Re: [Pearg] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?

John Mattsson <john.mattsson@ericsson.com> Wed, 04 January 2023 17:07 UTC

Return-Path: <john.mattsson@ericsson.com>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1731FC1522B0 for <pearg@ietfa.amsl.com>; Wed, 4 Jan 2023 09:07:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.089
X-Spam-Level:
X-Spam-Status: No, score=-2.089 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_TVD_FUZZY_SECURITIES=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rBVZ674E_-dQ for <pearg@ietfa.amsl.com>; Wed, 4 Jan 2023 09:07:36 -0800 (PST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on2052.outbound.protection.outlook.com [40.107.8.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 76391C151709 for <pearg@irtf.org>; Wed, 4 Jan 2023 09:07:36 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eGcT2yJ4u+H9By40ou10f8OZKtCE7V10AlGl5Xw5XcxjlZqpDdLEJhrj3akiy2alsN0sk7+GLV363IeDXKTbrc0xGwRegc9HvDYl7M3W/JIhA2y4dIZkrmsvnvybtG7z2Gb44p9VZo1zL5J4TMoZav1BLrqbI9TQqkumoJRI0rtPFjJoAVF3NJMQSFjlwpb315gaFw3Jx3ZLWIGcxAvJEsTaBH2gdT7jxUlUD9Of0zk8Drf3lRKQ52jdWjQlN3PUDjFPV03TFEULtl55KBmvmWzwkfue4GWs20/3YrHfVgu9+d/N7/JkHDT3XX8p4d+rLUZZPpEcqBaiU3/JPArIaA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vbmyL6ER45Q9Kuya8RHsZe2WVT2ELviT7yf91wAP36s=; b=R+W/GhhO6RCzAtMvI5CDkmXLGIL47Khe6I5bEhiSqMKF7m0g1tSHwics8lp00RVmeRncPKDEIhcClBSbNlWr7UfjwWjMy54XVFLqFruqUQGim+o4sl1hf+4JzWRXnOk5yiTv86ZTibu9lkv3/YWadZJgw/b/X9R3nY+oxJuXev0GI1kC/5rEZ+dmSp8ygxBdOBzEl+vRA75T9nrFly5cW+QtpGwgsHCOBcWpQFEJ3colNp/XzuXofJBTFU0iGnHqU9m0nG8wf75/Rt3lX4mszOWCN2j4Bn3X9EPh7TVFQe2szIfdmLGZldijbD4lRUF5oiX5gS0FjGaeLRncPkC1ZQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vbmyL6ER45Q9Kuya8RHsZe2WVT2ELviT7yf91wAP36s=; b=FW3keYREldwBPI1Y6S3quAktoTDDxtXeTe/ecE/95rP4dHO5IbPp5EIkl+ZmCIX9YRenig4F0xtczZt8Sp5tEQ+YgtPcq0wwm3HJj+LLL13jZQSwjzGfBtAUc9cWIgtX5mgqXbiFd0IED0LV6lzDPUA5xhYo5UqYtS9qB1rTCVs=
Received: from HE1PR0701MB3050.eurprd07.prod.outlook.com (2603:10a6:3:4b::8) by DBAPR07MB6966.eurprd07.prod.outlook.com (2603:10a6:10:17f::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5944.19; Wed, 4 Jan 2023 17:07:31 +0000
Received: from HE1PR0701MB3050.eurprd07.prod.outlook.com ([fe80::fc77:42d2:1bc6:ec49]) by HE1PR0701MB3050.eurprd07.prod.outlook.com ([fe80::fc77:42d2:1bc6:ec49%12]) with mapi id 15.20.5944.019; Wed, 4 Jan 2023 17:07:31 +0000
From: John Mattsson <john.mattsson@ericsson.com>
To: Christopher Wood <caw@heapingbits.net>
CC: "pearg@irtf.org" <pearg@irtf.org>
Thread-Topic: [Pearg] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?
Thread-Index: AQHZH1ufkLvtCC06XE6xjs5DjZimWq6M3dyAgAGS4n4=
Date: Wed, 04 Jan 2023 17:07:31 +0000
Message-ID: <HE1PR0701MB3050A4C8370F5711BF65410D89F59@HE1PR0701MB3050.eurprd07.prod.outlook.com>
References: <HE1PR0701MB305098F652DBC34E3C40810B89F49@HE1PR0701MB3050.eurprd07.prod.outlook.com> <FA814364-6745-497E-B61A-FA2589797D18@heapingbits.net>
In-Reply-To: <FA814364-6745-497E-B61A-FA2589797D18@heapingbits.net>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: HE1PR0701MB3050:EE_|DBAPR07MB6966:EE_
x-ms-office365-filtering-correlation-id: 59073ebf-29ae-4e69-4ff3-08daee762a98
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR0701MB3050.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(39860400002)(346002)(376002)(396003)(136003)(366004)(451199015)(478600001)(122000001)(38100700002)(33656002)(55016003)(86362001)(38070700005)(82960400001)(6916009)(91956017)(66899015)(316002)(71200400001)(2906002)(44832011)(6506007)(7696005)(64756008)(83380400001)(66476007)(186003)(26005)(66946007)(4326008)(66556008)(76116006)(8676002)(53546011)(66446008)(41300700001)(52536014)(66574015)(9686003)(8936002)(5660300002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: OCs2sbbVdOCgy3THfCY8/ITRxkvTOTprFM2v2kDB88HtCEoImXKgglQeOv9M3xyh5fj6kSyakC0z7EmOGlLhlaVPmVTBTKZkZRxq//ryWxXlS0Dar3sYegoxf++a3zCpMaW7JlsQUc3TxYeP1frIfQtKycS+LB0KuTpzY+Ik/scOne3mBdMzXTlrStbNeBqnX/I0B/7QxtGT1qr1whY5u0kUmEfg2MyCLB7NXhZxgNfxEap+Q+DG3Ax1Wl3/0/yxbB3PQm3dc19WEnyQSrDnFpL+9rx9Yf8Vjmb50lhLHakBb4I34zbvtzRKN5b2WrkukyCX2fSNjpp3N4RcWhRJ4VSHPXtnTcIaN/B3mYR2/J5DRbYyIxE/3Hm2B22WHx1Gl6oHbVVcmq5BiXSzTiNQ/9/OKCGuDABXa9Sljf620QzJWOsOg4eBIgv5WTk7u3l6P0bO1HwBHSIfGTk1y5YCEXjlfkW3EzdwEnJm7q6/h36Iukd48MJmyQRoScktAYrMGFZ2xz6AiTeewgLFqj608VeJSacLxBkQFARTlO4JdhszOmXeO/+zIJ3ZOH59wmRR/9CVHu6eE781w783WNpX+l0V7mIo9P2zGAG5NyG6P3Qp4tPd7PkYJUYYVTgafDZ1cHEZRlrtRt04CBrxvILojz9guvvHJWkrQXZH3SJb7A1skr9TVNqpBASaNAkEgIiYu1mBxoCRzZ8E/MWIpx5oRSXnMWCfb/MEaMFXXRM3HriRyiFGHHA1W22ugeVNgzIP0NmWVWQaVpGQNoqmmGtx5HxtXNDpy1FUhlW2p+Jc036w6qU19eohoWxWiyHTn0kbWP7Y+qtqlTakeKwzzfSUJBpDtibeRj8YpF3c4gWqUnykfwc6mipmYBcXk7jaWBY7q6+kG3D2YqdjppIFlC7Lgj/yiyX9JnxUe4O/1tq7IhoxeUHQqhA6caVcUN/CPGNKa7y4s5zc5USzNo4+bZJGn9YnJ+6dkU2a5hxVvlqpYwELKPjZpyZ00mOBAGHv//ju0Dzs/tri4f8Ka3JsxeDEoXl9pA3QLdfguAOPNGTA3aDkpPtCTtcuhOR0ZmldYTJQR9veynQ0PE+5v6Dg6qE5SdApnfyTrYRDMT3fKGmbqNnaiP0+9qgEBoybW1T/QfGOMIWbKE/cNl96wzwci9gA3E51c44yf12T5zKMEbMqkrAjdbyBNgHDq6fSJsrAwg6vfXqJI7uXME6eB0abXMubzfCOefjnyukd8hMDlTOdLXe8bSbIHtPrzxJSLcUkgWJhpArqhfG53XQKsPp7/efRbFCipzVaJW2oPINISO/r+zq4ONsnQyIvRSofJcXvh2RZ8EYf1u62G0EnDnrZFLi2zoSLDMZPfL72UjtdnK3giFC2Ix9LpHz8Dy0WJrnXtk79nJS1kDxPvPmgFCznReXI1xH5iBHa7jQ1m3to0LvEoRcrtgejKMVg62TT9PiHUj3rh/ppsznyOo/CdOfHpRteHTilcJLeaXkIyRXpjo92psKdck30zxspa9UW7aZBWzKrtK7PEpXmFsrDM9uZXyucKC2tgwLZmxBM7P1Cl1VXP7qjJYm04bu2cxjFTfUdKJvNnkY7bRpFZFcIZlZY6UeLpspjtFhQzQIKfLThMH6q1wc=
Content-Type: multipart/alternative; boundary="_000_HE1PR0701MB3050A4C8370F5711BF65410D89F59HE1PR0701MB3050_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: HE1PR0701MB3050.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 59073ebf-29ae-4e69-4ff3-08daee762a98
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jan 2023 17:07:31.4366 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /ffWsFV8x0ZeeD4/by9QOf2yeJm6TFSFBKXMFguvtf3XYZkpRBIHadTuxEXmMGp0h44FhQQ1e8oZQGz1hrC/JxM7X+RgjLIzzi6ZbVeptZc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR07MB6966
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/3QPdsyf5_nUehlNuBex5hqsbD_U>
Subject: Re: [Pearg] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jan 2023 17:07:41 -0000

Happy new year Christopher!

>Can you sharpen this a bit? Do you have examples of how >functional requirements for solutions in the zero trust space align >with end-user privacy?

In the past enterprise networks and mobile core networks were
considered "trusted" and only protected with perimeter security.
Essential zero trust principles are to assume that breach is
inevitable or has likely already occurred [NSA-ZT], and to minimize
impact when breach occur [NIST-ZT]. In fact, I think basically everything
in zero trust can be derived from these two principles. With zero trust
you are suddenly requireed to assume that your supply chain might be
compromised, that all the network parths are compromised, that nodes
are compromised, and that keys are compromised. Minimizing impact
from these kind of compromises means that you are required to do things like
- Always use encryption inside the network
- Use frequent Ephemeral Diffie-Hellman (e.g., every hour and 100 GB)
- Nodes should only share data on a need-to-know basis
- Decentralize storage so that breach of one node only gives part of the data
- Hide metadata like identities so that an attacker cannot se how is talking to who.
- etc.

I think all of the above are also things that should be done for end-user privacy

   [NIST-ZT]  National Institute of Standards and Technology,
              "Implementing a Zero Trust Architecture", December 2022,
             <https://www.nccoe.nist.gov/sites/default/files/2022-12/
              zta-nist-sp-1800-35b-preliminary-draft-2.pdf>.

   [NSA-ZT]   National Security Agency, "Embracing a Zero Trust Security
              Model", February 2021, <https://media.defense.gov/2021/
              Feb/25/2002588479/-1/-1/0/
              CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF>.




From: Christopher Wood <caw@heapingbits.net>
Date: Tuesday, 3 January 2023 at 17:14
To: John Mattsson <john.mattsson@ericsson.com>
Cc: pearg@irtf.org <pearg@irtf.org>
Subject: Re: [Pearg] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?
(-other lists except PEARG)

Happy new year, John! Thanks for this message. I have one question inline below.

> On Jan 3, 2023, at 5:27 AM, John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org> wrote:
>
> After Snowden, IETF certainly did talk the talk , but I think it does not always walk the walk. The average amount of privacy in new RFCs has certainly gone up and there are many great new mechanisms like QUIC, Privacy Pass, and OPAQUE. The minimum level in IETF is however still too low. IETF is e.g., still producing new standards without forward secrecy and identity protection and are not changing the status of old standards track RFCs that are no longer aligning with best practice security and privacy practices.
>
> - Forward secrecy: To always use ephemeral Diffie-Hellman got a lot of discussion after Snowden, but unfortunately the IETF is still producing standards track documents without forward secrecy, e.g., using PSK key exchange, or storing session keys. IETF seems to also mostly have forgotten additional properties that has often been included in the term PFS (RFC 2828). Assuming breach like key compromise is an essential zero trust principle.
>
> - Identity protection: IETF is still producing standards track documents without identity protection. E.g., reusing PSK identifiers or sending unencrypted signatures. Why is IETF adopting bad PSK practices from old mobile generations when 3GPP is working hard to mitigate its PSK vulnerabilities with ECIES and ECDHE?
>
> - NULL algorithms: NULL encryption should have no place in two party protocols at all. AES-GCM is as fast as integrity only or even non-cryptographic CRC.
>
> - IP layer: While the transport layer and application layer has seen significant improvements such as QUIC and HTTP/3 and the link layer has seen improvements with MAC randomization, not much has happened at the Internet layer. IP addresses are still not only long-lived trackable identifiers, but they also reveal your location.
>
> - Threat Model: The IETF has failed to update the Internet Threat Model to include compromised endpoints, misbehaving endpoints, and large centralized information sources. This is very disappointing as these things were, and still are major enablers for pervasive monitoring. Assuming compromise is an essential zero trust principle. The excellent IAB document RFC 7624 that talks about compromise and exfiltration deserve much more citations.
>
> - Old RFCs: How should we handle old security- and privacy-related standard track RFCs? I think being standards track signal that IETF thinks the mechanism still provides best practice security and privacy. Most 10-year-old standard track documents are no longer living up to best practice. The current system makes it very hard to change the status of RFCs. Should RFCs automatically be downgraded to informational unless there is consensus that they still provide best practice security and privacy?
>
> Now when ten years have passed, I think the IETF should analyze how we did. Where did we succeed, where did we fail, and what can we do better in the future? An interesting development is that requirements for privacy and zero trust often aligns.

Can you sharpen this a bit? Do you have examples of how functional requirements for solutions in the zero trust space align with end-user privacy?

Best,
Chris, no hat