Re: [perpass] "Its an attack" BCP draft

Stephen Kent <kent@bbn.com> Fri, 22 November 2013 14:56 UTC

Return-Path: <kent@bbn.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A4161AE14D for <perpass@ietfa.amsl.com>; Fri, 22 Nov 2013 06:56:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.726
X-Spam-Level:
X-Spam-Status: No, score=-4.726 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.525, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EOBWzKTkqklN for <perpass@ietfa.amsl.com>; Fri, 22 Nov 2013 06:56:57 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id 546501AE149 for <perpass@ietf.org>; Fri, 22 Nov 2013 06:56:54 -0800 (PST)
Received: from dommiel.bbn.com ([192.1.122.15]:58305 helo=comsec.home) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1VjsA1-000AhR-At for perpass@ietf.org; Fri, 22 Nov 2013 09:56:45 -0500
Message-ID: <528F70AC.8020306@bbn.com>
Date: Fri, 22 Nov 2013 09:56:44 -0500
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: perpass@ietf.org
References: <528D34D7.1010303@cs.tcd.ie> <528D3A85.5090003@gmail.com> <528D3B28.8020406@cs.tcd.ie> <686FEA45-2F2B-40E8-9063-7180C047483A@icloud.com> <D110B195-75FC-4DFC-8EF4-36DF78BB039B@isoc.org>
In-Reply-To: <D110B195-75FC-4DFC-8EF4-36DF78BB039B@isoc.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: Re: [perpass] "Its an attack" BCP draft
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Nov 2013 14:56:59 -0000

Robin,

Jon is correct in term of the usual terminology employed in the security 
community.

Also, because we have said that we are trying to address passive wiretapping
effected by a wide range of adversaries, I don't think we're focusing 
exclusively
on entities who are "legitimate" participants.

Steve

On 11/21/13 6:27 PM, Robin Wilton wrote:
> I'm not sure I agree... in this context, "bad actors" are those who 
> exploit their legitimate participation in a system to act in 
> illegitimate ways, advancing their interests regardless of the 
> disbenefit to others or to the system itself.
>
> That's not necessarily adversarial...
>
> R