Re: [saag] AD review of draft-iab-crypto-alg-agility-06

Viktor Dukhovni <ietf-dane@dukhovni.org> Tue, 25 August 2015 19:07 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F18011A1BAC for <saag@ietfa.amsl.com>; Tue, 25 Aug 2015 12:07:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pm7SXhs82pJF for <saag@ietfa.amsl.com>; Tue, 25 Aug 2015 12:07:04 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 393D51A910E for <saag@ietf.org>; Tue, 25 Aug 2015 12:07:04 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id 5F41F284B56; Tue, 25 Aug 2015 19:07:03 +0000 (UTC)
Date: Tue, 25 Aug 2015 19:07:03 +0000
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: saag@ietf.org
Message-ID: <20150825190703.GO9021@mournblade.imrryr.org>
References: <619ffebb05ba4e2a9af03a6dcc768d6e@ustx2ex-dag1mb2.msg.corp.akamai.com> <20150824215037.GO9021@mournblade.imrryr.org> <9A043F3CF02CD34C8E74AC1594475C73F4AE62A1@uxcn10-5.UoA.auckland.ac.nz> <20150825134333.GX9021@mournblade.imrryr.org> <6b5167f3d0684a8a91caa6d37dec65e3@ustx2ex-dag1mb2.msg.corp.akamai.com> <20150825160627.GH9021@mournblade.imrryr.org> <CAHbuEH5r5s8ofChzt0_Rd8dxKqf8KXLDteYw8RSBX43nyFrN+A@mail.gmail.com> <2E7E9F38-DA68-4933-AD67-CF2A8E51B4F7@dukhovni.org> <7CEEF500-4530-4245-A3DC-C7D1ACB754B6@gmail.com> <CABkgnnVRdt65Vo0ReTbxpD8DqFErSTgi33qPrU5YNuy9PQBCzg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CABkgnnVRdt65Vo0ReTbxpD8DqFErSTgi33qPrU5YNuy9PQBCzg@mail.gmail.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/ng93TZKESgdw87v39I_7VlD8-D4>
Subject: Re: [saag] AD review of draft-iab-crypto-alg-agility-06
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: saag@ietf.org
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Aug 2015 19:07:06 -0000

On Tue, Aug 25, 2015 at 11:13:44AM -0700, Martin Thomson wrote:

> However, if we expect software to be updated in order to get
> opportunistic security, then I don't think it unreasonable to also
> expect it to be maintained on an ongoing basis.

And SMTP servers are updated from time to time, but the refresh
cycles are fairly long and the incentives to care about encryption
are not great.

If we want people to encrypt for the common good, despite lack of
apparent benefit to them, we must not erect barriers to adoption
in the form of interoperability problems.  Obsoleting mainstream
ciphers has a major interoperability impact and takes time,
(especially RC4 which was rumoured better than CBC after CRIME and
BEAST, was the best cipher in Windows 2003, and outperformed the
alternatives in the absense of hardware support).

What RFC 7435 says is that OS systems can be more tolerant of
deprecated algorithms when interoperability considerations trump
the security analysis.  Such tolerance is not forever.

> If you accept that software that is updated once can be continuously
> maintained thereafter, then it's not a stretch to conclude that
> deploying good ciphers is equally feasible.

Deployment of good ciphers is taking place, slowly.  In the mean-time,
there's email to be delivered, and users who rightly expect OS to
not get in the way.  Encryption is a nice-to-have.

    * Deliver the email
    * Encrypt if possible (RFC 3207, 7435)
    * Authenticate when requested by the peer
      (RFC 7435, SMTP DANE draft).

In practice, OS is working quite well, Google's outbound mail (which
is much less dominated by bulk mail ads than their inbound mail)
is now ~81+% encrypted, up from ~77% a year ago:

    https://www.google.com/transparencyreport/saferemail/

-- 
	Viktor.