Re: [saag] keys under doormats: is our doormat ok?

Eliot Lear <lear@cisco.com> Mon, 13 July 2015 16:20 UTC

Return-Path: <lear@cisco.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 731B81A0370 for <saag@ietfa.amsl.com>; Mon, 13 Jul 2015 09:20:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J3bOgmzd1uno for <saag@ietfa.amsl.com>; Mon, 13 Jul 2015 09:20:11 -0700 (PDT)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF6241A00EC for <saag@ietf.org>; Mon, 13 Jul 2015 09:20:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2949; q=dns/txt; s=iport; t=1436804408; x=1438014008; h=message-id:date:from:mime-version:to:subject:references: in-reply-to; bh=GgiKeApX94CKH/EegG2Z5UYhICLYbEkenYbjSKUPdhw=; b=GmYyqYSUQMdWS6U/DHV2LSFhsIXZPeB0QmPftHuWFeKfOZW0BvuUf+e7 cgzmWYvddLdC6kCHssnYu66Ryad0qJjares+qBstLvK4+IdL1G9nCJ93+ XqLMKDevwjid1kstjsojUyDm3v7jfnQN1/wjK+vBSBJVVfIByZ04ne+iw 0=;
X-Files: signature.asc : 481
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DOBACI5KNV/xbLJq1bh3O9QIJUAoIFAQEBAQEBgQuEIwEBAQMBI1URCxgJFgsCAgkDAgECAUUGAQwIAQGIIgi1FZV3AQEBAQEBAQMBAQEBAQEBG4tMhQ2CaIFDAQSUMYItgVSIA4E/hwUikAUmg308gnwBAQE
X-IronPort-AV: E=Sophos;i="5.15,463,1432598400"; d="asc'?scan'208";a="558260665"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP; 13 Jul 2015 16:20:06 +0000
Received: from [10.61.88.14] (ams3-vpn-dhcp6159.cisco.com [10.61.88.14]) by aer-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id t6DGK6Zp018683; Mon, 13 Jul 2015 16:20:06 GMT
Message-ID: <55A3E535.3070801@cisco.com>
Date: Mon, 13 Jul 2015 18:20:05 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, dcrocker@bbiw.net, "saag@ietf.org" <saag@ietf.org>
References: <55A26484.7050807@cs.tcd.ie> <87fv4ts9l2.fsf@latte.josefsson.org> <C64F2343-6937-44EB-BBA6-6D744BBC79A1@vpnc.org> <CAN40gSui7XrVtuZHLOyGs09ZJc5d20SN9AB4Ftnmav7z-tCW=g@mail.gmail.com> <CAGvU-a7CocoadpHP0f+_JCctfVG6y4Qtn0Cu_v9UxKNh=4+ajg@mail.gmail.com> <55A2AD94.3040604@tzi.org> <55A2E9F4.3010908@dcrocker.net> <55A3BD12.4040704@cs.tcd.ie>
In-Reply-To: <55A3BD12.4040704@cs.tcd.ie>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="ELMKq7kUn7sViikLP28NC2aIBfO0HoNkc"
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/7rPA-FLNUWsNY_-q4cEfGzJPfuU>
Subject: Re: [saag] keys under doormats: is our doormat ok?
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jul 2015 16:20:13 -0000

Hi Stephen,

On 7/13/15 3:28 PM, Stephen Farrell wrote:
> Hiya,
>
> On 12/07/15 23:28, Dave Crocker wrote:
>> I will also suggest that we ought to have the IETF review of the draft
>> RFC for this include a segment at an IETF plenary. 
> Just as a point of information for those who're considering there
> may be external-to-the-IETF benefits in some form of renewal of
> the relevant content from RFC 1984...
>
> One reason I figured RFC 1984 is still ok is that the IAB have quite
> recently weighed in with an even stronger recommendation "that
> encryption be deployed throughout the protocol stack." [1] And while
> that's an IAB statement and hasn't been through the IETF consensus
> process, and while that doesn't directly touch on mandated-key-escrow-
> silliness, it does refer back to RFC 1984, as well as going further.

The reference to 1984 is in the IAB statement to demonstrate the
continuum of time that the IAB and IESG have considered this issue.  
There are some aspects of 1984 that could evolve.  Particularly the
rationale in the section entitled "PROTECTION OF THE EXISTING
INFRASTRUCTURE".  Encryption is required for there to be confidence in
the infrastructure.


>
> So I reckon that from a non-IETF perspective, [1] probably achieves
> as much as we'd achieve with any easy method of "renewing" RFC 1984.
> (I'm also not sure what "renewing" 1984 might mean exactly but I'm
> sure we could figure some mechanics that'd work and if it turns out
> I'm wrong above and folks do want some such thing, I'll of course
> try help get that done.)

I think Christian used the term "reaffirming".  Before we do that, we
people should really read through 1984 with a 2015 perspective.  The
document has held together well, even with a few issues.  But to
reaffirm would be to say that the 1996 world view is still applicable. 
I don't think it is.  I think we'd make a different statement today. 
Maybe this is what you mean by "renew".

Eliot