Re: Request for Authenticated but not Encrypted Traffic

Eliot Lear <lear@lear.ch> Fri, 30 September 2022 08:44 UTC

Return-Path: <lear@lear.ch>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1800FC157B32 for <quic@ietfa.amsl.com>; Fri, 30 Sep 2022 01:44:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.898
X-Spam-Level:
X-Spam-Status: No, score=-0.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_ALL=0.8, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=lear.ch
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wB6EBvo67bZC for <quic@ietfa.amsl.com>; Fri, 30 Sep 2022 01:44:03 -0700 (PDT)
Received: from upstairs.ofcourseimright.com (upstairs.ofcourseimright.com [185.32.222.29]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD730C157901 for <quic@ietf.org>; Fri, 30 Sep 2022 01:44:01 -0700 (PDT)
Received: from [172.20.10.6] ([178.197.204.249]) (authenticated bits=0) by upstairs.ofcourseimright.com (8.15.2/8.15.2/Debian-18) with ESMTPSA id 28U8hsiX844000 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Fri, 30 Sep 2022 10:43:55 +0200
Authentication-Results: upstairs.ofcourseimright.com; dmarc=none (p=none dis=none) header.from=lear.ch
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=lear.ch; s=upstairs; t=1664527435; bh=tRjbBQD0CSCa0/R5XGfKdiu0hEgaWfR3iFnuUXFLICw=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=hp6muff2CioxmdQ5AocgK1jTFj3y2xKGQICD0c3s1QA+NVR1ZHfehEiVr2ZXM6h5d mho7tkYNG1mRYb4gxODVaRsdntjcBtnqdiQJn3reHuWZMFgsLCHWZn3GRIozzsBGAr S8SPeZ46bgSTNrD/KwIczrN4M1L9UuzJVK2jxPiw=
Message-ID: <e46eacd0-a25c-9e94-f15e-9430d47498e6@lear.ch>
Date: Fri, 30 Sep 2022 10:43:54 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.13.1
Subject: Re: Request for Authenticated but not Encrypted Traffic
Content-Language: en-US
To: "Randy Armstrong (OPC)" <randy.armstrong@opcfoundation.org>, Phillip Hallam-Baker <phill@hallambaker.com>
Cc: "quic@ietf.org" <quic@ietf.org>
References: <SJ0PR08MB82889F488CCA7D8FC4997ACEFA579@SJ0PR08MB8288.namprd08.prod.outlook.com> <CAMm+Lwh1DWyVNL7M6q0gAS77HyN5KXRa3cNn732ivbAMGSFVDg@mail.gmail.com> <SJ0PR08MB82888EE2140D219EF758CF76FA569@SJ0PR08MB8288.namprd08.prod.outlook.com> <da161bf2-2eea-77b9-c96f-e391fe867c3b@lear.ch> <SJ0PR08MB8288B7C5823FC9069D83A23AFA569@SJ0PR08MB8288.namprd08.prod.outlook.com>
From: Eliot Lear <lear@lear.ch>
In-Reply-To: <SJ0PR08MB8288B7C5823FC9069D83A23AFA569@SJ0PR08MB8288.namprd08.prod.outlook.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------27opb8RPb8ZqD6oOi1O4yi1w"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/CDtKi3NrRKZfXOdaa3HeYvneGHk>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Sep 2022 08:44:07 -0000

Randy,

I'm not discussing backdoors, but requirements.  State your requirements.

Eliot

On 30.09.22 10:38, Randy Armstrong (OPC) wrote:
>
>   * I think the key point here is that sometimes observability is a
>     feature and not a bug. This is particularly important in
>     industrial/critical infrastructure.  That observability can be
>     achieved in many ways.  One question is whether the observability
>     itself should itself be authorized.
>
> Putting backdoors into protocols is not equivalent to letting 
> applications decide to skip encryption.
>
> A backdoor is like giving law enforcement codes to break into a 
> cellphone and hoping that they will never abuse the power or the codes 
> will never fall into the hands of criminals. Letting applications 
> decide is equivalent to an owner of a cellphone choosing not to lock 
> their screen because they decide there is nothing that needs protecting.
>
> IOW, the fact that some users might be willing to live with the risk 
> of a compromised system by allowing for backdoors is not a reason to 
> refuse to allow other users to make a decision send data in clear text 
> when and only when they decide it is safe.
>