Re: [saag] Ubiquitous Encryption: content filtering

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Mon, 06 July 2015 16:02 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF0461B2F4E for <saag@ietfa.amsl.com>; Mon, 6 Jul 2015 09:02:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 69B0sE_Ya-Tl for <saag@ietfa.amsl.com>; Mon, 6 Jul 2015 09:02:10 -0700 (PDT)
Received: from mail-wi0-x22d.google.com (mail-wi0-x22d.google.com [IPv6:2a00:1450:400c:c05::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 833FE1B2F41 for <saag@ietf.org>; Mon, 6 Jul 2015 09:02:04 -0700 (PDT)
Received: by wifm2 with SMTP id m2so34296875wif.1 for <saag@ietf.org>; Mon, 06 Jul 2015 09:02:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=/ByNZGdEJh3anFhAYt/eTATS4AcumNulDDg6e3LUoow=; b=rN1vaHXDOszJ6yWH8k8m8DgUas8/XhpaHfmbyNZ1zK5S2dEBP1dDEhwvsZEA+NwLfH BT6tZrjX/uf1t6v2ZxtBxy9Bk9vxBuHnA0xnzIfUqAmyyukfPni4rqzCtZ3fV5eYu1cI XxU60r2sMYZtBb7kSXWdByRtHZDxXNGLJH/dackmTFrktUpqppnWFjI3E3HTJK3TUH5J b4LwwIfTKA2Zx5kVjGOythSMkRenVnqNWK1VU3/2Qvyw/iI2MlSACQGu8f2XzYhHF3xu NsT0wrEgTrHCDVBlnBQXOM34QSTgGgbbRH6a3lAGbAD0HDVDCRV+3p2EFIl4r8KvDqyI t0jQ==
MIME-Version: 1.0
X-Received: by 10.194.75.132 with SMTP id c4mr90916225wjw.80.1436198523274; Mon, 06 Jul 2015 09:02:03 -0700 (PDT)
Received: by 10.28.31.194 with HTTP; Mon, 6 Jul 2015 09:02:03 -0700 (PDT)
In-Reply-To: <43454D75-916E-4174-A7C3-700E83CCD5DE@gsma.com>
References: <99DC814A-2B7D-4802-A1C7-399E77F37BD7@gsma.com> <CABtrr-U9kLfq4GQbWSgPN=wCD=Cdi0uQ+bQqXj35j+PFtuE8Pg@mail.gmail.com> <A4BAAB326B17CE40B45830B745F70F108E070156@VOEXM17W.internal.vodafone.com> <55844743.4030300@cs.tcd.ie> <55886F38.4030906@bbn.com> <20150622211207.GM6117@localhost> <5589A9C2.40802@bbn.com> <20150623191610.GW6117@localhost> <CAMm+Lwi7BeJL+ngbMNx3PB92bHKZNawCs96sPM+d7u-JuWtFKg@mail.gmail.com> <43454D75-916E-4174-A7C3-700E83CCD5DE@gsma.com>
Date: Mon, 06 Jul 2015 12:02:03 -0400
Message-ID: <CAHbuEH7xUfPRZ4r_hWzMpDFFJ6pqjyE4-kXYr+q9e=kCKB6bBw@mail.gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
To: Natasha Rooney <nrooney@gsma.com>
Content-Type: multipart/alternative; boundary="047d7bb04b7cce8bcf051a3706c0"
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/m7TSdFPgd8pS9n3Eoj-kz-DUOOM>
Cc: "saag@ietf.org" <saag@ietf.org>
Subject: Re: [saag] Ubiquitous Encryption: content filtering
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2015 16:02:13 -0000

On Mon, Jul 6, 2015 at 6:20 AM, Natasha Rooney <nrooney@gsma.com> wrote:

>  Apologies for the late response, I was away for a week. I have an
> amendment to the Content Filtering suggestion:
>
>  I had a comment to remove the "mobile" from "mobile networks" in the
> submission; which I am fine to do but am not sure if content filtering is
> done in the same way on all networks. If so, then the mobile can be
> removed! I just ran through the other emails and I don’t think anyone else
> asked a question, if this is incorrect please let me know!
>

Thanks for the revised text.  Al and I chatted and we'll add this into
section 2.1.5.  As Yoav and I discussed at some point in the thread,
content filtering also occurs on enterprise networks.  We are adding this
to the middlebox monitoring section of the draft.  If this applies to other
network types besides mobile (not at an edge), then we can adjust the
text.  The revised text is better and gets further away from the concerns
of whether or not it's appropriate for the IETF.  This draft is just
documenting current practices that will change with encryption, for some of
the documented items, new ways to achieve the same goal will be developed,
for others, they will not be developed.

Al and I will wait to add text on the SPAM discussion until that evolves a
little further.

We'll have the next version posted before EOD.

Thank you,
Kathleen


>
> Natasha
>
>
> Natasha Rooney | Web Technologist | GSMA | nrooney@gsma.com | +44
> (0) 7730 219 765 | @thisNatasha | Skype: nrooney@gsm.org
> Tokyo, Japan
>
>
>  On Jun 24, 2015, at 4:32 AM, Phillip Hallam-Baker <phill@hallambaker.com>
> wrote:
>
>  Responding to various parts of the thread:
>
>  Q: What is the difference between filtering and censorship?
> A: The person who decides to impose it.
>
>  Filtering is actually an essential tool for use of the modern Internet.
> Without filtering there is no mechanism to control abuse.
>
>  Today I received five junk calls. The time is rapidly approaching when I
> get rid of the telephone line completely. There is simply too much spam.
>
>  The fact that the Russian Business Network has put a machine on the net
> does not mean that any machine I own need be able to connect to it. I don't
> want their IP address to be reachable, I don't want their DNS names to
> resolve.
>
>  So the ability to perform filtering is an essential part of every
> end-to-end encryption mechanism. But giving control over that filtering to
> the government is not. When I was at university there was a club for thugs
> who went round smashing up restaurants for fun. One of the members of that
> club is now the UK Prime Minister. I am damned if I am going to let the
> likes of him decide what anyone can access.
>
>  The question is who has control and who is empowered.
>
>  I am firmly of the opinion that ubiquitous end-to-end encryption is only
> viable if it is accompanied by a robust and easy to use mechanism that
> allows for a gap in the stack. If I publish a key for
> phill@hallambaker.com it will be the key of a service in the cloud that
> performs anti-malware filtering. Use of the end-to-end key will be reserved
> to people who are expressly authorized to use it.
>
>
>  _______________________________________________
> saag mailing list
> saag@ietf.org
> https://www.ietf.org/mailman/listinfo/saag
>
>
> This email and its attachments are intended for the above named only and
> may be confidential. If they have come to you in error you must take no
> action based on them, nor must you copy or show them to anyone; please
> reply to this email or call +44 207 356 0600 and highlight the error.
>
> _______________________________________________
> saag mailing list
> saag@ietf.org
> https://www.ietf.org/mailman/listinfo/saag
>
>


-- 

Best regards,
Kathleen