Re: [Patient] Internet Draft posted as requested -

Brian Witten <brian_witten@symantec.com> Thu, 14 December 2017 22:58 UTC

Return-Path: <brian_witten@symantec.com>
X-Original-To: patient@ietfa.amsl.com
Delivered-To: patient@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2768B127005; Thu, 14 Dec 2017 14:58:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.22
X-Spam-Level:
X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=symc.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qcg_Qe9TaMca; Thu, 14 Dec 2017 14:58:47 -0800 (PST)
Received: from asbsmtoutape01.symantec.com (asbsmtoutape01.symantec.com [155.64.138.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E0CA1205F0; Thu, 14 Dec 2017 14:58:47 -0800 (PST)
Received: from asbsmtmtaapi01.symc.symantec.com (asb1-f5-symc-ext-prd-snat5.net.symantec.com [10.90.75.5]) by asbsmtoutape01.symantec.com (Symantec Messaging Gateway) with SMTP id 8C.25.35258.622033A5; Thu, 14 Dec 2017 22:58:46 +0000 (GMT)
X-AuditID: 0a5af819-80ab69c0000089ba-b7-5a3302262d9b
Received: from tus3xchcaspin01.SYMC.SYMANTEC.COM (asb1-f5-symc-ext-prd-snat10.net.symantec.com [10.90.75.10]) by asbsmtmtaapi01.symc.symantec.com (Symantec Messaging Gateway) with SMTP id 3C.3D.04260.622033A5; Thu, 14 Dec 2017 22:58:46 +0000 (GMT)
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) by tus3xchcaspin01.SYMC.SYMANTEC.COM (10.44.91.13) with Microsoft SMTP Server (TLS) id 15.0.1236.3; Thu, 14 Dec 2017 14:58:45 -0800
Received: from NAM03-DM3-obe.outbound.protection.outlook.com (10.44.128.8) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1236.3 via Frontend Transport; Thu, 14 Dec 2017 14:58:45 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=symc.onmicrosoft.com; s=selector1-symantec-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=DOvdeV3XLpZbiZyw2a+h3mESzTAnvrfzBTy3pkg/4WU=; b=gKkC+fARodLuUJHqtleqE4c8kn+72EKY18jyPRKqwS4KBaCLTGrc+vEE/eXAJS0NXsiGi+TUmdJA+F8plshP+7MXxTnws/J092v5/1UHIhOuUiQJkLAOL9EjsbwvZ+NzxIlRMtkiHdZu6LAzfftfJiIZK6QG2JtBDXL2jRwkzOk=
Received: from MWHPR16MB1488.namprd16.prod.outlook.com (10.175.4.146) by MWHPR16MB1488.namprd16.prod.outlook.com (10.175.4.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.302.9; Thu, 14 Dec 2017 22:58:43 +0000
Received: from MWHPR16MB1488.namprd16.prod.outlook.com ([10.175.4.146]) by MWHPR16MB1488.namprd16.prod.outlook.com ([10.175.4.146]) with mapi id 15.20.0302.017; Thu, 14 Dec 2017 22:58:42 +0000
From: Brian Witten <brian_witten@symantec.com>
To: "patient@ietf.org" <patient@ietf.org>, "saag@ietf.org" <saag@ietf.org>
Thread-Topic: Internet Draft posted as requested -
Thread-Index: AQHTdG3hrR7/CZZMykmDXlV3KMVAN6NDcJ4G
Date: Thu, 14 Dec 2017 22:58:41 +0000
Message-ID: <DM5PR16MB148477E1FAA4C210A3B013F7930A0@DM5PR16MB1484.namprd16.prod.outlook.com>
References: <MWHPR16MB14881688FE400E3277CA8A9393310@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB14889BEE3EB0ED5F328D7C3993370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB14889B7535153E5844649CA393370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB14880A12D15AC58FDD5CEC8793370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB1488D43F3B53BC7BBE9D836593370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB1488853B0E4F7BB8E557288D93370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB148845FB069D03625BC399B193370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB1488848D7AC828EBB8DA90B093350@MWHPR16MB1488.namprd16.prod.outlook.com>
In-Reply-To: <MWHPR16MB1488848D7AC828EBB8DA90B093350@MWHPR16MB1488.namprd16.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=brian_witten@symantec.com;
x-originating-ip: [2605:e000:9394:6500:a5ed:2f5c:12b1:afaa]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; MWHPR16MB1488; 6:mfyGewS3uz2nqLR2vWp2NtUB5KrlcpA8YiiteW4M7Th/WKGz5iRb2285QC9Kiq1VzPgFVCRO8w0yrrGxH93DUNm1YXTX6V+OJdt4ih3QrL0fR2D/YAlYbQxRlH1MliV//JzqrHVFj/q+NfcSEUdofCF67Q3qH4og0FbDCHlaHgqhIMk2KNseBoYrksajWJi2EmeCroqJvmFweYczIYhjwU/FGWjEDWbvXNTUPiuaRX/NImV7bLuZQQ0eUczzQdcmERb3+7o3K0DGmh2gJ0fQL4EX2JAqObYCshIjdPKkh3DlTTvcfh0UkTWdZ2F8wI6aYsfJrlsF50jVhzq0EZLaATuL7qf8QUBFtAzlFxPWctI=; 5:rbw/2+MYcViPJsPsJC2BjUpaWqAb0BLrSBUhoqmvguJf+wCGVJp2UvP7zmyN/VDb7mP+Ui0sD2XPmwGycpWRkwtmc1mAVLH4ZoXSVJYi/ukEtLU5vQwzGyOE96r4IweFKzZdQY+95+OD4riaJuVARxSnbN0Wg2OLzb23UOr/E9o=; 24:qbQfFy1uuF2Dvo9fthh9CjznRJDj15EBjuznJ8oLWAf7J2mFBf26+SbceIaJAbrxzP1FU80Okx/zKdDm+kh8LlZSTwzA+BdJ1dchKpZrbns=; 7:nR8YQyhFOdU2tB9lJfGFA0gr2X0JQOoUX9RC6ibndwqPbZTVFeqAikhe0dy2ESsPWOLoVTQx8zz5LxHpkoh7+wq5TkacGUriUzhMHA2ZzDULn9CqIfNhzfVdkX8OVbOvKYRzj21ngqi3N0zLDnwvKeSb1fmGPHXuXezYoazXAvtH9LoJGbqDG0hZhG4UF1Ab/cBU0bcRS4SnHpreGH6dc6nC6FellZS1PBdckDsCbIMqDoL9+LdCBGYqTVea/9Jt
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: e306fdfc-869c-49fb-2efd-08d5434638cf
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(5600026)(4604075)(4534020)(4602075)(4627115)(201703031133081)(201702281549075)(2017052603307); SRVR:MWHPR16MB1488;
x-ms-traffictypediagnostic: MWHPR16MB1488:
x-microsoft-antispam-prvs: <MWHPR16MB148804FF4C7EE92506787ADE930A0@MWHPR16MB1488.namprd16.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863)(72170088055959)(192374486261705)(94390896966249)(94626863071701);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(2401047)(5005006)(8121501046)(93006095)(93001095)(3231023)(10201501046)(3002001)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(20161123555025)(20161123560025)(20161123564025)(20161123562025)(6072148)(201708071742011); SRVR:MWHPR16MB1488; BCL:0; PCL:0; RULEID:(100000803101)(100110400095); SRVR:MWHPR16MB1488;
x-forefront-prvs: 05214FD68E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(366004)(396003)(346002)(376002)(53754006)(51414003)(189003)(199004)(10290500003)(6512007)(9686003)(3280700002)(229853002)(68736007)(450100002)(6246003)(478600001)(6436002)(6116002)(102836003)(77096006)(6486002)(81166006)(105586002)(8936002)(33656002)(1600100001)(3660700001)(86362001)(25786009)(6306002)(8676002)(106356001)(81156014)(53936002)(2906002)(5660300001)(316002)(93886005)(2900100001)(2501003)(110136005)(15974865002)(99286004)(7736002)(97736004)(76176011)(966005)(59450400001)(74316002)(6506007)(2950100002)(53546011)(14454004)(305945005)(9010500006); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR16MB1488; H:MWHPR16MB1488.namprd16.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: symantec.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: e306fdfc-869c-49fb-2efd-08d5434638cf
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Dec 2017 22:58:41.4385 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 3b217a9b-6c58-428b-b022-5ad741ce2016
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR16MB1488
X-OriginatorOrg: symantec.com
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupkleLIzCtJLcpLzFFi42LhivJm1VVjMo4yaFsibfHygLHFlP5OJgcm jyVLfjIFMEZx2aSk5mSWpRbp2yVwZTQ1/WYtuBJccerWC9YGxq/OXYycHBICJhKNC36zdzFy cQgJfGSUODTrAksXIwdY4tFfd4j4T0aJmbOnsUE4Rxkl/n7vgnJeMEpMfLaSCcRhEehklph/ 4Q0jRGYKk8TEvy+ZIJwjjBK3Oqaxg2xkE9CTOPr3DiuILSLgJbHywlZmEFtYwFBi19omJoi4 kcTn56vZQQ4BsR/eUQUJswioSnzauBaslVcgRuLspUaoZZNZJTY0HmIFqecUiJXYcVEXpIZR QEzi+6k1YCOZBcQlbj2ZzwTxtIDEkj3nmSFsUYmXj/+xQtTHSJxa+woqbi3RdvcEVL2sxKX5 3YwQ9iF2iaY+NQhbT2LrxLdQcV+JyztOgv0rIbCEUWLHgdNsEAktieVNU9gggZotsaMvDSJc A3RmC9MERqNZSM6DsA0k3p+bzwxha0ssW/gazOYVEJQ4OfMJywJGllWMConFScW5JfmlJYkF qQaGesWVuckgIhGYPJL1kvNzNzGCE8gPyR2MR074HGIU4GBU4uHt2G4UJcSaWAZUeYhRgoNZ SYT3SitQiDclsbIqtSg/vqg0J7X4EKM0B4uSOO+kb2pRQgLpiSWp2ampBalFMFkmDk6pBsYV lifZV52+Kvvh1A3BiAc13VXH9WXWlGxtKvEPEHiRIX1qz8mlh/me9Qs5+/obp/u11j2P+tw2 rVaLe0nmsc11x0z8dc9PrHytu+pHQELZP4Pb1rczts5/X7OqW+Pdy5y7pxI1j7py7+bnmb2q /p3p7Ys/b1xb/OsLo938jnzXnPV2MVk7j5orsRRnJBpqMRcVJwIAo3BLyBwDAAA=
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrHIsWRmVeSWpSXmKPExsXCFeXNpavGZBxlcOSmuMXLA8YWU/o7mRyY PJYs+ckUwBjFZZOSmpNZllqkb5fAldHU9Ju14EpwxalbL1gbGL86dzFycEgImEg8+uvexcjF ISTwk1Fi5uxpbBDOUUaJv9+7oJwXjBITn61kAnFYBDqZJeZfeMMIkZnCJDHx70smCOcIo8St jmnsXYycHGwCehJH/95hBbFFBLwkVl7YygxiCwsYSuxa28QEETeS+Px8NTvIISD2wzuqIGEW AVWJTxvXgrXyCsRInL3UCLVsMqvEhsZDrCD1nAKxEjsu6oLUMAqISXw/tQZsJLOAuMStJ/PB bAkBAYkle84zQ9iiEi8f/2OFqI+ROLX2FVTcWqLt7gmoelmJS/O7GSHsQ+wSTX1qELaexNaJ b6HivhKXd5wE+1dCYAmjxI4Dp9kgEloSy5umsEECNVtiR18aRLgG6MwWqPoFzBLrn82GqpeR uLNwH/MERr1ZSO6GsA0k3p+bzwxha0ssW/gazOYVEJQ4OfMJywJGllWMConFScW5JbkliYkF mQaGesWVuckgIhGYPJL1kvNzNzGCE8hvsR2MB/74HGIU4GBU4uF90GwUJcSaWAZUeYhRmoNF SZz3sQZTlJBAemJJanZqakFqUXxRaU5q8SFGJg5OqQbGw9MqFOeEhX4S9C2f+WOHW8Clfz13 Be3evDw3P6Xu0/0fLs4Z1eU1s6aXdtzYtfP3ds4/Uz4/WXRz7TuTz4UFT9+Jzl8243vzojzG xxzRy2QEaiv1DKe5Lfyg9j5QS0Dctmfz73fXm3aK3/2iFiTOMLsmQWPW1CX/Yk85sHJvMz11 Y/2JskevlZVYijMSDbWYi4oTASeZ0WYBAwAA
X-CFilter-Loop: ASB01
Archived-At: <https://mailarchive.ietf.org/arch/msg/patient/KYB-zbelNlvkQjBROdadD1JbSh8>
Subject: Re: [Patient] Internet Draft posted as requested -
X-BeenThere: patient@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Protecting against Attacks Tunneling In Encrypted Network Tunnels <patient.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/patient>, <mailto:patient-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/patient/>
List-Post: <mailto:patient@ietf.org>
List-Help: <mailto:patient-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/patient>, <mailto:patient-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Dec 2017 22:58:50 -0000

Thank you everyone for your comments!

The request in Singapore for an Internet Draft seemed focused on an ask for data, so I tried to keep the v00 focused on the data, and concise to be easily read quickly, and I thought that I might be going onto a limb beginning to present some of the logic, but it seems like many are hungry for more of the logic (or "at least some logic" as they might say) so I’ll present more of the logic.  Of course, much of the logic was presented in the near 40 slides sent earlier and roughly 5 pages of Q&A, but I agree with the merits of centralizing all of the logic in an Internet Draft, so I’ll aim to do that in the v01, and, perhaps more importantly, I also hear clearly some of the concerns on how the logic was organized (or unorganized or disorganized as some might say) in Singapore, so I’ll try to be more clearly structured both here and in more detail in the v01.  I’ll comment on the solutioning further below, but since so many seem so hungry for the logic, I’ll try present it relatively concisely here so that discussion here can best shape the v01 which will pull from the list, the slldes, and more.
 
The logic, in the short form of roughly five points would be:
** (1) ** Endpoints have vulnerabilities.  ( unfortunately lots of them.  For this part I believe there is overwhelming evidence, but please LMK if you disagree. )
** (2) ** These vulnerabilities are often difficult (sometimes nearly impossible) for device owners, users, etc, to mitigate “in” these endpoints. ( this is true today for countless devices, and increasingly true for increasingly closed devices, particularly in IOT and mobile. )
** (3) ** For that reason, those endpoint owners/users/etc often need to put some “thing” in the network to mitigate those endpoint vulnerabilities.
** (4) ** For that to be effective (against attacks in encrypted traffic), that “thing” needs keys to inspect the encrypted traffic.  ( This can be done any of many ways, as it’s done today. )
** (5) ** Where that’s done today, it can be done much more safely, therefore we should spec standards for how to do it more safely.  ( Lots of ideas have been published in research, and I include some details on that further below, but maturing the right ones and baking them into a standard is of course typically a “bigger group” effort. )
 
In that framework, I’d love to know which of these 5 points above (if any) are agreeable to you, and which specifically you believe are either simply dead wrong or the right-best focus of constructive discussion.  For some it seems that point (3) above is the most controversial, but others are already asking the details of (5) which is where the slides focused, but the v01 will of course cover both in depth, and, as promised, I'll give some points on (5) below.
 
On the solutioning, as mentioned at the side-meeting, lots of solutions have been proposed in research communities, but I believe it’s important to get aligned on the problems we’re solving as a community before picking a solution.  As mentioned at the side-meeting, solutions proposed by the research community include Stickler by Boneh & team at Stanford, plus the unfortunately named mcTLS and mbTLS efforts, and more, but I believe it’s important to get aligned on the problems we’re solving as a community before picking a solution.  Once we’re aligned on (1) through (5) above then it makes more sense to get into the specific problems with (4) which (5) tries to address, including (a) retaining end-to-end integrity, (b) giving endpoints more precise control over when, where, and how such protection is delivered from the network, in strong contrast today’s all-or-nothing just-install-a-root approach.
 
To address some of the other important questions and concerns raised over the past day…
 
Re, “does not specify a new protocol,” many of the potential/candidate protocols were mentioned at the side-meeting, in the notes of the side-meeting, in the slides presented at the side-meeting, and in the email to announce the side-meeting, but I’m happy to add them to the v01 to keep everything together in a single Internet Draft.  For context, as Stephen pointed out, his ask was not for an Internet Draft of a protocol, but for the data (and logic) of why it might help to spec a new and/or additional protocol.  Re, “It does not specify a concrete problem (use cases),” again these were mentioned at the side-meeting, in the notes of the side-meeting, in the slides presented at the side-meeting, and in the email to announce the side-meeting, but I’m happy to add them to the v01 to keep everything together in a single Internet Draft.

Re, “It does not specify any kind of architecture,” as above, covered before, but I’m happy to add it to the v01 of an Internet Draft to get everything together in a single Internet Draft.  These seem like constructive requests, even if the material was covered elsewhere already.  Thank You Again!

Similarly, if anything is missing from the notes, I’m eager to be sure this discussion fairly and deeply captures _all_ views, particularly opposing views, so where there are gaps in the 7 pages of notes we took, those gaps are absolutely not intentional.  I’m eager to see any omissions rectified, so please send any additions, corrections, etc, either to this list or to me personally.  Either way, I’m eager to be sure everyone sees all views and hears all concerns and that all of those concerns are included and/or addressed somehow in a v01.

Re, “pervasive monitoring should make way for network based monitoring,” I wasn’t trying to say that and in fact, from the slides you can clearly tell that PATIENT is aiming to more completely block pervasive monitoring.  Crypto helps block pervasive monitoring by listeners in the network.  Pervasive monitoring is also possible by hacking all the endpoints, and as presented in the side-meeting, we have ample evidence of nation-states attempting to do this.  PATIENT aims to make safer prevention of the latter approach to pervasive monitoring.

Re, “draft-mm-wg-effect-encrypt,” you’re absolutely right, and I’ll cite that work in the v01 for precisely those reasons.  In fact, my aim is to (eventually, after we get aligned on scope, etc,) design a protocol that allows network security appliances to yet more safely work hand-in-hand with pervasive encryption.  I’m not trying to push back against pervasive encryption at all.  I suspect I might have to keep repeating myself on that until people believe it?

Re, “So far, I am still not convinced that a SOCKS proxy … connected via a VPN, is not sufficient to filter out malicious data.”  I believe connecting proxies via VPN is a great way to help block malicious data.  I’m also not debating the type of proxy to be used.  As you know, and as the slides say, and as the v01 will say, I’m saying that when proxies change stuff, it would help for the endpoint to know which proxy changed what where.  Stickler helps with that.  I think it also helps for endpoints to know more about the proxy on the other side of the VPN, but I’d be happy for that to be in-scope or out-of-scope for a first WG on this. Re, “from your conversations and presentations (not from this document),” you raise a very fair point.  Although the original ask was not to put “everything” into a single Internet Draft, putting “everything” into a single Internet Draft seems like a great idea, so I’ll aim to do that with v01.

Regarding “months later,” this seems to be at least a mild exaggeration as the meeting was one month ago tomorrow.

Regarding “all in a non-verifiable manner,” I thought counting phishing websites would be easy enough for anyone who really wanted to test a hypothesis instead of standing on rhetoric.  PhishLabs seemed to manage that OK.  I haven’t counted all of the https sites in PhishTank yet, but at first glance the fraction seems substantial.  Admittedly, not all of the data is directly verifiable, nor did I ever promised that _all_ of the data would be directly verifiable, but counting phishing sites seemed easy enough.  Please LMK if I’m wrong on that point.  The other sources seem to corroborate each other.

Regarding posting to the “Threat Response Blog,” we’ll consider that, but the ask to us was to share more data here so we brought the data here as requested.

As a side comment, I’d also note the use of pejorative phrasing.  “argues for the mitm attacks on https,” … It seems that you’re calling “network based blocking of malicious webpages” an “attack” when the blocking is actually blocking the server's _attack_ against the client.  Where I choose to have a network proxy protect from evil on the net, I don’t consider that proxy to be attacking me.  I consider that proxy to be protecting me, and many organizations manage keys accordingly.  We see more and more people needing network help in protecting themselves from such attacks, as laid out in (1) through (5) above.  I look forward to your feedback there.
 
Thank you again -
      
Cheers,
Brian


From: Brian Witten
Sent: Wednesday, December 13, 2017 3:55 PM
To: patient@ietf.org
Subject: Internet Draft posted as requested -
  

Hi Everyone,

With the Wired article last week (  https://www.wired.com/story/phishing-schemes-use-encrypted-sites-to-seem-legit/ ) ... I wanted to get the Internet Draft ( https://www.ietf.org/id/draft-witten-protectingendpoints-00.txt ) posted publicly for others to comment sooner rather than later.  Of course, feel free to comment here on the list  or just me comments 1:1 at bwitten@symantec.com.  Thank You Either Way!

 https://media.wired.com/photos/5a25b22aa587381053b48abb/191:100/pass/PhishingHTTPs-FeatureArt.jpg 

Phishing Schemes Are Using Encrypted Sites to Seem Legit
www.wired.com
A green padlock might make it seem like a site is secure, but increasingly phishers are using it to lure victims into giving up sensitive info.

Looking Forward,
Brian