Re: [Patient] Internet Draft posted as requested -

"Black, David" <David.Black@dell.com> Fri, 15 December 2017 17:07 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: patient@ietfa.amsl.com
Delivered-To: patient@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB1CC1293D8; Fri, 15 Dec 2017 09:07:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.721
X-Spam-Level:
X-Spam-Status: No, score=-2.721 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=dell.com header.b=dIPKxxUK; dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=emc.com header.b=mZx7AxIs
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CAOaFQpexar5; Fri, 15 Dec 2017 09:07:42 -0800 (PST)
Received: from esa3.dell-outbound.iphmx.com (esa3.dell-outbound.iphmx.com [68.232.153.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C61471200CF; Fri, 15 Dec 2017 09:07:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=dell.com; i=@dell.com; q=dns/txt; s=smtpout; t=1513357057; x=1544893057; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=FwZ0claBRmA8K61twj9zYExSwx9shsECqfsMnITCLF0=; b=dIPKxxUKUcmTBJ1c2UX+DqN88MosqxMT9HX1mUKe4lqUe2S6yR/sD/d6 8qh1muQeQOy2AGB3QnQbUHCIB8tHdJgJ8F6tVeTDO1V4mOsSnDsYxfqwA dUfpvEISpSBZsuzz4WHQ9vA631etZlSg2RyEczqGmf99EX71AxD4/U0IV Y=;
IronPort-PHdr: 9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A2G0AAC8/zNah8uZ6ERaAxwBAQEEAQEKAQGCbCOBFXQnB4RymDKCAJcgFIE+GygKGAuFGAKFAEEWAQEBAQEBAQEBAQIQAQEBCA0JCCgvgjgkAQ5LIQYGAQEBAQEBJgEBAQEBAQEBAQEBAQEBAQEBARcCLRABEgIYAQEBAwEBAT4JFg8MBAcEAgEIEQEDAQELHQcnCxQDBggCBAESCAwHigcIAQ+rQ4MRh0QBAQEBAQEBAQEBAQEBAQEBAQEBAQEVCINlBIEOXgEQEYFXhAaBDoMuAYE7ARIBCRgfJoJ/gjKKUwkTh32QSQYCh3yDJUyLUoYThBCHOI0YiTACBAIEBQIagTsmBoENb29RgikJgkoFCwyBZ3gqh2KBJYEVAQEB
X-IPAS-Result: A2G0AAC8/zNah8uZ6ERaAxwBAQEEAQEKAQGCbCOBFXQnB4RymDKCAJcgFIE+GygKGAuFGAKFAEEWAQEBAQEBAQEBAQIQAQEBCA0JCCgvgjgkAQ5LIQYGAQEBAQEBJgEBAQEBAQEBAQEBAQEBAQEBARcCLRABEgIYAQEBAwEBAT4JFg8MBAcEAgEIEQEDAQELHQcnCxQDBggCBAESCAwHigcIAQ+rQ4MRh0QBAQEBAQEBAQEBAQEBAQEBAQEBAQEVCINlBIEOXgEQEYFXhAaBDoMuAYE7ARIBCRgfJoJ/gjKKUwkTh32QSQYCh3yDJUyLUoYThBCHOI0YiTACBAIEBQIagTsmBoENb29RgikJgkoFCwyBZ3gqh2KBJYEVAQEB
Received: from esa5.dell-outbound2.iphmx.com ([68.232.153.203]) by esa3.dell-outbound.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 15 Dec 2017 10:57:36 -0600
From: "Black, David" <David.Black@dell.com>
Received: from mailuogwdur.emc.com ([128.221.224.79]) by esa5.dell-outbound2.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 15 Dec 2017 23:01:33 +0600
Received: from maildlpprd55.lss.emc.com (maildlpprd55.lss.emc.com [10.106.48.159]) by mailuogwprd53.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id vBFH7dUm006268 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 15 Dec 2017 12:07:40 -0500
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd53.lss.emc.com vBFH7dUm006268
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1513357660; bh=RVLDYlQCCyZaSvQKGiKunpHfAlw=; h=From:To:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:Content-Transfer-Encoding:MIME-Version; b=mZx7AxIs/vk3mNd7cohRyH//0EtGsIp+15fZYGnk/e2N3EVKuAFzNscRpYjMt+DGM kB8GjbWmO9Bs5/Wq3uFDshInHVFwWVogIPzUHJSyVk2zwU2nwqQGawjT1/tG8eCuV+ /nx0V6DVLmFXRVG+QDwsoTRgIw5RCCLTHdWE2bfs=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd53.lss.emc.com vBFH7dUm006268
Received: from mailusrhubprd52.lss.emc.com (mailusrhubprd52.lss.emc.com [10.106.48.25]) by maildlpprd55.lss.emc.com (RSA Interceptor); Fri, 15 Dec 2017 12:07:33 -0500
Received: from MXHUB318.corp.emc.com (MXHUB318.corp.emc.com [10.146.3.96]) by mailusrhubprd52.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id vBFH7Wf3003180 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=FAIL); Fri, 15 Dec 2017 12:07:32 -0500
Received: from MX307CL04.corp.emc.com ([fe80::849f:5da2:11b:4385]) by MXHUB318.corp.emc.com ([10.146.3.96]) with mapi id 14.03.0352.000; Fri, 15 Dec 2017 12:07:32 -0500
To: Brian Witten <brian_witten@symantec.com>, "patient@ietf.org" <patient@ietf.org>, "saag@ietf.org" <saag@ietf.org>
Thread-Topic: Internet Draft posted as requested -
Thread-Index: AQHTdG3hrR7/CZZMykmDXlV3KMVAN6NDcJ4GgAEyMYA=
Date: Fri, 15 Dec 2017 17:07:31 +0000
Message-ID: <CE03DB3D7B45C245BCA0D243277949362FE1821C@MX307CL04.corp.emc.com>
References: <MWHPR16MB14881688FE400E3277CA8A9393310@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB14889BEE3EB0ED5F328D7C3993370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB14889B7535153E5844649CA393370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB14880A12D15AC58FDD5CEC8793370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB1488D43F3B53BC7BBE9D836593370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB1488853B0E4F7BB8E557288D93370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB148845FB069D03625BC399B193370@MWHPR16MB1488.namprd16.prod.outlook.com>, <MWHPR16MB1488848D7AC828EBB8DA90B093350@MWHPR16MB1488.namprd16.prod.outlook.com> <DM5PR16MB148477E1FAA4C210A3B013F7930A0@DM5PR16MB1484.namprd16.prod.outlook.com>
In-Reply-To: <DM5PR16MB148477E1FAA4C210A3B013F7930A0@DM5PR16MB1484.namprd16.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.238.44.138]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd52.lss.emc.com
X-RSA-Classifications: public
Archived-At: <https://mailarchive.ietf.org/arch/msg/patient/_lzL26fLSfOT6km1D47OE1Mik-w>
X-Mailman-Approved-At: Fri, 15 Dec 2017 09:25:43 -0800
Subject: Re: [Patient] Internet Draft posted as requested -
X-BeenThere: patient@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Protecting against Attacks Tunneling In Encrypted Network Tunnels <patient.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/patient>, <mailto:patient-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/patient/>
List-Post: <mailto:patient@ietf.org>
List-Help: <mailto:patient-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/patient>, <mailto:patient-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Dec 2017 17:07:46 -0000

> The logic, in the short form of roughly five points would be:
> ** (1) ** Endpoints have vulnerabilities.  ( unfortunately lots of them.  For
> this part I believe there is overwhelming evidence, but please LMK if you
> disagree. )
> ** (2) ** These vulnerabilities are often difficult (sometimes nearly
> impossible) for device owners, users, etc, to mitigate "in" these endpoints. (
> this is true today for countless devices, and increasingly true for increasingly
> closed devices, particularly in IOT and mobile. )
> ** (3) ** For that reason, those endpoint owners/users/etc often need to
> put some "thing" in the network to mitigate those endpoint vulnerabilities.
> ** (4) ** For that to be effective (against attacks in encrypted traffic), that
> "thing" needs keys to inspect the encrypted traffic.  ( This can be done any of
> many ways, as it's done today. )
> ** (5) ** Where that's done today, it can be done much more safely,
> therefore we should spec standards for how to do it more safely.  ( Lots of
> ideas have been published in research, and I include some details on that
> further below, but maturing the right ones and baking them into a standard is
> of course typically a "bigger group" effort. )
> 
> In that framework, I'd love to know which of these 5 points above (if any) are
> agreeable to you, and which specifically you believe are either simply dead
> wrong or the right-best focus of constructive discussion.  For some it seems
> that point (3) above is the most controversial,

Particularly when the "thing" is inserted without any form of knowledge or authorization by the endpoint.

The discussion should be qualitatively different when the endpoint owner/user/etc. is required to do something in order to authorize the "thing" to access the endpoint's encrypted traffic.  A deployed example that may help in thinking about this is insertion of firewall decryption root certs into a browser's trust store to enable a firewall to inspect all encrypted web traffic that enters or exits a corporate network.  This is only an example - these three sentences are *NOT* a proposal to standardize anything ... but they are a report on current "running code" ...

Thanks, --David
----------------------------------------------------------------
David L. Black, Distinguished Engineer
Dell EMC, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953    Mobile: +1 (978) 394-7754
David.Black@dell.com
----------------------------------------------------------------

> -----Original Message-----
> From: saag [mailto:saag-bounces@ietf.org] On Behalf Of Brian Witten
> Sent: Thursday, December 14, 2017 5:59 PM
> To: patient@ietf.org; saag@ietf.org
> Subject: Re: [saag] Internet Draft posted as requested -
> 
> Thank you everyone for your comments!
> 
> The request in Singapore for an Internet Draft seemed focused on an ask for
> data, so I tried to keep the v00 focused on the data, and concise to be easily
> read quickly, and I thought that I might be going onto a limb beginning to
> present some of the logic, but it seems like many are hungry for more of the
> logic (or "at least some logic" as they might say) so I'll present more of the
> logic.  Of course, much of the logic was presented in the near 40 slides sent
> earlier and roughly 5 pages of Q&A, but I agree with the merits of centralizing
> all of the logic in an Internet Draft, so I'll aim to do that in the v01, and,
> perhaps more importantly, I also hear clearly some of the concerns on how
> the logic was organized (or unorganized or disorganized as some might say) in
> Singapore, so I'll try to be more clearly structured both here and in more
> detail in the v01.  I'll comment on the solutioning further below, but since so
> many seem so hungry for the logic, I'll try present it relatively concisely here
> so that discussion here can best shape the v01 which will pull from the list,
> the slldes, and more.
> 
> The logic, in the short form of roughly five points would be:
> ** (1) ** Endpoints have vulnerabilities.  ( unfortunately lots of them.  For
> this part I believe there is overwhelming evidence, but please LMK if you
> disagree. )
> ** (2) ** These vulnerabilities are often difficult (sometimes nearly
> impossible) for device owners, users, etc, to mitigate "in" these endpoints. (
> this is true today for countless devices, and increasingly true for increasingly
> closed devices, particularly in IOT and mobile. )
> ** (3) ** For that reason, those endpoint owners/users/etc often need to
> put some "thing" in the network to mitigate those endpoint vulnerabilities.
> ** (4) ** For that to be effective (against attacks in encrypted traffic), that
> "thing" needs keys to inspect the encrypted traffic.  ( This can be done any of
> many ways, as it's done today. )
> ** (5) ** Where that's done today, it can be done much more safely,
> therefore we should spec standards for how to do it more safely.  ( Lots of
> ideas have been published in research, and I include some details on that
> further below, but maturing the right ones and baking them into a standard is
> of course typically a "bigger group" effort. )
> 
> In that framework, I'd love to know which of these 5 points above (if any) are
> agreeable to you, and which specifically you believe are either simply dead
> wrong or the right-best focus of constructive discussion.  For some it seems
> that point (3) above is the most controversial, but others are already asking
> the details of (5) which is where the slides focused, but the v01 will of course
> cover both in depth, and, as promised, I'll give some points on (5) below.
> 
> On the solutioning, as mentioned at the side-meeting, lots of solutions have
> been proposed in research communities, but I believe it's important to get
> aligned on the problems we're solving as a community before picking a
> solution.  As mentioned at the side-meeting, solutions proposed by the
> research community include Stickler by Boneh & team at Stanford, plus the
> unfortunately named mcTLS and mbTLS efforts, and more, but I believe it's
> important to get aligned on the problems we're solving as a community
> before picking a solution.  Once we're aligned on (1) through (5) above then
> it makes more sense to get into the specific problems with (4) which (5) tries
> to address, including (a) retaining end-to-end integrity, (b) giving endpoints
> more precise control over when, where, and how such protection is
> delivered from the network, in strong contrast today's all-or-nothing just-
> install-a-root approach.
> 
> To address some of the other important questions and concerns raised over
> the past day.
> 
> Re, "does not specify a new protocol," many of the potential/candidate
> protocols were mentioned at the side-meeting, in the notes of the side-
> meeting, in the slides presented at the side-meeting, and in the email to
> announce the side-meeting, but I'm happy to add them to the v01 to keep
> everything together in a single Internet Draft.  For context, as Stephen
> pointed out, his ask was not for an Internet Draft of a protocol, but for the
> data (and logic) of why it might help to spec a new and/or additional protocol.
> Re, "It does not specify a concrete problem (use cases)," again these were
> mentioned at the side-meeting, in the notes of the side-meeting, in the
> slides presented at the side-meeting, and in the email to announce the side-
> meeting, but I'm happy to add them to the v01 to keep everything together
> in a single Internet Draft.
> 
> Re, "It does not specify any kind of architecture," as above, covered before,
> but I'm happy to add it to the v01 of an Internet Draft to get everything
> together in a single Internet Draft.  These seem like constructive requests,
> even if the material was covered elsewhere already.  Thank You Again!
> 
> Similarly, if anything is missing from the notes, I'm eager to be sure this
> discussion fairly and deeply captures _all_ views, particularly opposing views,
> so where there are gaps in the 7 pages of notes we took, those gaps are
> absolutely not intentional.  I'm eager to see any omissions rectified, so
> please send any additions, corrections, etc, either to this list or to me
> personally.  Either way, I'm eager to be sure everyone sees all views and
> hears all concerns and that all of those concerns are included and/or
> addressed somehow in a v01.
> 
> Re, "pervasive monitoring should make way for network based monitoring," I
> wasn't trying to say that and in fact, from the slides you can clearly tell that
> PATIENT is aiming to more completely block pervasive monitoring.  Crypto
> helps block pervasive monitoring by listeners in the network.  Pervasive
> monitoring is also possible by hacking all the endpoints, and as presented in
> the side-meeting, we have ample evidence of nation-states attempting to do
> this.  PATIENT aims to make safer prevention of the latter approach to
> pervasive monitoring.
> 
> Re, "draft-mm-wg-effect-encrypt," you're absolutely right, and I'll cite that
> work in the v01 for precisely those reasons.  In fact, my aim is to (eventually,
> after we get aligned on scope, etc,) design a protocol that allows network
> security appliances to yet more safely work hand-in-hand with pervasive
> encryption.  I'm not trying to push back against pervasive encryption at all.  I
> suspect I might have to keep repeating myself on that until people believe it?
> 
> Re, "So far, I am still not convinced that a SOCKS proxy . connected via a
> VPN, is not sufficient to filter out malicious data."  I believe connecting
> proxies via VPN is a great way to help block malicious data.  I'm also not
> debating the type of proxy to be used.  As you know, and as the slides say,
> and as the v01 will say, I'm saying that when proxies change stuff, it would
> help for the endpoint to know which proxy changed what where.  Stickler
> helps with that.  I think it also helps for endpoints to know more about the
> proxy on the other side of the VPN, but I'd be happy for that to be in-scope
> or out-of-scope for a first WG on this. Re, "from your conversations and
> presentations (not from this document)," you raise a very fair
> point.  Although the original ask was not to put "everything" into a single
> Internet Draft, putting "everything" into a single Internet Draft seems like a
> great idea, so I'll aim to do that with v01.
> 
> Regarding "months later," this seems to be at least a mild exaggeration as the
> meeting was one month ago tomorrow.
> 
> Regarding "all in a non-verifiable manner," I thought counting phishing
> websites would be easy enough for anyone who really wanted to test a
> hypothesis instead of standing on rhetoric.  PhishLabs seemed to manage
> that OK.  I haven't counted all of the https sites in PhishTank yet, but at first
> glance the fraction seems substantial.  Admittedly, not all of the data is
> directly verifiable, nor did I ever promised that _all_ of the data would be
> directly verifiable, but counting phishing sites seemed easy enough.  Please
> LMK if I'm wrong on that point.  The other sources seem to corroborate each
> other.
> 
> Regarding posting to the "Threat Response Blog," we'll consider that, but the
> ask to us was to share more data here so we brought the data here as
> requested.
> 
> As a side comment, I'd also note the use of pejorative phrasing.  "argues for
> the mitm attacks on https," . It seems that you're calling "network based
> blocking of malicious webpages" an "attack" when the blocking is actually
> blocking the server's _attack_ against the client.  Where I choose to have a
> network proxy protect from evil on the net, I don't consider that proxy to be
> attacking me.  I consider that proxy to be protecting me, and many
> organizations manage keys accordingly.  We see more and more people
> needing network help in protecting themselves from such attacks, as laid out
> in (1) through (5) above.  I look forward to your feedback there.
> 
> Thank you again -
> 
> Cheers,
> Brian
> 
> 
> From: Brian Witten
> Sent: Wednesday, December 13, 2017 3:55 PM
> To: patient@ietf.org
> Subject: Internet Draft posted as requested -
> 
> 
> Hi Everyone,
> 
> With the Wired article last week (  https://www.wired.com/story/phishing-
> schemes-use-encrypted-sites-to-seem-legit/ ) ... I wanted to get the
> Internet Draft ( https://www.ietf.org/id/draft-witten-protectingendpoints-
> 00.txt ) posted publicly for others to comment sooner rather than later.  Of
> course, feel free to comment here on the list  or just me comments 1:1 at
> bwitten@symantec.com.  Thank You Either Way!
> 
> 
> https://media.wired.com/photos/5a25b22aa587381053b48abb/191:100/pass
> /PhishingHTTPs-FeatureArt.jpg
> 
> Phishing Schemes Are Using Encrypted Sites to Seem Legit
> www.wired.com
> A green padlock might make it seem like a site is secure, but increasingly
> phishers are using it to lure victims into giving up sensitive info.
> 
> Looking Forward,
> Brian
> 
> _______________________________________________
> saag mailing list
> saag@ietf.org
> https://www.ietf.org/mailman/listinfo/saag