Re: [perpass] Commnets on draft-farrell-perpass-attack-00 was RE: perens-perpass-appropriate-response-01

Mark Nottingham <mnot@mnot.net> Wed, 04 December 2013 23:40 UTC

Return-Path: <mnot@mnot.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 937C51ADF76; Wed, 4 Dec 2013 15:40:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mfe9cFTf9FEL; Wed, 4 Dec 2013 15:40:29 -0800 (PST)
Received: from mxout-08.mxes.net (mxout-08.mxes.net [216.86.168.183]) by ietfa.amsl.com (Postfix) with ESMTP id 30D411ADF59; Wed, 4 Dec 2013 15:40:29 -0800 (PST)
Received: from [192.168.1.55] (unknown [118.209.134.50]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTPSA id 6360550A88; Wed, 4 Dec 2013 18:40:19 -0500 (EST)
Content-Type: text/plain; charset="iso-8859-1"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
From: Mark Nottingham <mnot@mnot.net>
In-Reply-To: <529F7690.2050302@gmx.net>
Date: Thu, 05 Dec 2013 10:40:16 +1100
Content-Transfer-Encoding: quoted-printable
Message-Id: <B606D94F-829D-4C55-B16C-FF0F54A650EC@mnot.net>
References: <290E20B455C66743BE178C5C84F1240847E5103799@EXMB01CMS.surrey.ac.uk>, <2C66A416-5F07-4803-A4C0-BB61734BA42E@nominum.com> <290E20B455C66743BE178C5C84F1240847E510379A@EXMB01CMS.surrey.ac.uk> <529F7690.2050302@gmx.net>
To: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
X-Mailer: Apple Mail (2.1822)
X-Mailman-Approved-At: Wed, 04 Dec 2013 15:41:59 -0800
Cc: IETF-Discussion Discussion <ietf@ietf.org>, l.wood@surrey.ac.uk, perpass@ietf.org, Bruce Perens <bruce@perens.com>, HTTP Working Group <ietf-http-wg@w3.org>, ted.lemon@nominum.com
Subject: Re: [perpass] Commnets on draft-farrell-perpass-attack-00 was RE: perens-perpass-appropriate-response-01
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Dec 2013 23:40:31 -0000

Hi,

Can folks please stop cross-posting this to the HTTPbis WG? I'm sure we'll become aware of any relevant outcome of the discussion, and interested folks can join over on perpass.

Thanks,


On 5 Dec 2013, at 5:38 am, Hannes Tschofenig <Hannes.Tschofenig@gmx.net> wrote:

> Hi Lloyd,
> 
> On 12/04/2013 10:55 PM, l.wood@surrey.ac.uk wrote:
>> I see you ignore the DRM point.
> 
> I don't understand your DRM point to be honest. It also does not seem to
> be relevant to this conversation. DRM standards have not been been
> developed in the IETF either.
> 
> draft-farrell-perpass-attack-00 does not specific solutions (which it
> states in the document).
> 
> If your argument is that security adds complexity to protocols then
> that's certainly true. The other option would be not to have security in
> protocols at all to make them "more lightweight". Do you seriously think
> that this is useful option (even before the NSA revelations)?
> 
> If your argument is that security problems on the Internet should be
> solved via legal / regulatory ways then please go ahead an make these
> proposals. Obviously, the IETF would be the wrong forum to do that. I am
> sure the European Commission, for example, is interested to listen to
> your proposals and will immediately issue new proposals for regulation.
> It would be great if those you think that there are regulatory solutions
> would in fact then work on those rather than just having technically
> minded people who push problems around.
> 
> If your argument is aging cryptographic algorithms require software to
> be updated then let me tell you that software gets updated even for
> functionality reasons. Do you think that all the software updates you
> get for you smart phone apps are only security fixes? There are,
> however, many software updates that relate to security vulnerabilities.
> My approach would, however, be to incorporate software update mechanisms
> into products (which is what pretty everyone in the industry seems to be
> doing) instead. While this is largely a non-IETF issue it would still be
> interesting to hear whether you have other suggestions.
> 
> Your suggestions to do more interoperability testing sounds reasonable
> to me. I have been involved in interoperability tests myself (and even
> organized a few). Those tend to have a different focus, namely to
> provide feedback about whether the implementations interpreted the specs
> correctly. Penetration testing is what you would typically do to
> discover security vulnerabilities. We typically don't do those (at least
> not that I have heard). As such, I would rather seen them as a
> orthogonal effort (which many in the IETF are involved in already
> anyway). Are you suggesting that we should also do penetration testing?
> 
> Please also note that "security" is not a monolithic block, as you can
> see from RFC 3552. In various discussions with you I got the impression
> that you dislike security in general. That can hardly be true since I am
> sure you like some of the security features in there as well. For
> example, you might find authentication a pretty cool concept to avoid
> others accessing your email account.
> 
> Ciao
> Hannes
> 

--
Mark Nottingham   http://www.mnot.net/