Re: [perpass] Howdy!

Stephen Kent <kent@bbn.com> Tue, 08 October 2013 18:30 UTC

Return-Path: <kent@bbn.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 257F321E8221 for <perpass@ietfa.amsl.com>; Tue, 8 Oct 2013 11:30:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.135
X-Spam-Level:
X-Spam-Status: No, score=-105.135 tagged_above=-999 required=5 tests=[AWL=-0.396, BAYES_20=-0.74, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OIfIh8JWJHHJ for <perpass@ietfa.amsl.com>; Tue, 8 Oct 2013 11:30:34 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id BE0A221E8258 for <perpass@ietf.org>; Tue, 8 Oct 2013 11:30:33 -0700 (PDT)
Received: from dhcp89-089-218.bbn.com ([128.89.89.218]:51075) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1VTc3E-0002yS-HM; Tue, 08 Oct 2013 14:30:32 -0400
Message-ID: <52544F48.7060006@bbn.com>
Date: Tue, 08 Oct 2013 14:30:32 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:17.0) Gecko/20130801 Thunderbird/17.0.8
MIME-Version: 1.0
To: Dean Willis <dean.willis@softarmor.com>
References: <CAOHm=4ujOYTHO63EFWMYJBgxUWq00zezYKAJ8B4Vgf_C=xRRVg@mail.gmail.com> <5224DF25.60503@cs.tcd.ie> <7C92613E-33E8-48A6-A152-E9DBB29DEC04@softarmor.com> <522A328A.5060008@cs.tcd.ie> <522E17F9.4000206@bbn.com> <7DA623C5-E8C4-437F-BFC9-0CDD350853A8@softarmor.com>
In-Reply-To: <7DA623C5-E8C4-437F-BFC9-0CDD350853A8@softarmor.com>
Content-Type: multipart/alternative; boundary="------------070703090404080902070708"
Cc: perpass@ietf.org
Subject: Re: [perpass] Howdy!
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "The perpass list is for discussion of the privacy properties of IETF protocols and concrete ways in which those could be improved. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Oct 2013 18:30:39 -0000

Dean,

Here are responses to your comments:

  

Too bad. We can try to minimize the impact, but a net that gets you killed because
the wrong person heard you say the wrong thing is worse than one with slightly less bandwidth or temporal QoS.”

  

I'm not sure I understand the context of your assertion re use of deadly 
force. I assume you don't
mean to suggest that many/most Internet users are in physical jeopardy 
as a result of nation state surveillance, right? Is your argument that 
_every_ user of the Internet should incur performance and convenience 
penalties to provide cover for the very, very tiny fraction of users who 
are in real, physical jeopardy as a result of such surveillance? I don’t 
think that those of us who develop Internet standards are in a position 
to make such tradeoffs.


There are legitimate concerns that arise if we push the envelope wrt 
traffic flow security on
a wide scale basis, e.g., bandwidth consumption (especially in mobile 
environments), battery power , user-perceptible performance (traffic 
engineering based on traffic type), and even reliability (load balancing 
performed by devices not so close to servers.) That’s why I’m 
comfortable offering mandatory-to-implement security features in 
standards, but not mandatory-to-use security features.

Perhaps. But unless one accepts it as a principle, one is doomed to build
surveillance-friendly networks.

  

I guess we disagree about the relative threats to personal privacy, and how such threats
are perceived by most users. I base my perception of the security-privacy vs. convenience and
performance tradeoff based on online habits in contexts where folks clearly
sacrifice privacy to commercial concerns on a massive basis.

  

  

I've been enterprise IT. And enterprise security. Most of their security problems
come form their own people abusing the loopholes. Sure, the IT department is lazy.
But once the "generally accepted best practices" require e2e, they'll play along. remember,
corporate policies are driven by generally accepted best practices such as GAAP for
accounting.   Note that, at least under US law, the management of a corporation is subject
to legal attacks from shareholders for losses related to the failure to deploy generally
accepted best practices for information security.

  

I agree that companies do tend to follow the heard, for the reasons you suggest. But, that does
not mean that we are in a position to tell enterprises that their concerns wrt monitoring
internal traffic, debugging, etc. are less important that a (well-intentioned) desire to thwart
surveillance at a global level. Again, it's the mandatory-to-use vs. implement issue.

  

A listing of best practies [sic] is here:   
http://www.wpi.edu/academics/CCC/Policies/bestpractices.html   

  

Note that they're written by people like CDT (an officer of which edited our privacy RFC),
NIST, and other bodies that we influence.

  

The IETF does not generally influence NIST or most of the other organizations that are sources
for the cited documents. (The IETF has often adopted NIST standards for our security RFCs.) Also,
the WPI URL lists security best practices documents from dozens of sources, not just NIST or CDT.

  

Should it? Who funds BBN, anyhow? What's your motivation for making choices that increase
surveillance?    

  

I'm pretty sure we get all our money from the GFF (Good Funding Fairy)  ;-).

I have no idea what triggered this nasty comment in response to my observation that we have offered
TFS options (e.g., in ESP) that have never been used. I was the designer of the TFS features of
ESP, so it’s absurd for you to suggest that I am “making choices that increase surveillance.”

  

Yeah, that's an ad hominem attack . But we're going to get a lot of those, and need to have
a great deal of confidence in our answers. "Nobody wants security" is probably not a good
enough answer … Nor is "Security costs too much", especially until the costs have been
more completely quantified -- including the costs of making systems that nobody will buy
because they don't want to spill their guts to our friends at Meade. Even the least suspicion
of pro-surveillance bias needs to be avoided for the results to be credible.

  

So, your reasoning appears to be that, because “we” may the target of future ad hominem attacks,
you are justified in engaging in one now. Do you now what a non sequitur is?

  

Ah yes, the old "if we build E2E, nobody will use it" argument. I find that to be an
extremely suspicious argument, but recognize it and its kin have, for many years, led
us down a rabbit-warren of bad choices, resulting in the problem we have today.

  

I am the author of several standards (e.g., RFC 4301, 4302, 4303) that enable e-t-e security.
If I didn't hope people would make use of such technology I would not have spent a lot of time
on these documents. You state that you find my comments with  respect to use of security “suspicious.”
I find your comments about an absolute need to impose  Internet standards that mandate_use_  of
security to be amazingly hubristic, especially from someone with NO security RFCs to his credit.

  

Regrettably, and as a former Cisco employee, I can tell you that folks there also face
certain pressures from state actors. I'm sure this is true of most folks. David may be a
saint. He might be a devil. But as an external party lacking the expertise, I have no way of
telling if his position is biased against my objectives.   

  

I agree that you are “an external party lacking expertise.”

  

So unless we have widespread review, from people likely to be in the influence of multiple
and conflicting actors, we really haven't had a review. How widespread? I'm not exactly sure
-- but it means more than one review, from more than one company, from more than one sector,
and from more than one nation-state at a minimum. Trust is really hard; our best substitute
is a very widespread consensus.    

  

I review a fair number of security-themed papers for journals every year. Most are terrible.
I don't think the IETF needs inputs from folks like he authors of those papers. “Very
widespread consensus” is not a substitute for high quality review by competent people. But, this
aspects of our discussion is largely irrelevant, since the IETF process does acquire inputs
from a wide range of folks as we evaluate and progress standards.

  

Arguably, the mode that we've operated in for many years has given us a rather bad current
situation. Perhaps we should reassess "good enough".

  

IWe have standardized a pretty reasonable set of security mechanisms, many of which are
either not used or have been badly implemented, or both. Some of the sources of significant
vulnerabilities have arisen because of decisions by actors external to the IETF, e.g., vendors and
service providers, for business reasons. (One good example is provided by he PKI trust model
implemented in browsers, but there are many, many more examples.)

Could we do better? Yes, in some areas we could have better standards.

Should we mandate_use_  of additional, possibly burdensome security mechanisms by
all Internet users? I think not.

Steve