Re: [saag] Is opportunistic unauthenticated encryption a waste of time?

Theodore Ts'o <tytso@mit.edu> Sat, 23 August 2014 03:02 UTC

Return-Path: <tytso@thunk.org>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E8451A70E2; Fri, 22 Aug 2014 20:02:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.569
X-Spam-Level:
X-Spam-Status: No, score=-2.569 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RP_MATCHES_RCVD=-0.668, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QZIHo4IkGEOL; Fri, 22 Aug 2014 20:02:53 -0700 (PDT)
Received: from imap.thunk.org (imap.thunk.org [IPv6:2600:3c02::f03c:91ff:fe96:be03]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D17891A0B10; Fri, 22 Aug 2014 20:02:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=thunk.org; s=ef5046eb; h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID:Subject:Cc:To:From:Date; bh=POCRjPGjJrBraYNsQSyzRZQmQ2A5nFynmOjtztlVJBA=; b=R2Yhv48yHwBUIFt7HyXX7cRYTPZKVZ3fkBtYWsMdnJNPoL323qjV5Neu9xnSEap6WljJUUkb7CXF0EzT1hVAEgUuQkVt1v83LqhF3XfBqbSyLg0NQizMTlglgee6W6gCoqesAfZrqnLmwgX3DIDOEWdVVT21UUs/wZBTO6qRxPk=;
Received: from root (helo=closure.thunk.org) by imap.thunk.org with local-esmtp (Exim 4.80) (envelope-from <tytso@thunk.org>) id 1XL1bO-0000J8-GF; Sat, 23 Aug 2014 03:02:50 +0000
Received: by closure.thunk.org (Postfix, from userid 15806) id 18ABD5801DD; Fri, 22 Aug 2014 23:02:50 -0400 (EDT)
Date: Fri, 22 Aug 2014 23:02:50 -0400
From: Theodore Ts'o <tytso@mit.edu>
To: Bernard Aboba <bernard_aboba@hotmail.com>
Subject: Re: [saag] Is opportunistic unauthenticated encryption a waste of time?
Message-ID: <20140823030250.GT11085@thunk.org>
References: <53F548E5.2070208@cs.tcd.ie> <53F54F1C.1060405@dcrocker.net> <53F5D303.1090400@cs.tcd.ie> <CAMm+LwhmJpnU8E9ifA47baneGB=qjHzU_cy+wepPYLXrOhB+Pg@mail.gmail.com> <20140821160402.GT14392@mournblade.imrryr.org> <f5d8b5dc37b84f709c8f2df7c7a69daf@AMSPR06MB439.eurprd06.prod.outlook.com> <CAK3OfOgZzoXVnrE8Nbs6mwN2xD_snbzH9jT8TsYOVt8UASahYQ@mail.gmail.com> <a354d63505924d76a15b505e60e27a16@AMSPR06MB439.eurprd06.prod.outlook.com> <20140822140000.GE14392@mournblade.imrryr.org> <BLU181-W84354FE6BEF12305A2A7DB93D10@phx.gbl>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <BLU181-W84354FE6BEF12305A2A7DB93D10@phx.gbl>
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: tytso@thunk.org
X-SA-Exim-Scanned: No (on imap.thunk.org); SAEximRunCond expanded to false
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/miFaImyOUOCtRgrEwwftEljbK6E
Cc: "saag@ietf.org" <saag@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Aug 2014 03:02:56 -0000

On Fri, Aug 22, 2014 at 07:13:54PM -0700, Bernard Aboba wrote:
> The first assertion, is likely to
> be proven false by the first gear to include built-in
> man-in-the-middle attack support.  Care to wager which appears
> first, carrier-class gear supporting man-in-the-middle attacks, or
> significant deployment of "opportunistic" encryption?

This assumes that the telecom carriers and/or the suppliers of the
carrier grade equipment would cooperate with the nation-states in
question.  That could happen, certainly, but it becomes much more
difficult to do this surreptitiously.

This won't help in a totalitarian regime, certainly, but in democratic
societies having law enforcement agencies engaging in mass,
surreptitious surveilance might be less likely to be tolerated.

Cheers,

							- Ted