Re: [Pearg] [saag] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?
Phillip Hallam-Baker <phill@hallambaker.com> Thu, 05 January 2023 16:02 UTC
Return-Path: <hallam@gmail.com>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0634DC1AFF68; Thu, 5 Jan 2023 08:02:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.399
X-Spam-Level:
X-Spam-Status: No, score=-1.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.249, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F9_r0TOIQL_w; Thu, 5 Jan 2023 08:02:43 -0800 (PST)
Received: from mail-oi1-f180.google.com (mail-oi1-f180.google.com [209.85.167.180]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D181FC1516F2; Thu, 5 Jan 2023 08:01:21 -0800 (PST)
Received: by mail-oi1-f180.google.com with SMTP id s187so32266911oie.10; Thu, 05 Jan 2023 08:01:21 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=StIW4wFM663AQw6OFBMlEEFkG7p1EJH3whCCmNWcvmU=; b=Yy2gyICgDiSHCkAjr8l8Y6BeD9enuPxDCRyiK6N3eqWeG6KY3MvNQE/a2XvoQgFmn7 +aWM6xz88k0UWsT3DfOGoIlezZ5AMnJlgOz/UMpTHVO5Az9WB6nQOji8zMi0tQd/pTKA ItgnyZ+d7XPY35seAojnjEPHQ9QTf/OlNMlrWgSrfs45e3D7DjXbBh7CETNPpr8cWgnx 3hc6SdrBtHf6b7F0Z2HuANYcjrVMxRfWqZZqpLBYNh61SZ2oL1jhBxR7Wws9/3ojCnZ6 uBPsO27oG7yyaLwKi5AGHqJAPefSwgP3clRrabqB/flSoPp0maBjum3pQKyeiE4gRPFb zkgQ==
X-Gm-Message-State: AFqh2kpXm9DtMhWuHqzjPODQ4XEYDbjLthNEeWN9XJ7WMf0fgldtMI7T ka5zZl2b2X8wcnPXNHgB7k4hvDvfFPHH/YvtaB5JXhcyG7Q=
X-Google-Smtp-Source: AMrXdXupH5sWWO/SqAKnJ7kbY5YhcHTahGFQVpxawvTPqJ2pajUqz6Uw+5IQLNpGd+zPQcnXqhVpVrtLh49Mfo44zwM=
X-Received: by 2002:aca:1717:0:b0:35e:4c50:a52c with SMTP id j23-20020aca1717000000b0035e4c50a52cmr2314673oii.244.1672934480891; Thu, 05 Jan 2023 08:01:20 -0800 (PST)
MIME-Version: 1.0
References: <HE1PR0701MB305098F652DBC34E3C40810B89F49@HE1PR0701MB3050.eurprd07.prod.outlook.com> <764163366.39904.1672842828297@appsuite-gw2.open-xchange.com> <CABcZeBNA_nJ2waQVENUvEXro91wAYOcH0ZxWqbLH4hoKcGkosw@mail.gmail.com> <9658281.42904.1672912808774@appsuite-gw2.open-xchange.com> <CA+9kkMBLiijcAyLYn_6h8z3N00EDaxdP=f7P2-qUt4Bn1iSWEg@mail.gmail.com> <HE1PR0701MB30505DC24A725E014D60FE0189FA9@HE1PR0701MB3050.eurprd07.prod.outlook.com> <CABcZeBPc0r275AiCL=qWTnzFT9PoQ9WMHz+GcmQZG8pgv2dmbw@mail.gmail.com>
In-Reply-To: <CABcZeBPc0r275AiCL=qWTnzFT9PoQ9WMHz+GcmQZG8pgv2dmbw@mail.gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Thu, 05 Jan 2023 11:01:09 -0500
Message-ID: <CAMm+LwhZh89O7yWSDG914xP7T8EEgBhimm8LziUyarY0aQT2TA@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
Cc: John Mattsson <john.mattsson@ericsson.com>, "ietf@ietf.org" <ietf@ietf.org>, "pearg@irtf.org" <pearg@irtf.org>, Vittorio Bertola <vittorio.bertola@open-xchange.com>, saag <saag@ietf.org>, "hrpc@irtf.org" <hrpc@irtf.org>
Content-Type: multipart/alternative; boundary="0000000000007757a305f1866973"
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/dpMRCFhnMpvvTBRKC2EuxX0HNz0>
Subject: Re: [Pearg] [saag] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jan 2023 16:02:46 -0000
On Thu, Jan 5, 2023 at 8:59 AM Eric Rescorla <ekr@rtfm.com> wrote: > Hi John, > > Thanks for raising this topic. I would make a few points here. > > 1. I've heard the term "zero trust" used in a number of ways, ranging > from "use a network architecture that doesn't involve firewalls" to > "blockchain". So I'm not sure that talking about "today's zero trust > principles" is going to get us very far. > +1 Zero Trust is a marketing term and has been rendered meaningless by everyone calling their stuff 'zero trust' regardless of what it is. Since every security system requires a degree of trust in something, the pretense of zero trust is actively damaging as it leads to incorrect analysis. > 2. I agree that there are very significant threats to people's > security and privacy at the endpoints, from a number of sources, > including (1) software that was installed for users without their > consent (2) software that they intended to install and does not behave > the way that they expect and (3) direct attack on the software on > their machines. > Agree. > 3. Essentially none of these threats are the province of the IETF, > which defines networking protocols. We are not well positioned to > either (1) improve the security of those endpoints or (2) address > situations in which the software on the endpoint is directly attacking > the user's privacy, e.g., by leaking their browsing behavior within an > app. > There we disagree. Endpoint security isn't my primary concern but a lot of what we do in IETF affects endpoint security. The #1 way in which endpoint compromise occurs is that a malicious payload is sent to an individual via SMTP. This persists because it is not one problem, it is multiple problems and everyone can point to other people for being at fault. Let me be clear here, if your enterprise can collapse because some junior employee presses the wrong button, that is the fault of the CEO and CISO, it is not the fault of the employee. So what are the real causes? 1) SMTP lacks authentication of sender origin to the end user so anyone can impersonate other company employees. 2) MIME allows attachments with active content. 3) Commonly used applications automatically run active content with no authentication of origin. 4) Existing mechanisms to sign active content are utterly unfit for use in a corporate environment. The first two are very clearly within IETF scope and so is any solution to the third. Can the IETF come up with a complete solution on its own? Probably not, but the IETF can be a part of a broader solution. If the necessary players are not in the room, get them there. MIT and the Kennedy School have no difficulty getting senior current and past leaders in the intelligence and information security world to attend their Chatham House rules cyber events. Preventing endpoint compromise is a major concern to the NSA and cybercommand and EU equivalents. It is certainly not a hopeless situation either. There is no iron law that says that a corporation has to use the same email system for internal and external mail. If a corporation deploys a separate email for internal communications and SMTP is handled by a separate system which entirely blocks active attachments, risk of endpoint compromise through impersonation attacks is considerably reduced. If the new internal email system is also built on an open standard and supports open federation with other systems, it can eventually replace SMTP. 4. I agree that there are some modifications to those protocols (you > raise PFS above, and also in some cases PCS, but perhaps even moreso, > the use of replayable identifiers such as passwords and cookies) that > would somewhat improve the resistance of those protocols to attack on > the endpoints. In my experience, the IETF does take these forms > of attack reasonably seriously. > The problem is that it has taken this long for the industry to bite the bullet and recognize that we have to get rid of the passwords completely when we have known they are broken and unfixable since 2000. The route to ubiquitous use of FIDO/PassKey is to get everyone using a ubiquitous, open, interoperable credential vault that supports passwords and passkeys and is not tied to a single proprietary walled garden. And of course, the industry keeps failing at that because the goal for the BigTech players is to keep people inside their walled gardens. Doing that right is another thing the IETF could be doing but isn't. > 5. The oft-cited RFC 3552 language about assuming the endpoints > doesn't reflect a lack of awareness that endpoints can be compromised; > we were well aware of such attacks at the time we wrote 3552. Rather, > it's about the separation of concerns and having the protocol > pieces do what they are able to do: > > The Internet environment has a fairly well understood threat model. > In general, we assume that the end-systems engaging in a protocol > exchange have not themselves been compromised. Protecting against an > attack when one of the end-systems has been compromised is > extraordinarily difficult. It is, however, possible to design > protocols which minimize the extent of the damage done under these > circumstances. > > As you can see, this text explicitly acknowledges the possibility > of endpoint compromise and considers that it is possible to > partly mitigate it, as I said above. I think we should continue > to ask the question of whether we could do better in this area, > as you do above, but I think that the most appropriate way > for the IETF (as opposed to other organizations, such as, say > TC39 or Bytecode Alliance) to do this is to focus on improving > our protocols. > I agree with the sentiment. But a heck of a lot of water has gone under the bridge since 3552. What was an acceptable security approach then isn't today. 20 years ago the prevailing mindset was that one compromise meant game over. We don't build systems like that any more. We consider issues like implementation flaws, compromise of TTPs, and a lot of other things we didn't then. And here is the most important part, we don't just analyse the security of components, we look at the systems. I can't give you an architecture that will guarantee that you are safe in every possible eventuality, but I can provide protection that is robust unless there are multiple failures in multiple different systems. That is why zero trust is such a bad slogan, if you want robust, practical security you have to divide trust between multiple systems and parties so that you don't trust any one of them absolutely and multiple parties have to defect or systems have to fail for a breach to occur. I have the code, I have the specifications, they are clearly within scope of what IETF says it wants to do. But nobody seems interested in doing anything more than tinker with existing protocols.
- [Pearg] Ten years after Snowden (2013 - 2023), is… John Mattsson
- Re: [Pearg] Ten years after Snowden (2013 - 2023)… Christopher Wood
- Re: [Pearg] Ten years after Snowden (2013 - 2023)… Brian E Carpenter
- Re: [Pearg] Ten years after Snowden (2013 - 2023)… Phillip Hallam-Baker
- Re: [Pearg] Ten years after Snowden (2013 - 2023)… Christian Huitema
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Dino Farinacci
- Re: [Pearg] Ten years after Snowden (2013 - 2023)… Dave Taht
- Re: [Pearg] [hrpc] Ten years after Snowden (2013 … Adrian Gropper
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Stewart Bryant
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Eliot Lear
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Antoine FRESSANCOURT
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Lloyd W
- Re: [Pearg] [saag] Ten years after Snowden (2013 … George Michaelson
- Re: [Pearg] [hrpc] Ten years after Snowden (2013 … Niels ten Oever
- Re: [Pearg] Ten years after Snowden (2013 - 2023)… Vittorio Bertola
- Re: [Pearg] Ten years after Snowden (2013 - 2023)… Dave Taht
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Phillip Hallam-Baker
- Re: [Pearg] Ten years after Snowden (2013 - 2023)… John Mattsson
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Stewart Bryant
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Eric Rescorla
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Christian Huitema
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Dino Farinacci
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Dino Farinacci
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Dino Farinacci
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Eliot Lear
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Brian E Carpenter
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Phillip Hallam-Baker
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Tony Rutkowski
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Vittorio Bertola
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Ted Hardie
- Re: [Pearg] [saag] Ten years after Snowden (2013 … John Mattsson
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Tony Rutkowski
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Brad Chen
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Kyle Rose
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Antoine FRESSANCOURT
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Eric Rescorla
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Brad Chen
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Tony Rutkowski
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Alan DeKok
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Tony Rutkowski
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Phillip Hallam-Baker
- Re: [Pearg] [EXT] Re: [saag] Ten years after Snow… Vittorio Bertola
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Alan DeKok
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Dave Taht
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Tony Rutkowski
- Re: [Pearg] [hrpc] Ten years after Snowden (2013 … Stephen Farrell
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Dino Farinacci
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Deen, Glenn (NBCUniversal)
- Re: [Pearg] [hrpc] [saag] Ten years after Snowden… bzs
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Phillip Hallam-Baker
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Dino Farinacci
- Re: [Pearg] [hrpc] [saag] Ten years after Snowden… Laurence Lundblade
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Mark Nottingham
- Re: [Pearg] [hrpc] [saag] Ten years after Snowden… Abdussalam Baryun
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Brad Chen
- Re: [Pearg] [hrpc] [saag] Ten years after Snowden… Laurence Lundblade
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Phillip Hallam-Baker
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Phillip Hallam-Baker
- Re: [Pearg] [hrpc] [saag] Ten years after Snowden… Adrian Gropper
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Dino Farinacci
- Re: [Pearg] [saag] [hrpc] Ten years after Snowden… Tony Rutkowski
- [Pearg] times square 15 sec delay new years Dave Taht
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Dan Harkins
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Vittorio Bertola
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Alec Muffett
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Tony Rutkowski
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Alec Muffett
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Mark Nottingham
- Re: [Pearg] [hrpc] [saag] Ten years after Snowden… Vittorio Bertola
- Re: [Pearg] [hrpc] [saag] Ten years after Snowden… Ted Lemon
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Phillip Hallam-Baker
- Re: [Pearg] [hrpc] [saag] Ten years after Snowden… Phillip Hallam-Baker
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Tony Rutkowski
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Phillip Hallam-Baker
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Tony Rutkowski
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Lloyd W
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Phillip Hallam-Baker
- Re: [Pearg] Ten years after Snowden (2013 - 2023)… Fernando Gont
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Fernando Gont
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Luigi Iannone
- Re: [Pearg] [saag] Ten years after Snowden (2013 … Christian Huitema