Re: [Model-t] What are we trying to protect

Bret Jordan <jordan.ietf@gmail.com> Sun, 04 August 2019 23:25 UTC

Return-Path: <jordan.ietf@gmail.com>
X-Original-To: model-t@ietfa.amsl.com
Delivered-To: model-t@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D44C3120125 for <model-t@ietfa.amsl.com>; Sun, 4 Aug 2019 16:25:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DNj72FC0vAUX for <model-t@ietfa.amsl.com>; Sun, 4 Aug 2019 16:25:34 -0700 (PDT)
Received: from mail-pf1-x429.google.com (mail-pf1-x429.google.com [IPv6:2607:f8b0:4864:20::429]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81E8B120120 for <model-t@iab.org>; Sun, 4 Aug 2019 16:25:34 -0700 (PDT)
Received: by mail-pf1-x429.google.com with SMTP id r7so38626595pfl.3 for <model-t@iab.org>; Sun, 04 Aug 2019 16:25:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=XBWcvCm+CzhXphG3TBARoWYOysztK8MKdcaAUppq0pQ=; b=hiBPkPj0YpS1zQymYgaxYCRoSdNVkMSF6fMBGYULPQ8vtcggGRUsM3t3lsTj21762t eMiN8Bxf0S+/rlfEnCsFTqtIFMy0Mf4DeUMBWZb+jrBmpAI+2VMtIZILvSc1DUfSUZbF L1AXJHeL2x7lL1G5JPRz6dJ3Sm8ak0osIFi9pdZrKHMz/0tweDS43Jhm45oc91Oo2GnC wEObPO29kEWAK38Gjljr7vSMvcVTGyctD9DplBnifYvdX7VdwWR/+1aQfC1yf0r3q27q wW2G5Fzr/tggsc3h6zkdJTD6ibdy5DYqEdSG0YHiTh4T1uxGYWSgTm2CyNKyBOBGP5X1 yBWQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=XBWcvCm+CzhXphG3TBARoWYOysztK8MKdcaAUppq0pQ=; b=Xs7XaqAIWPCy96NwM0pJdBYJ8mu6EgYB5HhCDITKRmQ6s92SxmXS+1UktQ9mkZqvTW dwQOZ+IBe/wGQ2bcEqfaNXmKR15vONmPDkLoWvzHDE8irSZFfjA46qilQh9LJWeIS+XU YN9zzUa14yYxKVKbCzSdmh5FBBbB4i10Rblyug8v1sEGiYFs43JSydvTtKl5lm2Ch68r zlIND64oYZaabDYzgjbgWbmRNcntYLpL1kdUvpp7ULg+jQReSQwvEf4t2duVt+JGu6AN RyUzxetqjpaeLem3ntM0C1HCc5hvLOA8FVeFpawPHdkqGHMXPl7Gm72dEuioDpskZ209 97Ow==
X-Gm-Message-State: APjAAAWBuFbv7AxX2X3pbB/MR/iDTtiFLK4rq/nIDgQ0E9uRn14M4nwu wuX4m1xlucWqph94m4yxiNc=
X-Google-Smtp-Source: APXvYqzHQ3uZodUCKP3KVUrVbX7ixiu6nZ6rXhX3H70Qo+skOUso7RDSjoMx29HK13SGKLnqixwxWg==
X-Received: by 2002:aa7:956d:: with SMTP id x13mr71063263pfq.132.1564961134099; Sun, 04 Aug 2019 16:25:34 -0700 (PDT)
Received: from [10.128.64.149] ([136.60.227.81]) by smtp.gmail.com with ESMTPSA id s24sm82611693pfh.133.2019.08.04.16.25.32 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 04 Aug 2019 16:25:33 -0700 (PDT)
From: Bret Jordan <jordan.ietf@gmail.com>
Message-Id: <BAA30545-5FFE-4213-9C59-4DBF397BB969@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_235652D4-E897-4BBB-BA03-5BC433728B75"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Sun, 04 Aug 2019 17:25:30 -0600
In-Reply-To: <17d230a0-49ce-079e-a081-f00e66f2f512@cs.tcd.ie>
Cc: Eric Rescorla <ekr@rtfm.com>, Dominique Lazanski <dml@lastpresslabel.com>, Watson Ladd <watsonbladd@gmail.com>, Ted Lemon <mellon@fugue.com>, model-t@iab.org, Christian Huitema <huitema@huitema.net>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
References: <c3a112ba-baab-1cb0-97ad-21ff9999a637@cs.tcd.ie> <5879878A-7CEA-4030-BB72-108CC4122719@gmail.com> <d253231a-d35d-e7c9-e3ae-5c7d7915566e@bluepopcorn.net> <06F0AE14-4413-4022-A804-C1B58E2702CE@fugue.com> <52BAC141-CB25-4072-B556-6325912F1ADD@gmail.com> <9a1555ca-6699-75f1-683e-2a3a2a539a11@cs.tcd.ie> <fbb6866d-87af-abea-42b4-8bb45959ea6a@huitema.net> <A8ABBBFF-9967-4F3B-974F-2DC5953D5DD9@gmail.com> <CABcZeBOKnaa7t3Nc=uq4sB2OQ+uKp=+_LHqX3bBBmpy3RY3dCA@mail.gmail.com> <86157132-D401-4033-A72B-AD4859DB6696@lastpresslabel.com> <CABcZeBPBy+6W-Yg4vMF1aCyNkE7XAJ81HaM75hKa--gRnpUVbg@mail.gmail.com> <5281A343-35C0-4F4D-949D-02C46FA07801@lastpresslabel.com> <86639B71-F616-48CC-96AB-719F7168F087@gmail.com> <CACsn0cktsrVnzVByV9NzcE4jDpMdJ1UBPzut5PTzVSesMXXaNg@mail.gmail.com> <ADF23214-F1A8-4996-A56D-3DB037D81EA9@fugue.com> <F3098ECC-3B02-4242-90C8-15EC8D8F0CBF@gmail.com> <1c506954-47ba-dc40-f6e5-c19bd17624c2@cs.tcd.ie> <73B68598-2F9B-44B7-8FA9-D8EE61C88AAD@gmail.com> <17d230a0-49ce-079e-a081-f00e66f2f512@cs.tcd.ie>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/model-t/jChR-ToBNQBIo6k9lhM3ZPqHfyk>
Subject: Re: [Model-t] What are we trying to protect
X-BeenThere: model-t@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions of changes in Internet deployment patterns and their impact on the Internet threat model <model-t.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/model-t>, <mailto:model-t-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/model-t/>
List-Post: <mailto:model-t@iab.org>
List-Help: <mailto:model-t-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/model-t>, <mailto:model-t-request@iab.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Aug 2019 23:25:37 -0000

This is why I listed four types of attacks and what is at risk with them.  We have to start somewhere.

Recopying here:

Attack: Active remote attack
Exposure: Full compromise of system and data
Client Knowledge: Potential indicators may be visible
Protection Possibilities: Deploy both client and network level protections
Headwinds: Client based protections are usually inadequate
Severity: High
Kill-Chain Phase: Lateral Movement 

Attack: Active in-band attack
Exposure; Full compromise of system and data
Client Knowledge: Potential indicators may be visible
Protection Possibilities: Deploy both client and network level protections, user awareness training, content and DNS filtering
Headwinds: Client based protections are usually inadequate
Severity: High
Kill-Chain Phase: Delivery and Exploitation 

Attack: Passive monitoring of traffic
Exposure: Information about where traffic is going and potentially details of the content being shared 
Client Knowledge: No, it is very hard to detect passive monitoring tools
Protection Possibilities: Encrypt traffic 
Headwinds: Global adoption of better encryption
Severity: Low
Kill-Chain Phase: Reconnaissance

Attack: Active in-band monitoring and tracking 
Exposure: Information about what the user is doing and where they are going 
Client Knowledge: Generally no 
Protection Possibilities: Client and network level protections
Headwinds: Some clients are making it hard to deploy client side protections 
Severity: Low
Kill-Chain Phase: Reconnaissance



Thanks,
Bret
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."

> On Aug 4, 2019, at 5:00 PM, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote:
> 
> 
> Hiya,
> 
> On 04/08/2019 23:38, Bret Jordan wrote:
>> A few comments inline… Sorry, I try not to do that.
> 
> Why not? It's fine. (And easier to follow in mail I believe.)
> 
>>>> the larger risk, and larger attack surface.  When we design 
>>>> protocols and only consider a small handful of threats, then we 
>>>> inevitably hurt the market.
>>> 
>>> IMO we ought not only think in terms of "the market" - I'd hope
>>> rather that everyone sometimes thinks of more than commerce as the
>>> Internet impacts on people in other ways that are relevant in this
>>> discussion.
>> 
>> Sorry bad word choice.  =~s/market/industry/g;  When I refer to “the
>> market” I am not talking about the vendor space, commercial space, or
>> the sell stuff over the web space.  I am simply referring to the way
>> end users, organizations, enterprises, and governments need to use
>> the connectedness of computers and IP address ranges to do what ever
>> it is they are doing. So I should have said “industry” or if you have
>> a better term, let me know.
> 
> I suspect this is one where we're better to recognise that
> nobody's fav term is correct;-) It's entirely legit to consider
> how security/privacy analyses affect the market, and how they
> affect society, and how they affect specific communities, and how
> they affect the set of people who use or care about the Internet.
> Those are all valid, as would be other sets of interested parties,
> and I suspect we'd never reach consensus as to the relative
> importance of each. I think if we each accept that other folks
> rate those differently for reasons that are possibly as valid as
> our own, that might be good enough.
> 
>>>> The more of these things we can document and the more we can
>>>> bring them to light, the better everything will be in the end.
>>> Yes, but it's important to document things in a way that can lead
>>> up to then winnowing things down to something that ends up useful
>>> to that population of IETFers who are not security or privacy
>>> specialists.
>> 
>> Once again, I fully agree.  But we need to start somewhere.  The
>> Stanford D-School has a great set of classes on how to effectively
>> brainstorm.  And I think that is what we are trying to do now.  We
>> are trying to get the discussion going and get everything out there,
>> so we can start to better understand how big the elephant is that we
>> need to work on
> 
> The elephant metaphor isn't my favourite. Even if we're each
> scrambling around in the dark, there might not be exactly one
> elephant. In this case, I think there definitely is more than
> one. For example, we have the enterprise n/w vs big-I security
> differences, and we also have the commercial/govt surveillance
> vs. human rights/freedom differences. It may be my lack of
> imagination but I can't see how those are part of one elephant.
> (And I think that's true regardless of one's opinions as to any
> of the locally-perceived potential elephant parts:-)
> 
> Cheers,
> S.
> 
> 
>> 
>> Bret
>> 
>> 
>>> 
>>> Cheers, S. <0x5AB2FAF17B172BEA.asc>
>> 
>> 
>> 
> <0x5AB2FAF17B172BEA.asc>