Re: [saag] [Pearg] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?

Tony Rutkowski <trutkowski.netmagic@gmail.com> Thu, 05 January 2023 16:00 UTC

Return-Path: <trutkowski.netmagic@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 88715C14CE30; Thu, 5 Jan 2023 08:00:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uKf9APSC4r5T; Thu, 5 Jan 2023 08:00:19 -0800 (PST)
Received: from mail-qt1-x835.google.com (mail-qt1-x835.google.com [IPv6:2607:f8b0:4864:20::835]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B6BEC14CE51; Thu, 5 Jan 2023 08:00:19 -0800 (PST)
Received: by mail-qt1-x835.google.com with SMTP id j16so30262133qtv.4; Thu, 05 Jan 2023 08:00:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:in-reply-to:references:cc:to :content-language:subject:reply-to:user-agent:mime-version:date :message-id:from:from:to:cc:subject:date:message-id:reply-to; bh=XjxCE4CwYFUg3Q0EKdSp+9K+6/DlqdJiFKr9OvuCFHs=; b=d991GIt5FzJnEmy9GTHn1JORpxLnt/2v9UqcPB49bzaCtn3zHvKrsYuiXJeogZ66rp AlI0j8pQd+q2qQlZkw1w+IywfrDmlL4g+fGH5jIqUAdxTW9+UyD4U3g/c/P7JFVkaGnz n85+W5INbZ1WcGSIIisKsrlqf2G0GKnd950iE0CUyPT6aBU3PzcCWwCHM6CjI6fNhsY7 q0PzmKXAHnBf9+Ob/AR7tKhRit80tPYPMVNXEz/xSirzyYklnPH9FxLunepps8os08QX 4gpRCDEC9h6motmUqYap7iMVeqeusX3smtykkvQUKcgCBIeGcvTrll1e+4bX9Jj0HdwL cKuQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:references:cc:to :content-language:subject:reply-to:user-agent:mime-version:date :message-id:from:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=XjxCE4CwYFUg3Q0EKdSp+9K+6/DlqdJiFKr9OvuCFHs=; b=1DDGeTIzDp/akN09I6BMIRFzdFmIJrEuPmzeQnCANo3kqxShoUmsJ6MMAJT4ZDShMm ejRSa2t8cNj8dS/OByVaqNPZeTbqX20U1Y1fzORCg9eAeUpeuaYcn7zi6zVFSjxJbixU kQB8KJ+dIBRqksCXNxqHH60LIJ+UwIUa8zyUDCNTC1qVjw4IHhNbywe1KMbkLKEn55oW uul0+6Z5Pp/fxOV4x0Qf73mkMQgqKW7y8HmJXSdTFMzsMxie44uhPH8CTApHvZj2ibty 8Toi6MPRLH9EnAQBhLwE600tsPhr6CAGboAIVNCLBhb/nH5Y9AphZdyWuGDBomxm4vSk 8jYA==
X-Gm-Message-State: AFqh2kqQ6nw9qM+1is7Q5YJd3T6PvA3QQ0Q5cXdytTn8NmksupbSeUcK TwMRoWrX2M3K59sjcwH0CoI=
X-Google-Smtp-Source: AMrXdXvzbQM9RycTL9nM/kgyoNolREKqMgccxE6Wdi3C9UT+/ytXEl4FGXa9fxNz8A1z8/dOS8NPXw==
X-Received: by 2002:a05:622a:5c10:b0:3ab:7d29:2f96 with SMTP id gd16-20020a05622a5c1000b003ab7d292f96mr61606455qtb.40.1672934418444; Thu, 05 Jan 2023 08:00:18 -0800 (PST)
Received: from [192.168.1.249] (pool-70-106-222-156.clppva.fios.verizon.net. [70.106.222.156]) by smtp.gmail.com with ESMTPSA id bi1-20020a05620a318100b006f7ee901674sm25821250qkb.2.2023.01.05.08.00.17 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 05 Jan 2023 08:00:18 -0800 (PST)
From: Tony Rutkowski <trutkowski.netmagic@gmail.com>
X-Google-Original-From: Tony Rutkowski <trutkowski@netmagic.com>
Message-ID: <7ab59bd6-9457-e639-943d-83210ebeb068@netmagic.com>
Date: Thu, 05 Jan 2023 11:00:17 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.6.1
Reply-To: trutkowski@netmagic.com
Subject: Re: [saag] [Pearg] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?
Content-Language: en-US
To: Alan DeKok <aland@deployingradius.com>, Eric Rescorla <ekr@rtfm.com>
Cc: Vittorio Bertola <vittorio.bertola@open-xchange.com>, "ietf@ietf.org" <ietf@ietf.org>, "pearg@irtf.org" <pearg@irtf.org>, saag <saag@ietf.org>, "hrpc@irtf.org" <hrpc@irtf.org>
References: <HE1PR0701MB305098F652DBC34E3C40810B89F49@HE1PR0701MB3050.eurprd07.prod.outlook.com> <764163366.39904.1672842828297@appsuite-gw2.open-xchange.com> <CABcZeBNA_nJ2waQVENUvEXro91wAYOcH0ZxWqbLH4hoKcGkosw@mail.gmail.com> <9658281.42904.1672912808774@appsuite-gw2.open-xchange.com> <CA+9kkMBLiijcAyLYn_6h8z3N00EDaxdP=f7P2-qUt4Bn1iSWEg@mail.gmail.com> <HE1PR0701MB30505DC24A725E014D60FE0189FA9@HE1PR0701MB3050.eurprd07.prod.outlook.com> <CABcZeBPc0r275AiCL=qWTnzFT9PoQ9WMHz+GcmQZG8pgv2dmbw@mail.gmail.com> <4EB76682-E75C-413B-906B-6C5C7404A91C@deployingradius.com>
In-Reply-To: <4EB76682-E75C-413B-906B-6C5C7404A91C@deployingradius.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/mi2NJ4-cqD4F9EnE9FHvlQhIC-c>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IETF-Discussion. This is the most general IETF mailing list, intended for discussion of technical, procedural, operational, and other topics for which no dedicated mailing lists exist." <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jan 2023 16:00:24 -0000

Hi Alan,

Actually, NIST has no authority to mandate anything related to 
encryption protocols - which is why the SP title is "guidance." SPs are 
referenced by other agencies that have authority - primarily for 
procurement purposes.  The SP is also U.S. based with nuanced language 
concerning "support."  The implementation and use has also been modified 
by NSA PP-20-1302.  See 
https://media.defense.gov/2021/Jan/05/2002560140/-1/-1/0/ELIMINATING_OBSOLETE_TLS_UOO197443-20.PDF

All of this is for good policy reasons and industry security concerns 
that resulted in ETSI's development of the Middlebox Security Protocol 
standards suite, especially TS 103 523-3, "Middlebox Security Protocol; 
Part 3: Enterprise Transport Security," for TLS 1.3 implementations.  
See 
https://www.etsi.org/deliver/etsi_ts/103500_103599/10352303/01.03.01_60/ts_10352303v010301p.pdf

NIST itself has undertaken a NCCoE initiative to deal with the related 
challenges.  See 
https://www.nccoe.nist.gov/sites/default/files/legacy-files/tls-1.3-visibility-project-description-draft.pdf. 
ETSI has established the Encrypted Traffic Integration Industry Group.  
See https://portal.etsi.org/tb.aspx?tbid=888&SubTB=888#/

Finally, the European Union - which very much has regulatory authority - 
has published Resolution (EC) 13084/1/20, Council Resolution on 
Encryption - Security through encryption and security despite 
encryption, 
https://data.consilium.europa.eu/doc/document/ST-13084-2020-REV-1/en/pdf

All of this may explain the lack of "boots on the ground" in the IETF.  
The boots have moved to other more pragmatic, real-world ground. :-)

best,
tony

On 1/5/2023 10:18 AM, Alan DeKok wrote:
> On Jan 5, 2023, at 8:58 AM, Eric Rescorla <ekr@rtfm.com> wrote:
>> 3. Essentially none of these threats are the province of the IETF,
>> which defines networking protocols.
>    The output of the IETF is networking protocols.  The input of the IETF is "good will" effort from individuals and corporations.  Corporations whose highest priority is to ship hardware which can run "Flappy Bird" at double the frame rate and resolution of the previous version.
>
>    Witness the experience John and I had trying to update EAP for TLS 1.3.  While NIST published a document in 2019 [1] mandating all government suppliers support TLS 1.3 by 2024, actual "boots on the ground" effort has been lacking.  The afore-mentioned corporations shipping new hardware have been conspicuously absent in all relevant technical discussions.
>
>    i.e. the security of literally billions of devices depended on John, and one highly opinionated Open Source person who isn't being paid to be here.
>
>    We need to do better.
>
>    The work in the IETF is often done by people who are senior enough to be allowed to be involved, or who are independent enough to care.  In many organizations, people with operational and/or implementation experience are often too junior to be allowed to participate.  This has been my experience in many WGs.
>
>     I've been reading all of this discussion about protocols and legislation with a bit of amusement.  I see all that as necessary, but it is not sufficient.  My (and Johns) experience with EAP highlights this.  If we hadn't chosen to do the work, there's a good chance that it either wouldn't have been done, or would have been done too late to meet legislated time frames.
>
>    The IESG and the IAB should take a serious look at which protocols need updating.  They should see which people are allowed to be involved in the IETF, and where in the company they sit.  They should find ways to get more participation from people who have operational and implementation experience.
>
>    Until that happens, the input of the IETF is insufficient "good will" to secure core protocols.  The output of the IETF is window dressing.  The foundation of the Internet is built on sand.
>
>    Alan DeKok.
>
> [1] https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf
> _______________________________________________
> saag mailing list
> saag@ietf.org
> https://www.ietf.org/mailman/listinfo/saag