Re: [perpass] draft-farrell-perpass-attack architecture issue

Eliot Lear <lear@cisco.com> Wed, 15 January 2014 14:33 UTC

Return-Path: <lear@cisco.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 609B91AE37A for <perpass@ietfa.amsl.com>; Wed, 15 Jan 2014 06:33:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.039
X-Spam-Level:
X-Spam-Status: No, score=-10.039 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DkywODrhd6ta for <perpass@ietfa.amsl.com>; Wed, 15 Jan 2014 06:33:20 -0800 (PST)
Received: from aer-iport-2.cisco.com (aer-iport-2.cisco.com [173.38.203.52]) by ietfa.amsl.com (Postfix) with ESMTP id 162C41AE0F4 for <perpass@ietf.org>; Wed, 15 Jan 2014 06:33:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2582; q=dns/txt; s=iport; t=1389796388; x=1391005988; h=message-id:date:from:mime-version:to:subject:references: in-reply-to:content-transfer-encoding; bh=LoJc+zjAwAlBDxFLEH6UPPiovlEjjP7+D8PawMCYctY=; b=By5NbtEViVflPoOMD8MDcqHdWlRj6jOJUe9UmRbsWdZCBY3ZMxxasq3F Vr1vRGlYbmaEJIH/urOrMbT3KZCbe7zwc5+dTkMQoO/jk77m1PR7WDJsx QPvFw2c+Nat0xnSfVPN8JnpThFaO3NeANHH8IhY+f28EMNr2zHX3GQzTg 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AggFAOSa1lKQ/khR/2dsb2JhbABQCYMLOINUtzJPgRUWdIIlAQEBBAEBASBEBwoRCxIGAgIFFgsCAgkDAgECARUWDA4GAQwGAgEBGIdoDagdm20TBIEpjHtigm+BSASFK5J1jDeFXoMuOw
X-IronPort-AV: E=Sophos;i="4.95,663,1384300800"; d="scan'208";a="2995499"
Received: from ams-core-1.cisco.com ([144.254.72.81]) by aer-iport-2.cisco.com with ESMTP; 15 Jan 2014 14:33:07 +0000
Received: from mctiny.local ([10.61.166.90]) by ams-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id s0FEX60Q015182 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 15 Jan 2014 14:33:07 GMT
Message-ID: <52D69C22.1010900@cisco.com>
Date: Wed, 15 Jan 2014 15:33:06 +0100
From: Eliot Lear <lear@cisco.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Melinda Shore <melinda.shore@gmail.com>, perpass@ietf.org
References: <52D43E69.6090001@cs.tcd.ie> <C19E19BF-B9A2-4EEB-8E77-DF0CAD548277@cisco.com> <52D5B36D.1020405@gmail.com> <52D688B3.3040907@cs.tcd.ie>
In-Reply-To: <52D688B3.3040907@cs.tcd.ie>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Subject: Re: [perpass] draft-farrell-perpass-attack architecture issue
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jan 2014 14:33:22 -0000

Yeah, I think it's quite reasonable for a shepherd to ask the developers
of a spec how they have considered PM, and see if it at least passes a
sniff test.

Eliot

On 1/15/14 2:10 PM, Stephen Farrell wrote:
>
> On 01/14/2014 10:00 PM, Melinda Shore wrote:
>> On 1/14/14 12:45 PM, Fred Baker (fred) wrote:
>>> So the question in the shepherd's report should not be "tell me you
>>> thought about the EU Data Retention Initiative and whether your
>>> protocol's data identifies an individual". It should be "what
>>> personal, equipment, or session identifiers, encrypted or otherwise,
>>> are carried in your protocol? How might they be correlated with
>>> offline data or otherwise used to infer the identity or behavior of
>>> an individual?"
>> I agree - I think this is a useful framing, beyond the question
>> of actual traffic inspection.  It's pretty clear that there's
>> been a lot of data mining, as well, and we haven't thought very
>> carefully about what we may be leaking inadvertently.  This is
>> particularly a concern as efforts like geonet start to ramp
>> up.
> I do like the idea that shepherds would report on this topic
> (or more generally on security and privacy) in their write-ups,
> but have a genetic dislike of the way we used to have a
> 1000-point questionnaire for shepherds to fill in. And a lot
> of the current shepherd write-ups we get tend to be out of
> date wrt e.g. IPR so I'm pretty convinced that we shouldn't
> hardcode shepherd write-ups into RFCs on this topic, since
> that level of process is liable to change relatively often.
> OTOH, as a "new" thing for WGs to consider, it might be
> quite useful if shepherds are prompted to not forget about
> pervasive monitoring.
>
> So I'm in two minds here really.
>
> I figure that this is something where we'll have to learn as
> we go. Maybe we should look at a tool that randomly (but
> not uniformly randomly) picks a small number of hard questions
> from a long list and asks the shepherd to answer those. Sort
> of a write-up bingo;-)
>
> I'd be interested if someone wanted to start work on some
> WG-chair/shepherd guidance for how to consider pervasive
> monitoring. That'd likely take a while to get baked, and
> would maybe end up not (just) as an RFC, but as training
> material and/or an IESG statement or something, but could
> easily start as an I-D. Any takers?
>
> S
>
>
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
>
>