[Mimi] Re: Abuse reporting requirements discussed during the interim
Rohan Mahy <rohan.mahy@gmail.com> Sun, 25 August 2024 18:52 UTC
Return-Path: <rohan.mahy@gmail.com>
X-Original-To: mimi@ietfa.amsl.com
Delivered-To: mimi@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD892C14F689 for <mimi@ietfa.amsl.com>; Sun, 25 Aug 2024 11:52:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rLETiIP-8Gik for <mimi@ietfa.amsl.com>; Sun, 25 Aug 2024 11:52:12 -0700 (PDT)
Received: from mail-ej1-x635.google.com (mail-ej1-x635.google.com [IPv6:2a00:1450:4864:20::635]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C90CCC14F5ED for <mimi@ietf.org>; Sun, 25 Aug 2024 11:52:12 -0700 (PDT)
Received: by mail-ej1-x635.google.com with SMTP id a640c23a62f3a-a8692bbec79so449137666b.3 for <mimi@ietf.org>; Sun, 25 Aug 2024 11:52:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1724611931; x=1725216731; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=3Woi3TuysiC+li+qDdIeXKPFCr89jZrUIfbvnZpdc0g=; b=icti1ypqzc9GrqxfQ8PaxuXSwgiIeeALel2KKwMETOIgg7r45OwZmzhtCSRJ59+8/K 6+5c8ueiMq1ZO4tcNTOdeZE7EA9Nowpwcj+b5XMd1rqQJw8190uy5CYtJCtGUeWjO0n2 h6cFWo+XJnaVlthiZzSa4k9A5XkOWVibtzctpaHI+oTGv22aYl3VdYM1U/xoNworkJsH rOxVLJCrGgRjlsmuXG/MLvUdWcUoBF3W4TKhqkrVBm6LB8Eqd4R/YIjiRv4o3Hld47zn MA8dKRdK2OVsCeEqdnea1MnYIx1GeH20VoMaUJHL1OOYvDCpUgln17gwX5pHBbLqG33c pTcw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1724611931; x=1725216731; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=3Woi3TuysiC+li+qDdIeXKPFCr89jZrUIfbvnZpdc0g=; b=AOgybV+2gok01hjqAsmOyu7lf90cXw4KJjOeSfQQndUt1Q0wQtenlvScijdHl0KxlO OxAwkf+Gm9ai78TAcIFwW386DrYkSuQGc5v/qf4MtHDZGVlurWp4W7NQz7/RcrQWKtT6 ZpafuWXixdBm9aUhRM/GkZ/aSd631UOSQEx9VQsAlcjpOJpY28g/EtVN74B4p98A6E4v XyQvQhw4/LNQAqmHnQyu/p7wJqTcJegpYyJ/8gWV7cYGu3x9JRO/JULGEe9gZjSrI9Xs pez1dztTM2HtNMYaEZRu3359EbbidDXv5vkZfjWcAjWJ4iPMV531q+Smkxxz5XCkHOwF D14g==
X-Gm-Message-State: AOJu0YyRE60QkBGGlhdmvqK3CR0SVpFAlg8wspYQHLwPyv3c/PMGBzyH R0cKUKkE2qD6VcXWeBaOBD575iVraGZZ83XmUCysAI+GtKoB/QI3V1emg/gUlFLy7/KZWOQx7ZJ 1Fi6FyRo1eLocp+jG6pMfP79Uke4wVg==
X-Google-Smtp-Source: AGHT+IEVGzpQHph3YoQJQYakwFNcUoAxoC9ljAUwXqLZejaR1BxkRXsSqfm0k4jA5BjmDk863K/aPZKeQbAwUdQ9WQM=
X-Received: by 2002:a17:907:e688:b0:a86:99e9:ffa5 with SMTP id a640c23a62f3a-a86a52c4565mr497892666b.34.1724611930597; Sun, 25 Aug 2024 11:52:10 -0700 (PDT)
MIME-Version: 1.0
References: <CAKoiRubJxNMe4q_aXK5KcQrNEycqikdYDcmJtUGif3tJe-o9wA@mail.gmail.com> <CAFR824x3D4_tp25SGx0MnaCBXLyFiK8ki0JoGD3hhsUejhAX_g@mail.gmail.com> <CAKoiRuY+FFLUQ_xPYT6hOD_B4b-QJUGebepT4nQcugog+tYMSQ@mail.gmail.com> <CAFR824yEY1w7DpfXDn0oD4rQ3wpj0Rf1fHsABgUZdSL=8tT6Vw@mail.gmail.com>
In-Reply-To: <CAFR824yEY1w7DpfXDn0oD4rQ3wpj0Rf1fHsABgUZdSL=8tT6Vw@mail.gmail.com>
From: Rohan Mahy <rohan.mahy@gmail.com>
Date: Sun, 25 Aug 2024 11:51:59 -0700
Message-ID: <CAKoiRuadnPOAGD5MinMzk+De=OcRCWdq1m9pH-UEVPKUOZMkdA@mail.gmail.com>
To: Deirdre Connolly <durumcrustulum@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000007fb4350620868154"
Message-ID-Hash: 5DXVATAXN6V7645H6UO36DLUB2M3G23X
X-Message-ID-Hash: 5DXVATAXN6V7645H6UO36DLUB2M3G23X
X-MailFrom: rohan.mahy@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: mimi@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Mimi] Re: Abuse reporting requirements discussed during the interim
List-Id: More Instant Messaging Interoperability <mimi.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/mimi/9xmnnumm5aaImIfLmO_C-iEsGbQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mimi>
List-Help: <mailto:mimi-request@ietf.org?subject=help>
List-Owner: <mailto:mimi-owner@ietf.org>
List-Post: <mailto:mimi@ietf.org>
List-Subscribe: <mailto:mimi-join@ietf.org>
List-Unsubscribe: <mailto:mimi-leave@ietf.org>
Well, we really want to not ignore *you*, but we will skip over this particular *topic* ("dumb Hub" reporting and policy). Looking forward to your comments about the requirements once you've had a chance to digest them. Thanks, -rohan On Sun, Aug 25, 2024 at 11:41 AM Deirdre Connolly <durumcrustulum@gmail.com> wrote: > OK great, ignore me then! > > On Sun, Aug 25, 2024, 2:40 PM Rohan Mahy <rohan.mahy@gmail.com> wrote: > >> Hi Dierdre, >> Yes, we decided a while ago that in MIMI, messaging providers can have a >> role in policy enforcement, and that was pretty necessary to meet the >> requirements / reproduce the functionality in most messaging apps (see the >> penultimate sentence "facilitate interoperability given the feature set of >> modern messaging applications"). Note that three of the early implementers >> of MLS: Webex, Wickr, and Wire all independently came to this conclusion as >> well. >> >> While you can build a system that uses MLS and kicks almost all the >> decisions and power to moderators and admins who are members of a group, >> and uses some of the insights of MIMI (for example MIMI content and >> AppSync), it won't be MIMI if it prohibits the hub from having this role. >> You could build a client that works in both of these worlds, but that would >> be out of scope for MIMI. >> >> Hope that helps. >> Thanks, >> -rohan >> >> On Sun, Aug 25, 2024 at 11:17 AM Deirdre Connolly < >> durumcrustulum@gmail.com> wrote: >> >>> Thanks for the writeup! A question: >>> >>> - Receiver of a message can report it as allegedly abusive to the Hub >>>> provider. >>>> - Why the hub? >>>> - Because it knows the policy of the room >>>> >>> >>> Is this always the case? I could envision an MLS deployment with other >>> useful Mimi 'stuff' that follows a Signal model of keeping per-room >>> policies, membership, and metadata private from the broader service, and >>> offloads enforcement it to the inner workings of the private room itself. >>> In that case, reporting and moderation would be to 'the room' (or >>> owners/admins in the private room) to action. I could see a further >>> escalation up the chain from within the private room to The Service level, >>> which then follows the reporting to the Hub as described here. >>> >>> If that sort of scenario is out of scope or not really a thing because >>> of other Mimi stuff, sorry 😬 >>> >>> On Sun, Aug 25, 2024 at 1:11 PM Rohan Mahy <rohan.mahy@gmail.com> wrote: >>> >>>> Hi, >>>> We had a healthy discussion of the Abuse reporting and franking PR#83 >>>> <https://github.com/ietf-wg-mimi/mimi-protocol/pull/83> at the interim >>>> on Wednesday. We had a good deal of discussion about the requirements. I >>>> have attempted to capture the requirements so far in this list. >>>> >>>> # MIMI Abuse reporting >>>> ## Basic premise/scope of the mechanism >>>> - Receiver of a message can report it as allegedly abusive to the Hub >>>> provider. >>>> - Why the hub? >>>> - Because it knows the policy of the room >>>> - Because all messages go through the hub (see below) >>>> - Sends the plaintext of the allegedly abusive message(s) >>>> >>>> This mechanism is about receivers reporting alleged abuse to the Hub >>>> and the changes to submitting a message necessary for that to happen >>>> safely. It does not address communication between a Hub and a sender's >>>> provider or reporter's provider, or future remedies.† >>>> >>>> ## Requirements >>>> ### Message confidentiality >>>> - Hub can’t read the content of messages unless they are reported >>>> - Other providers can never read the content of messages using this >>>> mechanism† >>>> ### Sender attribution integrity >>>> - Receiver can’t attribute a bogus abusive message to a sender >>>> - Sender can’t deny a message they sent >>>> ### Sender privacy >>>> - Hub servers need to know the sender of a message (already, in order >>>> to enforce policies related to which participants can send messages), and >>>> we can rely on this for this mechanism. >>>> - Follower servers do not learn the sender of any message using this >>>> mechanism†. >>>> ### Original ciphertext of alleged abusive not needed at moment report >>>> is generated >>>> - Hubs don’t need to store ciphertext to verify they received a >>>> particular message >>>> - Receiving client does not need to store ciphertext indefinitely to >>>> report a message >>>> - Desirable that after backing up and restoring history (ex: I upgrade >>>> my phone), the new client can still report an abusive message >>>> ### Deployable >>>> - Not especially heavy to implement for client or server. >>>> - Adding extra roundtrips before sending a message would be >>>> especially painful for clients. >>>> ### Later work >>>> - †: There may be additional requirements (Hub reporting its findings >>>> to sender’s provider) that can be implemented as additional endpoints that >>>> do not have any client implementation implications. >>>> - There are likely to be substantial SLAs between pairs of >>>> providers which govern how >>>> - This also does not discuss Remedies that the Hub (or other providers, >>>> if communicated with them) might take, such as revoking voice, kicking, >>>> banning, etc. >>>> >>>> ## Issue >>>> A Receiver sending an abuse-report directly to the Hub (not through >>>> their local provider) sort of violates the principle that we are not >>>> defining client to server protocol. If a report goes through the receiver’s >>>> local server, this leaks both the sender’s identity and the message content >>>> to the receiver’s local server, unless we further encrypt the report for >>>> the Hub (ex: using the HPKE external_receiver public key of the hub). >>>> >>>> Is it acceptable to send reports directly to the Hub (bypassing the >>>> local provider), or is it better to add HKE encryption of the report)? >>>> >>>> Thanks, >>>> -rohan >>>> -- >>>> Mimi mailing list -- mimi@ietf.org >>>> To unsubscribe send an email to mimi-leave@ietf.org >>>> >>>
- [Mimi] Abuse reporting requirements discussed dur… Rohan Mahy
- [Mimi] Re: Abuse reporting requirements discussed… Deirdre Connolly
- [Mimi] Re: Abuse reporting requirements discussed… Rohan Mahy
- [Mimi] Re: Abuse reporting requirements discussed… Deirdre Connolly
- [Mimi] Re: Abuse reporting requirements discussed… Rohan Mahy
- [Mimi] Re: Abuse reporting requirements discussed… Travis Ralston