.mail.comcast.net [IPv6:2001:558:fe14:43:76:96:62:40]) by ietfa.amsl.com (Postfix) with ESMTP id 486A41A0685 for <ietf@ietf.org>; Sun, 24 Aug 2014 12:06:31 -0700 (PDT)
Received: from omta09.westchester.pa.mail.comcast.net ([76.96.62.20]) by qmta04.westchester.pa.mail.comcast.net with comcast id iizK1o0050SCNGk54j6WCS; Sun, 24 Aug 2014 19:06:30 +0000
Received: from Mike-T530ssd.comcast.net ([68.34.113.195]) by omta09.westchester.pa.mail.comcast.net with comcast id ij6W1o0014D0RQL3Vj6WCP; Sun, 24 Aug 2014 19:06:30 +0000
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Sun, 24 Aug 2014 15:06:29 -0400
To: Eric Burger <eburger@standardstrack.com>, "saag@ietf.org" <saag@ietf.org>
From: Michael StJohns <mstjohns@comcast.net>
Subject: Re: Is traffic analysis really a target (was Re: [saag] Is opportunistic unauthenticated encryption a waste of time?)
In-Reply-To: <6461D9C5-8B0B-42D3-9877-32DB3E6150C6@standardstrack.com>
References: <53F548E5.2070208@cs.tcd.ie> <53F54F1C.1060405@dcrocker.net> <53F5D303.1090400@cs.tcd.ie> <CAMm+LwhmJpnU8E9ifA47baneGB=qjHzU_cy+wepPYLXrOhB+Pg@mail.gmail.com> <20140821160402.GT14392@mournblade.imrryr.org> <f5d8b5dc37b84f709c8f2df7c7a69daf@AMSPR06MB439.eurprd06.prod.outlook.com> <CAK3OfOgZzoXVnrE8Nbs6mwN2xD_snbzH9jT8TsYOVt8UASahYQ@mail.gmail.com> <a354d63505924d76a15b505e60e27a16@AMSPR06MB439.eurprd06.prod.outlook.com> <20140822140000.GE14392@mournblade.imrryr.org> <BLU181-W84354FE6BEF12305A2A7DB93D10@phx.gbl> <20140823040550.GQ5909@localhost> <BLU181-W307B52819C577693183E2D93D10@phx.gbl> <53F8FA97.2020607@cs.tcd.ie> <BLU181-W664365D566637BE6D0E67493D10@phx.gbl> <53F908A1.6040207@cs.tcd.ie> <8BBAE4BE-F816-4170-9533-6400ACE463EA@cs.georgetown.edu> <6461D9C5-8B0B-42D3-9877-32DB3E6150C6@standardstrack.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=q20140121; t=1408907190; bh=go0GsjJpNrpHMEFxaVFWBi5vqNxQrIuf8cbmg7omUmo=; h=Received:Received:Date:To:From:Subject:Mime-Version:Content-Type; b=RZF+WiAjpXaQCv2niswRM87eUipF5/2V/QswlNC5rxPagOrKgybWw01Q7pWpPQL3n 96iA8X75D4oHZORWF+PoBaC+u0Uzyk0x/MvjGKjPsVRvDyrqEM/b54dIrmqzLpRRyw HTNCrU1cvqGGqfM52WuuWoXXGkGJwVb4yh3zk6che437WdmEcF4gHpZivaY/Axhwq0 pBvO2jijZBv6MqZ5xAdVgVb9q6VEdJCAY7uHtTmGAy4MhUHKeyR7JNDY/aBjKUtjhp 46qk2P0YqVTb2gUaWNyaVSQXJif/VS4Ch05FjHYtCk9nCLGywQ5PALlaDF0NY4J0uQ SnQ5DLhML2kyg==
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/c2GBEXzYbbtngofJF4u6NZ04uBo
Cc: "ietf@ietf.org" <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Aug 2014 19:06:33 -0000
X-Message-ID:
Message-ID: <20140824190636.16832.71787.ARCHIVE@ietfa.amsl.com>

At 12:32 PM 8/24/2014, Eric Burger wrote:
>I am concerned with the drive to make all traffic totally opaque. I’ll be brief: we have an existence proof of the mess that happens when we make all traffic look benign. It is called “everything over port 80.” That ‘practical’ approach drove the development of deep packet inspection, because everything running over port 80 was no longer HTTP traffic. It meant we could no longer prioritize traffic (in a good sense - *I* want to make sure my VoIP gets ahead of my Web surfing ahead of my FTP). It meant we could no longer apply enterprise policy on different applications. It drove ‘investment’ in the tools that today dominate pervasive monitoring.
>
>Good job folks for unintended consequences.


For a longer and more complete discussion on this, please see also RFC3639.  It was drafted at a time a national actor was contemplating blocking VoIP traffic at the actor's borders so it could tariff voice traffic by forcing it onto the PTT POTS system. 

There will be unintended consequences for whatever this OS thing ends up getting called.  It would be nice if we could do enough design and analysis prior to deployment to turn them into "carefully considered, more good for the user than harm to the network" consequences.

Later, Mike





>On Aug 23, 2014, at 5:33 PM, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote:
>
>> 
>> Hiya,
>> 
>> On 23/08/14 22:05, Bernard Aboba wrote:
>>> Stephen Farrell:
>>>> However, say we're wrong and someone who thinks OS is a waste of
>>>> time is actually correct, what would such a person recommend that
>>>> we do as well as, or instead of, OS?
>>> 
>>> [BA] It depends on who we are trying to protect, and from what (or
>>> whom). 
>> 
>> Sure.
>> 
>>> If the target is protection of dissidents from oppressive
>>> regimes, then you need something much more comprehensive than
>>> 'unauthenticated opportunistic encryption" (e.g. along the lines of
>>> Tor). 
>> 
>> Right. That's a hard target and involves far more than crypto,
>> whether OS or not.
>> 
>> One thing clearly involved there is that traffic analysis is
>> a threat, and I'd fully accept that we should be thinking about
>> ways in which we could make our protocols better against that
>> in general, even if we're not tackling the specific problems of
>> dissidents. For example, if my toilet emits packets with every
>> flush, encryption of any sort isn't going to disguise that so
>> traffic analysis will also be relevant for the Internet-of-Toilets.
>> 
>>> If the target is protection against PM within wealthy nations,
>>> then you'd need something that can't be rendered harmless by a modest
>>> budget increase. A number of MITM protection mechanisms have been
>>> suggested (e.g. DANE, channel binding, etc.). 
>> 
>> But isn't that what the IETF and security folks within the
>> IETF have been aiming for for a couple of decades? I mean aiming
>> for an end-state where we have mutual-auth more-or-less everywhere.
>> I don't consider that we've succeeded wildly to be honest;-)
>> 
>> What should we be doing differently is really my question.
>> 
>>> Also, in this category
>>> should be mechanisms for protecting privacy against private-sector
>>> adversaries. As long as private companies can amass huge dociers
>>> without resort to PM (or without the need to subvert OS), and are
>>> willing to sell that personal information to third parties (dodgy
>>> ones, let alone governments),  one wonders whether government
>>> agencies would make better use of their funds by "buying"
>>> surveillance, rather than trying to "build" it.
>> 
>> As it happens we had some discussion about e2e email security in
>> Toronto. Current plan is to start a new mailing list for that - a
>> bunch of us are chatting about how to scope that so we're less
>> likely to mess up. (More on that next week I hope.)
>> 
>> Now email is of course just one application (though a cornerstone
>> application). Which other applications/mechanisms should we be
>> considering that'd help here? FWIW, I'm very open to us trying to
>> help anywhere we could credibly do that. (Credibility requiring
>> that stuff be technically doable, be something that should be done
>> in the IETF and have enough warm bodies interested in doing work.)
>> 
>> Cheers,
>> S.
>> 
>> PS: If you or someone has a specific suggestion for a thing on
>> which we should be working, then maybe these lists are too broad
>> for detailed discussion of that. In such cases, the perpass@ietf.org
>> list is probably a good place to triage whether a topic is one we
>> should try pursue in the IETF.
>> 
>
>
>