Re: [rtcweb] Encryption mandate

Paul Kyzivat <pkyzivat@alum.mit.edu> Thu, 08 September 2011 16:17 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C51421F889A for <rtcweb@ietfa.amsl.com>; Thu, 8 Sep 2011 09:17:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.522
X-Spam-Level:
X-Spam-Status: No, score=-2.522 tagged_above=-999 required=5 tests=[AWL=0.077, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6wLTFgsatdWJ for <rtcweb@ietfa.amsl.com>; Thu, 8 Sep 2011 09:17:15 -0700 (PDT)
Received: from qmta07.westchester.pa.mail.comcast.net (qmta07.westchester.pa.mail.comcast.net [76.96.62.64]) by ietfa.amsl.com (Postfix) with ESMTP id 5B2CF21F87FA for <rtcweb@ietf.org>; Thu, 8 Sep 2011 09:17:15 -0700 (PDT)
Received: from omta06.westchester.pa.mail.comcast.net ([76.96.62.51]) by qmta07.westchester.pa.mail.comcast.net with comcast id WGJG1h00316LCl057GK8ts; Thu, 08 Sep 2011 16:19:08 +0000
Received: from Paul-Kyzivats-MacBook-Pro.local ([24.62.109.41]) by omta06.westchester.pa.mail.comcast.net with comcast id WGK61h00t0tdiYw3SGK7ul; Thu, 08 Sep 2011 16:19:08 +0000
Message-ID: <4E68EB1D.7040501@alum.mit.edu>
Date: Thu, 08 Sep 2011 12:19:41 -0400
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:5.0) Gecko/20110624 Thunderbird/5.0
MIME-Version: 1.0
To: Michael Procter <michael@voip.co.uk>
References: <A444A0F8084434499206E78C106220CA0B00FDB08B@MCHP058A.global-ad.net> <89177AB2-F721-47E4-8471-2180EDA10615@voxeo.com> <A444A0F8084434499206E78C106220CA0B00FDB34D@MCHP058A.global-ad.net> <496EE152-41F2-49AB-A136-05735FE5A9F9@voxeo.com> <101C6067BEC68246B0C3F6843BCCC1E31018BF6BE2@MCHP058A.global-ad.net> <4E540FE2.7020605@alcatel-lucent.com> <2E239D6FCD033C4BAF15F386A979BF5106423F@sonusinmail02.sonusnet.com> <4E6595E7.7060503@skype.net> <4E661C83.5000103@alcatel-lucent.com> <2E239D6FCD033C4BAF15F386A979BF510F086B@sonusinmail02.sonusnet.com> <4E666926.8050705@skype.net> <43A0D702-1D1F-4B4E-B8E6-C9F1A06E3F8A@edvina.net> <033458F56EC2A64E8D2D7B759FA3E7E7020E64DC@sonusmail04.sonusnet.com> <E4EC1B17-0CC4-4F79-96DD-84E589FCC4F0@edvina.net> <4E67C3F7.7020304@jesup.org> <4E67D1F4.10002@mozilla.com> <4E6808D5.7090709@alum.mit.edu> <95877BC0-B0AA-4B20-9C2E-C16076BBE96E@edvina.net> <CAPms+wSy3b_M97BuvE9wn+hJRVDZA-qJ4XRPTQtdnScPxWpp8w@mail.gmail.com>
In-Reply-To: <CAPms+wSy3b_M97BuvE9wn+hJRVDZA-qJ4XRPTQtdnScPxWpp8w@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: rtcweb@ietf.org
Subject: Re: [rtcweb] Encryption mandate
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Sep 2011 16:17:16 -0000

On 9/8/11 5:33 AM, Michael Procter wrote:
> Paul, Olle,
>
> Both of you correctly point out that determining when a session is
> secure is a very hard problem - one that is nigh-on impossible except
> for certain restricted scenarios.  But I think we may have missed the
> change of emphasis in Chris' proposed UI change.  Instead of marking a
> session as secure (which is hard to determine), he is suggesting
> marking it as insecure (which is easier!).
>
> If the signalling and media entering and leaving the browser are not
> secured by an appropriate mechanism, then the session should be marked
> as 'insecure'.  If they are secured, then Chris' proposal would have
> no indication on the browser, which intuitively seems to match what we
> know about the session - secure to the server but 'who knows' after
> that.  Whether that is good enough for you will depend on whether you
> trust the service you are using.

I agree that this might provide some utility that isn't otherwise 
achievable. However, trusting the service remains an issue. Big brother 
will probably ensure that most of them have back doors.

	Thanks,
	Paul

> Michael
>
> On 8 September 2011 06:48, Olle E. Johansson<oej@edvina.net>  wrote:
>>
>> 8 sep 2011 kl. 02:14 skrev Paul Kyzivat:
>>>
>>> Chris,
>>>
>>> I agree with you that the UI indication of security is important.
>>> But its also *hard* for this application, for a variety of reasons:
>>>
>>> - While it may be easy for the browser to know if the media stream
>>>   is itself secured, its hard (impossible) to know that its secured
>>>   to its ultimate end point. That is the problem with intermediaries.
>>>
>>> - it may turn out that not all the streams in the "call" have the
>>>   same degree of security.
>>>
>>> Of course this can all be dealt with via proper definition of what the UI
>>> indication means, and doesn't mean. But doing that will just render it
>>> meaningless to many users. To be widely understood, the indication will need
>>> to be simple, and closely aligned with what people "expect".
>>>
>>> Consider a stream that is secured to a PSTN gateway, and then travels over
>>> the PSTN to somebody's phone. Should that be considered a "secure" call? Or
>>> an "insecure" call? Or somewhere between those?
>>>
>>> Its going to be hard work to figure out what can both be reliably reported
>>> to users and also be understandable and meaningful to users.
>>>
>> Agree. I see your way of thinking as an argument to make all sessions
>> confidential, encrypted by default. We can't reliable define a "secure call"
>> and separate insecure sessions from secure sessions. Which mean that a UI
>> indication won't mean anything. We can just make sure that the first hop is
>> protected, the rest is up to the application that operates the media
>> session.
>> /O
>
>
>> On 9/7/11 4:20 PM, Christopher Blizzard wrote:
>>
>> I want secure-by-default, maybe even secure-only.
>> Even if it's not secure-only there's also an important UI consideration
>> depending how we end up doing that in browsers. In the past we've made
>> the secure mode special (the lock icon in the early days, now the
>> green/blue bar) but I think that we should be making the insecure mode
>> special. That is, always mark a connection as very clearly unencrypted
>> via UI affordances. Just like banks "wanting to know how to get the lock
>> icon" we should be making call sites "wanting to know how to get rid of
>> that huge ugly warning that makes us look bad."
>>
>> Once again, I would much prefer secure-only, but I'll take
>> secure-by-default across browsers if I can get it.
>>
>> --Chris
>