Re: [Pearg] [saag] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?

Phillip Hallam-Baker <phill@hallambaker.com> Thu, 05 January 2023 16:02 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0634DC1AFF68; Thu, 5 Jan 2023 08:02:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.399
X-Spam-Level:
X-Spam-Status: No, score=-1.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.249, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F9_r0TOIQL_w; Thu, 5 Jan 2023 08:02:43 -0800 (PST)
Received: from mail-oi1-f180.google.com (mail-oi1-f180.google.com [209.85.167.180]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D181FC1516F2; Thu, 5 Jan 2023 08:01:21 -0800 (PST)
Received: by mail-oi1-f180.google.com with SMTP id s187so32266911oie.10; Thu, 05 Jan 2023 08:01:21 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=StIW4wFM663AQw6OFBMlEEFkG7p1EJH3whCCmNWcvmU=; b=Yy2gyICgDiSHCkAjr8l8Y6BeD9enuPxDCRyiK6N3eqWeG6KY3MvNQE/a2XvoQgFmn7 +aWM6xz88k0UWsT3DfOGoIlezZ5AMnJlgOz/UMpTHVO5Az9WB6nQOji8zMi0tQd/pTKA ItgnyZ+d7XPY35seAojnjEPHQ9QTf/OlNMlrWgSrfs45e3D7DjXbBh7CETNPpr8cWgnx 3hc6SdrBtHf6b7F0Z2HuANYcjrVMxRfWqZZqpLBYNh61SZ2oL1jhBxR7Wws9/3ojCnZ6 uBPsO27oG7yyaLwKi5AGHqJAPefSwgP3clRrabqB/flSoPp0maBjum3pQKyeiE4gRPFb zkgQ==
X-Gm-Message-State: AFqh2kpXm9DtMhWuHqzjPODQ4XEYDbjLthNEeWN9XJ7WMf0fgldtMI7T ka5zZl2b2X8wcnPXNHgB7k4hvDvfFPHH/YvtaB5JXhcyG7Q=
X-Google-Smtp-Source: AMrXdXupH5sWWO/SqAKnJ7kbY5YhcHTahGFQVpxawvTPqJ2pajUqz6Uw+5IQLNpGd+zPQcnXqhVpVrtLh49Mfo44zwM=
X-Received: by 2002:aca:1717:0:b0:35e:4c50:a52c with SMTP id j23-20020aca1717000000b0035e4c50a52cmr2314673oii.244.1672934480891; Thu, 05 Jan 2023 08:01:20 -0800 (PST)
MIME-Version: 1.0
References: <HE1PR0701MB305098F652DBC34E3C40810B89F49@HE1PR0701MB3050.eurprd07.prod.outlook.com> <764163366.39904.1672842828297@appsuite-gw2.open-xchange.com> <CABcZeBNA_nJ2waQVENUvEXro91wAYOcH0ZxWqbLH4hoKcGkosw@mail.gmail.com> <9658281.42904.1672912808774@appsuite-gw2.open-xchange.com> <CA+9kkMBLiijcAyLYn_6h8z3N00EDaxdP=f7P2-qUt4Bn1iSWEg@mail.gmail.com> <HE1PR0701MB30505DC24A725E014D60FE0189FA9@HE1PR0701MB3050.eurprd07.prod.outlook.com> <CABcZeBPc0r275AiCL=qWTnzFT9PoQ9WMHz+GcmQZG8pgv2dmbw@mail.gmail.com>
In-Reply-To: <CABcZeBPc0r275AiCL=qWTnzFT9PoQ9WMHz+GcmQZG8pgv2dmbw@mail.gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Thu, 05 Jan 2023 11:01:09 -0500
Message-ID: <CAMm+LwhZh89O7yWSDG914xP7T8EEgBhimm8LziUyarY0aQT2TA@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
Cc: John Mattsson <john.mattsson@ericsson.com>, "ietf@ietf.org" <ietf@ietf.org>, "pearg@irtf.org" <pearg@irtf.org>, Vittorio Bertola <vittorio.bertola@open-xchange.com>, saag <saag@ietf.org>, "hrpc@irtf.org" <hrpc@irtf.org>
Content-Type: multipart/alternative; boundary="0000000000007757a305f1866973"
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/dpMRCFhnMpvvTBRKC2EuxX0HNz0>
Subject: Re: [Pearg] [saag] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jan 2023 16:02:46 -0000

On Thu, Jan 5, 2023 at 8:59 AM Eric Rescorla <ekr@rtfm.com> wrote:

> Hi John,
>
> Thanks for raising this topic. I would make a few points here.
>
> 1. I've heard the term "zero trust" used in a number of ways, ranging
> from "use a network architecture that doesn't involve firewalls" to
> "blockchain". So I'm not sure that talking about "today's zero trust
> principles" is going to get us very far.
>

+1

Zero Trust is a marketing term and has been rendered meaningless by
everyone calling their stuff 'zero trust' regardless of what it is. Since
every security system requires a degree of trust in something, the pretense
of zero trust is actively damaging as it leads to incorrect analysis.



> 2. I agree that there are very significant threats to people's
> security and privacy at the endpoints, from a number of sources,
> including (1) software that was installed for users without their
> consent (2) software that they intended to install and does not behave
> the way that they expect and (3) direct attack on the software on
> their machines.
>

Agree.


> 3. Essentially none of these threats are the province of the IETF,
> which defines networking protocols. We are not well positioned to
> either (1) improve the security of those endpoints or (2) address
> situations in which the software on the endpoint is directly attacking
> the user's privacy, e.g., by leaking their browsing behavior within an
> app.
>

There we disagree.

Endpoint security isn't my primary concern but a lot of what we do in IETF
affects endpoint security. The #1 way in which endpoint compromise occurs
is that a malicious payload is sent to an individual via SMTP. This
persists because it is not one problem, it is multiple problems and
everyone can point to other people for being at fault. Let me be clear
here, if your enterprise can collapse because some junior employee presses
the wrong button, that is the fault of the CEO and CISO, it is not the
fault of the employee. So what are the real causes?

1) SMTP lacks authentication of sender origin to the end user so anyone can
impersonate other company employees.
2) MIME allows attachments with active content.
3) Commonly used applications automatically run active content with no
authentication of origin.
4) Existing mechanisms to sign active content are utterly unfit for use in
a corporate environment.

The first two are very clearly within IETF scope and so is any solution to
the third.

Can the IETF come up with a complete solution on its own? Probably not, but
the IETF can be a part of a broader solution.

If the necessary players are not in the room, get them there. MIT and the
Kennedy School have no difficulty getting senior current and past leaders
in the intelligence and information security world to attend their
Chatham House rules cyber events. Preventing endpoint compromise is a major
concern to the NSA and cybercommand and EU equivalents.

It is certainly not a hopeless situation either. There is no iron law that
says that a corporation has to use the same email system for internal and
external mail. If a corporation deploys a separate email for internal
communications and SMTP is handled by a separate system which entirely
blocks active attachments, risk of endpoint compromise through
impersonation attacks is considerably reduced.

If the new internal email system is also built on an open standard and
supports open federation with other systems, it can eventually replace SMTP.


4. I agree that there are some modifications to those protocols (you
> raise PFS above, and also in some cases PCS, but perhaps even moreso,
> the use of replayable identifiers such as passwords and cookies) that
> would somewhat improve the resistance of those protocols to attack on
> the endpoints. In my experience, the IETF does take these forms
> of attack reasonably seriously.
>

The problem is that it has taken this long for the industry to bite the
bullet and recognize that we have to get rid of the passwords completely
when we have known they are broken and unfixable since 2000.

The route to ubiquitous use of FIDO/PassKey is to get everyone using a
ubiquitous, open, interoperable credential vault that supports passwords
and passkeys and is not tied to a single proprietary walled garden. And of
course, the industry keeps failing at that because the goal for the BigTech
players is to keep people inside their walled gardens.

Doing that right is another thing the IETF could be doing but isn't.



> 5. The oft-cited RFC 3552 language about assuming the endpoints
> doesn't reflect a lack of awareness that endpoints can be compromised;
> we were well aware of such attacks at the time we wrote 3552. Rather,
> it's about the separation of concerns and having the protocol
> pieces do what they are able to do:
>
>    The Internet environment has a fairly well understood threat model.
>    In general, we assume that the end-systems engaging in a protocol
>    exchange have not themselves been compromised.  Protecting against an
>    attack when one of the end-systems has been compromised is
>    extraordinarily difficult.  It is, however, possible to design
>    protocols which minimize the extent of the damage done under these
>    circumstances.
>
> As you can see, this text explicitly acknowledges the possibility
> of endpoint compromise and considers that it is possible to
> partly mitigate it, as I said above. I think we should continue
> to ask the question of whether we could do better in this area,
> as you do above, but I think that the most appropriate way
> for the IETF (as opposed to other organizations, such as, say
> TC39 or Bytecode Alliance) to do this is to focus on improving
> our protocols.
>

I agree with the sentiment. But a heck of a lot of water has gone under the
bridge since 3552. What was an acceptable security approach then isn't
today.

20 years ago the prevailing mindset was that one compromise meant game
over. We don't build systems like that any more. We consider issues like
implementation flaws, compromise of TTPs, and a lot of other things we
didn't then.

And here is the most important part, we don't just analyse the security of
components, we look at the systems.

I can't give you an architecture that will guarantee that you are safe in
every possible eventuality, but I can provide protection that is robust
unless there are multiple failures in multiple different systems. That is
why zero trust is such a bad slogan, if you want robust, practical security
you have to divide trust between multiple systems and parties so that you
don't trust any one of them absolutely and multiple parties have to defect
or systems have to fail for a breach to occur.

I have the code, I have the specifications, they are clearly within scope
of what IETF says it wants to do. But nobody seems interested in doing
anything more than tinker with existing protocols.