Re: [perpass] perens-perpass-appropriate-response-01

Robin Wilton <wilton@isoc.org> Sun, 08 December 2013 19:55 UTC

Return-Path: <wilton@isoc.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6969D1AE0C3 for <perpass@ietfa.amsl.com>; Sun, 8 Dec 2013 11:55:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z1s2fgbc7w43 for <perpass@ietfa.amsl.com>; Sun, 8 Dec 2013 11:55:32 -0800 (PST)
Received: from smtp118.iad3a.emailsrvr.com (smtp118.iad3a.emailsrvr.com [173.203.187.118]) by ietfa.amsl.com (Postfix) with ESMTP id F18391AE091 for <perpass@ietf.org>; Sun, 8 Dec 2013 11:55:31 -0800 (PST)
Received: from localhost (localhost.localdomain [127.0.0.1]) by smtp23.relay.iad3a.emailsrvr.com (SMTP Server) with ESMTP id 6BB9528007E; Sun, 8 Dec 2013 14:55:27 -0500 (EST)
X-Virus-Scanned: OK
Received: by smtp23.relay.iad3a.emailsrvr.com (Authenticated sender: wilton-AT-isoc.org) with ESMTPSA id 043AF280078; Sun, 8 Dec 2013 14:55:26 -0500 (EST)
References: <E2DA1477-C86E-441E-A33D-D47A0D67AFF3@iab.org> <EF9BD1E4-6EF3-4035-AC4E-1A2D3CADE615@mnot.net> <529E8494.7000806@perens.com> <20131204111309.GB11727@nic.fr> <529F61D8.6030105@perens.com> <20131204171207.GC19914@thunk.org> <529F63C0.3040804@perens.com> <529F88AC.3090904@appelbaum.net> <529F90A0.8000706@perens.com> <529F9205.30906@appelbaum.net> <529F98C0.9090808@perens.com> <529F9F14.8050805@appelbaum.net> <529FB61A.7090604@perens.com> <529FBEF9.7030205@appelbaum.net> <529FC347.3080806@perens.com> <52A15835.2070901@cis-india.org> <52A21B80.8070005@mykolab.com> <52A21D1C.8020000@perens.com> <BC888A6F-F048-4BA6-92F4-8812753F8534@icsi.berkeley.edu> <52A2235A.2030801@perens.com> <ADD6858C-7548-479E-BB71-316E9C52F812@icsi.berkeley.edu> <c97f3134-eedf-44e1-880c-147efb172fc6@email.android.com> <240A2D86-C352-4954-BE4E-6313BA25994E@icsi.berkeley.edu> <52A2CE6A.30408@perens.com> <52A31F1D.7040509@cs.tcd.ie> <5D026682-5457-4F00-B139-58D8D718BB0A@icsi.berkeley.edu>
In-Reply-To: <5D026682-5457-4F00-B139-58D8D718BB0A@icsi.berkeley.edu>
Mime-Version: 1.0 (1.0)
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="us-ascii"
Message-Id: <454F08BE-5C79-408B-B356-6D895C9B1CC3@isoc.org>
X-Mailer: iPad Mail (9B206)
From: Robin Wilton <wilton@isoc.org>
Date: Sun, 08 Dec 2013 19:59:31 +0000
To: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
Cc: "perpass@ietf.org" <perpass@ietf.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [perpass] perens-perpass-appropriate-response-01
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Dec 2013 19:55:34 -0000

Nick, 

I agree that there is a cost threshold for signature/MAC. It is something I uncovered in my PKI research: for PKI-enabled micropayments it is, arguably, not worth signing the public key involved, if the number of disputed payments is at normal levels... because normal levels, for most micropayment applications, are low. It's more cost-effective to simply refund the tiny minority of disputed payments.

That said, I think what we learned from IETF88 was that the strategy most likely to succeed against pervasive, unaccountable state interception is to make it more costly for the net reception to take place. (Essentially, forcing accountability by forcing expenditure). 

We have also seen evidence of large-scale MITM attacks, made easier by the weakness of integrity mechanisms in session establishment and key exchange.

If that's the new context in which we find ourselves architecting systems, then it may change the calculation that says "Integrity checks aren't worth paying for".

NB - I am not saying that this necessarily justifies breaking all web traffic down to frames and applying MACs/DSigs at the element level; all I'm saying is that the events of 2013 change the cost structure of integrity mechanisms, and we should adjust our architectural principles accordingly.

Yrs.,
Robin

Robin Wilton

Technical Outreach Director - Identity and Privacy

On 7 Dec 2013, at 15:48, Nicholas Weaver <nweaver@ICSI.Berkeley.EDU> wrote:
be 
> 
> On Dec 7, 2013, at 5:14 AM, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote:
>> Today, there's no such solution for how to load JS with
>> integrity but without TLS after an https:// "landing page"
>> load. I've thought about ways to do it with RFC 6920, but
>> so far without finding a way that could scale or would be
>> likely to get adopted - apparently the JS code gets
>> updated too often for a 6920 based approach to help very
>> much.
> 
> We do actually have a system for data integrity without confidentiality.  Its called DNSSEC.  And the lack of confidentiality is a deliberate design decision due to its focus around offline signature generation and a structure composed of various proven untrustworthy intermediaries.
> 
> So if you really actually WANTED data integrity on elements (and it has to be all HTML, CSS, JS, flash, etc.. since all of those are directly executable content, so you might as well do ALL elements.  After all, there have been image rendering vulnerabilities too..), how about storing them and just fetching them through DNSSEC...
> 
> Indeed, thats a very silly and downright stupid idea.  Nobody will do it.
> 
> 
> 
> Why?  Because our model for HTTP is that content is often generated dynamically, so each dynamic element would need to be signed dynamically, so instead our focus on HTTP is on channel security: create a secure channel and then keep using it.
> 
> There is effectively zero call for "MAC w/o ENCRYPT", which is whats necessary to answer "authentication problem rather than a confidentiality one." in terms of channel security.  We don't do it.   Why?  Because its stupid.  You'd still need to go through all the public key certificate efforts, key exchange, server side computation, and all the other crap needed for a TLS handshake or similar to generate a MAC key.  Adding in encryption is a practical no-op by this point.
> 
> 
> And without doing a key exchange for a MAC and instead doing signatures for integrity, signature verification happens at the END of a communication.  Signatures are expensive to generate and validate (and verification w/o a key exchange requires a lot more of them anyway), so you'd hash all the data and then sign/verify, so you coludn't take advantage of incremental rendering, lest you render an iframe at the start that shouldn't be there.
> 
> Yes, you could use some block-hash structure where at the start you get a signature over a bunch of block hashes, but that instead requires that the sender know in advance the WHOLE message.  Its a silly thought, since the server in many cases does NOT know what the full .html document will be when it starts sending it over a TLS channel.
> 
> 
> So the idea of "authentication problem rather than a confidentiality one" is a red herring:  We have a solution that solves the authentication problem for HTTP.  Its called TLS.  We MUST use it everywhere, if only to protect US citizens from the French and Chinese, and Russians, and Brazilians, and Israelis...
> 
> And a solution which solves authentication w/o confidentiality may be silly, but if you want it anyway, the best solution that gives authentication w/o confidentiality for HTTP is, indeed, a browser button that says:
> 
> "F-confidentiality: broadcast my encryption key (but not the MAC key) in the clear if the server consents".
> 
> --
> Nicholas Weaver                  it is a tale, told by an idiot,
> nweaver@icsi.berkeley.edu                full of sound and fury,
> 510-666-2903                                 .signifying nothing
> PGP: http://www1.icsi.berkeley.edu/~nweaver/data/nweaver_pub.asc
> 
> 
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass