Re: [saag] Ubiquitous Encryption: content filtering

Christian Huitema <huitema@microsoft.com> Mon, 22 June 2015 21:24 UTC

Return-Path: <huitema@microsoft.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 350971ACD82 for <saag@ietfa.amsl.com>; Mon, 22 Jun 2015 14:24:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K0Q8KHBNPaum for <saag@ietfa.amsl.com>; Mon, 22 Jun 2015 14:24:06 -0700 (PDT)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0101.outbound.protection.outlook.com [65.55.169.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 965C71AC42D for <saag@ietf.org>; Mon, 22 Jun 2015 14:24:06 -0700 (PDT)
Received: from DM2PR0301MB0655.namprd03.prod.outlook.com (10.160.96.17) by DM2PR0301MB0654.namprd03.prod.outlook.com (10.160.96.16) with Microsoft SMTP Server (TLS) id 15.1.195.15; Mon, 22 Jun 2015 21:24:05 +0000
Received: from DM2PR0301MB0655.namprd03.prod.outlook.com ([10.160.96.17]) by DM2PR0301MB0655.namprd03.prod.outlook.com ([10.160.96.17]) with mapi id 15.01.0195.005; Mon, 22 Jun 2015 21:24:04 +0000
From: Christian Huitema <huitema@microsoft.com>
To: Nico Williams <nico@cryptonector.com>, Stephen Kent <kent@bbn.com>
Thread-Topic: [saag] Ubiquitous Encryption: content filtering
Thread-Index: AQHQqZyDVZfM/qjQ1ki7JjpGF/YhdJ2zz0uAgAAQJoCAACwngIAE9FYAgAANCgCAAACBMA==
Date: Mon, 22 Jun 2015 21:24:04 +0000
Message-ID: <DM2PR0301MB06554ECDB1166C32CF70366CA8A10@DM2PR0301MB0655.namprd03.prod.outlook.com>
References: <99DC814A-2B7D-4802-A1C7-399E77F37BD7@gsma.com> <CABtrr-U9kLfq4GQbWSgPN=wCD=Cdi0uQ+bQqXj35j+PFtuE8Pg@mail.gmail.com> <A4BAAB326B17CE40B45830B745F70F108E070156@VOEXM17W.internal.vodafone.com> <55844743.4030300@cs.tcd.ie> <55886F38.4030906@bbn.com> <20150622211207.GM6117@localhost>
In-Reply-To: <20150622211207.GM6117@localhost>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: cryptonector.com; dkim=none (message not signed) header.d=none;
x-originating-ip: [131.107.159.254]
x-microsoft-exchange-diagnostics: 1; DM2PR0301MB0654; 5:Zn2a1XgwQgKIc8tyw5VMHbZETK+ZwbdHBgg91c3ff78ZHDAaKs2cnH5mHawxfxW0HIsLL7vPqB+aqefsdTTKjsPTyCLBZWcPHbB9FE64kNxQCXzzsoiF1npDL7lNLqFb1RQqjwBFVsdVgJDW4tzewg==; 24:YWakQ3E3gn5AhwrjXkDaLPgKPgirmSk/rzq98068ai0wl/DbzyTeIxe7OZIOjOGqQJ79K0WHVEezhutwgxVrD4hURsaIM6+Dh77eoMPqlwY=; 20:bO5jVeCVQN6XP/LwcFCWH41hhejoqKQsh08VIrcw7o6C2pNgYpJfHTBT488J4+mpbxdfLxpJOzvwii+ZSwpwzA==
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(42143001); SRVR:DM2PR0301MB0654;
x-o365ent-eop-header: Message processed by - O365_ENT: Allow from ranges (Engineering ONLY)
x-microsoft-antispam-prvs: <DM2PR0301MB0654C3ED128EA0A7570C6602A8A10@DM2PR0301MB0654.namprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401001)(5005006)(3002001); SRVR:DM2PR0301MB0654; BCL:0; PCL:0; RULEID:; SRVR:DM2PR0301MB0654;
x-forefront-prvs: 06157D541C
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(24454002)(377454003)(54356999)(99286002)(33656002)(2900100001)(92566002)(122556002)(102836002)(77096005)(40100003)(5001770100001)(2950100001)(5001960100002)(62966003)(77156002)(106116001)(2656002)(86362001)(87936001)(46102003)(189998001)(93886004)(76576001)(76176999)(86612001)(5002640100001)(66066001)(5003600100002)(74316001)(50986999); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR0301MB0654; H:DM2PR0301MB0655.namprd03.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jun 2015 21:24:04.2495 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR0301MB0654
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/50rjDirmpJCYlCn7ivD00L_GZFU>
Cc: "saag@ietf.org" <saag@ietf.org>
Subject: Re: [saag] Ubiquitous Encryption: content filtering
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jun 2015 21:24:08 -0000

On Monday, June 22, 2015, at 2:12 PM, Nico Williams wrote:

> ..
> But it isn't just a matter of engineering the protocol.  There are security
> problems involved in making this happen (like: how do you express to the user
> that there is one (or more!) middle box filtering and/or modifying their traffic?
> how do users get to opt out?  how is scope limited?  (e.g., how do you prevent
> the device/operator from MITMing the user when the user is NOT using the
> operator's network?)).

And that's a good reason for not engineering a specific hole in our protocols!

> And anyways, operators already get to do this by simply forcing users to use
> devices from the operators (modified to have MITM CA trust anchors).

Except, we really want to close that particular hole, don't we? I don't know which particular combination of caching, logs and third party referrals we will end up standardizing, but we have to assume that the security stack will eventually detect this kind of meddling, and expose it. At a minimum, this is going to be a significant PR issue for any telco playing that game.

Generic content filtering is not compatible with encryption. That's pretty clear. But if I followed the debates correctly, the actual requirement is site blocking, not generic content filtering. The per site filtering can actually be performed without an MITM attack. If the site uses its own IP addresses, then the operators can filter those IP addresses. If the site used a shared address, then the TLS packets contain a clear text SNI, and firewall magic could drop these connections.

I am not very happy about the clear text SNI, but it does not seem to be going away any time soon.

-- Christian Huitema