Re: Last Call: <draft-farrell-perpass-attack-02.txt> (Pervasive Monitoring is an Attack) to Best Current Practice

Stefan Winter <stefan.winter@restena.lu> Fri, 06 December 2013 10:15 UTC

Return-Path: <stefan.winter@restena.lu>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4F7A1AE318 for <ietf@ietfa.amsl.com>; Fri, 6 Dec 2013 02:15:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001, WEIRD_PORT=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j270yiQk_Mno for <ietf@ietfa.amsl.com>; Fri, 6 Dec 2013 02:15:14 -0800 (PST)
Received: from smtprelay.restena.lu (smtprelay.restena.lu [IPv6:2001:a18:1::62]) by ietfa.amsl.com (Postfix) with ESMTP id A1B171AE2A7 for <ietf@ietf.org>; Fri, 6 Dec 2013 02:15:13 -0800 (PST)
Received: from smtprelay.restena.lu (localhost [127.0.0.1]) by smtprelay.restena.lu (Postfix) with ESMTP id 05A601058E for <ietf@ietf.org>; Fri, 6 Dec 2013 11:15:09 +0100 (CET)
Received: from aragorn.restena.lu (aragorn.restena.lu [IPv6:2001:a18:1:8::155]) by smtprelay.restena.lu (Postfix) with ESMTPS id E69951058D for <ietf@ietf.org>; Fri, 6 Dec 2013 11:15:08 +0100 (CET)
Message-ID: <52A1A3AA.3080101@restena.lu>
Date: Fri, 06 Dec 2013 11:15:06 +0100
From: Stefan Winter <stefan.winter@restena.lu>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.1.0
MIME-Version: 1.0
To: ietf@ietf.org
Subject: Re: Last Call: <draft-farrell-perpass-attack-02.txt> (Pervasive Monitoring is an Attack) to Best Current Practice
References: <20131203174852.21387.26099.idtracker@ietfa.amsl.com> <A3B306E3-846C-45BA-8ED9-13B96AA645A3@piuha.net> <002501cef266$b0b8a540$4001a8c0@gateway.2wire.net>
In-Reply-To: <002501cef266$b0b8a540$4001a8c0@gateway.2wire.net>
X-Enigmail-Version: 1.6
OpenPGP: id=8A39DC66; url=http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC0DE6A358A39DC66
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="H39UUerNT84UD7mB4dInhj4STgPPJwsO1"
X-Virus-Scanned: ClamAV
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Dec 2013 10:15:17 -0000

Hi,

Not long ago, someone was stabbed with a knife, so:

> Encryption has its dangers and the IETF should not be encouraging its
> widespread adoption.

Knives have their dangers, and the metal-processing industry should not
be encouraging their widespread adoption.

Funny - that conclusion, which is analogous to yours, doesn't make much
sense to me. Does it to you?

Encryption is a tool - it's neither good nor bad in itself. What you do
with it is the question.

What we have seen in deployed reality is that lack of usage of this tool
by the internet population at large has played into the hands of
adversaries. The idea to put the tool into everybody's hands and make
them *use* it is absolutely a good idea as a countermeasure IMHO.

Especially since the adversaries *are* using it, regardless whether the
good guys do or not. The rioters you mention above did use it - and they
can continue to do so no matter what we decide in the IETF. The TV
manufacturer could have used it - they were simply stupid enough to
forget about it.

Greetings,

Stefan Winter

> 
> Tom Petch
> 
> ----- Original Message -----
> From: "Jari Arkko" <jari.arkko@piuha.net>
> To: <ietf@ietf.org>
> Sent: Wednesday, December 04, 2013 4:45 AM
> Subject: Re: Last Call: <draft-farrell-perpass-attack-02.txt> (Pervasive
> Monitoring is an Attack) to Best Current Practice
> 
> 
> I wanted to draw your attention on this last call:
> 
>> The IESG has received a request from an individual submitter to
> consider
>> the following document:
>> - 'Pervasive Monitoring is an Attack'
>>  <draft-farrell-perpass-attack-02.txt> as Best Current Practice
>>
>> http://datatracker.ietf.org/doc/draft-farrell-perpass-attack/
> 
> 
> It is a short read and important, so please comment. The last call ends
> in four weeks and covers holiday time, but we'll deal with this document
> on the January 9th telechat in the IESG, so in practice there should be
> enough time to comment.
> 
> I would like to see this document as a high-level policy we have on
> dealing with this particular type of vulnerabilities in the Internet. A
> little bit like RFC 3365 "Danvers Doctrine" was on weak vs. strong
> security. Please remember that the details and tradeoffs for specific
> solutions are for our WGs to consider and not spelled out here. The
> draft does say "where possible" - I do not want to give the impression
> that our technology can either fully prevent all vulnerabilities or do
> it in all situations. There are obviously aspects that do not relate to
> communications security (like access to content by your peer) and there
> are many practical considerations that may not make it possible to
> provide additional privacy protection even when we are talking about the
> communications part. But I do believe we need to consider these
> vulnerabilities and do our best.
> 
> Jari
> 
> 
> 
> 


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

PGP key updated to 4096 Bit RSA - I will encrypt all mails if the
recipient's key is known to me

http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC0DE6A358A39DC66