Re: [perpass] Traffic peeking

S Moonesamy <sm+ietf@elandsys.com> Mon, 25 November 2013 00:11 UTC

Return-Path: <sm@elandsys.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF34F1AE2E2 for <perpass@ietfa.amsl.com>; Sun, 24 Nov 2013 16:11:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.525
X-Spam-Level:
X-Spam-Status: No, score=-2.525 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.525] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B2zZufZuY0EY for <perpass@ietfa.amsl.com>; Sun, 24 Nov 2013 16:11:43 -0800 (PST)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id AC1A31AE2E9 for <perpass@ietf.org>; Sun, 24 Nov 2013 16:11:43 -0800 (PST)
Received: from SUBMAN.elandsys.com ([197.224.157.109]) (authenticated bits=0) by mx.elandsys.com (8.14.5/8.14.5) with ESMTP id rAP0BJvG016417 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 Nov 2013 16:11:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1385338291; bh=22Hwi7XhirR+P22Zr30GVRAokQpGrFGvm0yPaVVAV0U=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=OhqxUtkKo6SEmkQOSNXAU7hlYYydHDxrkYV7NC7mvY1z5MgnRB3VABeaR4b4DIuxB 4DS27Ujcy5GOmDmj38wfatQJwvOEsRL1/rTZG94q2cHvSD1iXorOAETf4abkZxOxyn /1fz/b0IMcn1l+XgKGgDbWlN2yiW7+nN/T5rrkg0=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=elandsys.com; s=mail; t=1385338291; i=@elandsys.com; bh=22Hwi7XhirR+P22Zr30GVRAokQpGrFGvm0yPaVVAV0U=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=0pciVSz22t6rf8arLqgcVYrl8Egq6PSqQPEiFiaXDBQQiCCkO72w44t8dLYV3Onf8 G/z4+7sTdhoO0BOuQYu2Y7cp5G6QGejMONPvQV8JqgYYCHwQCe8s7IxX+8cHcIl9sh SKgqq3FaBs6TBiCGCiZ8OYGKAazjeJqCaAbnkGbs=
Message-Id: <6.2.5.6.2.20131124144605.0a990610@elandnews.com>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Sun, 24 Nov 2013 16:10:16 -0800
To: "Learmonth, Iain Ross" <iain.learmonth.09@aberdeen.ac.uk>
From: S Moonesamy <sm+ietf@elandsys.com>
In-Reply-To: <5e7d0e55fc83418aa2a9fbd86b0a9b5f@DB3PR01MB153.eurprd01.pro d.exchangelabs.com>
References: <6.2.5.6.2.20131124121510.0aa47e40@elandnews.com> <5e7d0e55fc83418aa2a9fbd86b0a9b5f@DB3PR01MB153.eurprd01.prod.exchangelabs.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Cc: perpass@ietf.org
Subject: Re: [perpass] Traffic peeking
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Nov 2013 00:11:45 -0000

Hi Iain,


Thanks for the feedback.

At 14:37 24-11-2013, Learmonth, Iain Ross wrote:
> >   In 2007, Dan Shumow and Niels Ferguson discussed about the
> >   possibility of a backdoor in a Dual Elliptic Curve  pseudorandom
> >   number generator [Rump].
>
>I'm not sure how this paragraph is relevant to the rest of the 
>draft. You only discuss the use of encryption, not particular schemes.

The sentence is more of a lead-in to standardization of encryption 
schemes.  Discussing about particular schemes is like jumping into 
the solution.  I'll look into the above again once the SAAG minutes 
are published.


> >   Entities exchanging traffic over the Internet should assume that any
> >   traffic which is not encrypted will be intercepted given that peeking
> >   is irresistible.
>
>This should probably be re-worded to be something like "any traffic 
>which is not encrypted should be assumed to be compromised". Let's 
>be honest, they're not capturing and storing every single bit of 
>traffic, they definitely don't have the capacity for that.

In my humble opinion it is more complicated than that.  I agree that 
not all traffic is being captured and stored.  The usage of the term 
"meta-data" within the IETF is different from that used in other 
venues.  The reduction in what could be stored is 1:150 (unverified 
information).  I'll go with the wording you proposed as it is a better fit.

> > The Hypertext Transfer Protocol (HTTP) [RFC2616] is widely used to
> > access the web.   The protocol is sometimes used to provide web access
> > to email.  Section 15 of RFC 2616 [RFC2616] does not provide any
> > guidance about encrypting the traffic generated by the protocol.
>
>This is currently being discussed by httpbis[1] and any discussion 
>related to the use of encryption with HTTP should be had there.

I avoided mentioning protocols which are work in progress, i.e. what 
is being discussed in HTTPBIS.

>The other protocols will be discussed by the new uta (Using TLS in 
>Applications) working group[2].

I don't recall joining that mailing list.  I'll take a look at it.

>Other bits in general, there's a lot of talking about state 
>sponsered surveillence, but there are other problems too. Botnets 
>with nodes operating behind firewalls can sniff the wires, rouge 
>sysadmins, anyone who can poison BGP tables, etc.

In a way the above highlights the problem.  The discussion has been 
focused on state sponsored surveillance while there has been little 
discussion of the other problems.

>Encryption is also only half the solution, the other half is 
>authentication as if you're sending your data encrypted straight to 
>the NSA while they MitM you, you've solved nothing.

The problem with authentication is that it can cause a problem for 
anonymity.  Every solution comes with its share of problems.  The 
draft does not discuss the entire matter as an IETF security 
problem.  It recognizes that some of issues are related to 
policy.  If you put policy in a protocol people won't like it.  The 
people will find a way around that and you won't like that.

>Given that one of the stated tasks for the uta working group is:
>
>"- Specify a set of best practices for TLS clients and servers, 
>including but not
>limited to recommended versions of TLS, using forward secrecy, and one or more
>ciphersuites and extensions that are mandatory to implement."
>
>I believe that this draft would be more suited to be being discussed there.

Although the draft mentions some application protocols it isn't 
specific to applications.  I doubt that that proposed working group 
would take up the draft.

Regards,
S. Moonesamy