Re: [saag] Revised version of draft-knodel-e2ee-definition

Mallory Knodel <mknodel@cdt.org> Fri, 12 May 2023 14:41 UTC

Return-Path: <mknodel@cdt.org>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96D38C14CE31 for <saag@ietfa.amsl.com>; Fri, 12 May 2023 07:41:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cdt.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yYsFMbHE8BxF for <saag@ietfa.amsl.com>; Fri, 12 May 2023 07:41:43 -0700 (PDT)
Received: from mail-pl1-x62e.google.com (mail-pl1-x62e.google.com [IPv6:2607:f8b0:4864:20::62e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8D1E9C151075 for <saag@ietf.org>; Fri, 12 May 2023 07:41:43 -0700 (PDT)
Received: by mail-pl1-x62e.google.com with SMTP id d9443c01a7336-1ab0c697c84so77149125ad.3 for <saag@ietf.org>; Fri, 12 May 2023 07:41:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cdt.org; s=google; t=1683902503; x=1686494503; h=content-transfer-encoding:in-reply-to:from:references:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=mK/0XTwxjXtes0jFvo6REgbO0xO/oizxcb45g+JPBF0=; b=noHSuNddTGp+Vh0VA6s6GVbMt+v5n5+cD0dS37nfnp5rQsm56p6zlAz8Kv3bzao4df 7eRV/1NHCY09N9mbXVouyK1u7gCWZYiZ8LdoyHJH0h+47DYerXeIm6malh+CdAvJBdlw EVXzNCW0XQhPi/VL6IfQp9W9+kuAq055fL0AM=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683902503; x=1686494503; h=content-transfer-encoding:in-reply-to:from:references:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=mK/0XTwxjXtes0jFvo6REgbO0xO/oizxcb45g+JPBF0=; b=hpcJgXyKar2pFEqeAsb905BcFO1cZrl2cUoY/3b9jMdtltaj3bGpuWBQbvW7Fh/XrQ Q1sDq5emq7b3iS2X9ITySSdEgbaH8eN7yhc1fXEg0+j5/Dsa//CS2W3yYPBe9byYUshO ibkt8yFyNLwBLF6GRVCCGz9tv6e2MA60ajh+c9j86RWI0dF2yv+A0syi/ZLseX3qvM9l aVwKfDRX7z+O8TUVW2MTofoRPWGQWXLUrGrBP1z6GRzJ6ciqRwZd2SkW68K6d8Xa0ina nqNdwRaqBAKIALW0tWQbFFdPYZxZX1uhnYU8Djt3D4YROQWu/EomaaQV815G9e3RAd04 0JsA==
X-Gm-Message-State: AC+VfDyRL+8+E8oOBY8QV+nQAlbT9qQ7pGegUhzCW1MgnquQO+qCt38R 4u39qIapAZ6dRudXAxigFAzszaEogtIOJzqb4UA=
X-Google-Smtp-Source: ACHHUZ6HaAUpXfOXODEhoEiVrWlQk9hpMuqtSBabB6pqORiMQcHv2Hk9N+YZ988LDgGC9LICOh/NBA==
X-Received: by 2002:a17:903:1d0:b0:1a6:7c83:e28e with SMTP id e16-20020a17090301d000b001a67c83e28emr26361089plh.68.1683902502658; Fri, 12 May 2023 07:41:42 -0700 (PDT)
Received: from [172.20.4.237] ([134.204.1.199]) by smtp.gmail.com with ESMTPSA id d15-20020a170902cecf00b001a94a497b50sm8036220plg.20.2023.05.12.07.41.41 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 12 May 2023 07:41:41 -0700 (PDT)
Message-ID: <7c84ad7c-bda4-b6f3-6621-01fb9ce7db68@cdt.org>
Date: Fri, 12 May 2023 10:41:40 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.10.0
Content-Language: en-US
To: Michael Richardson <mcr+ietf@sandelman.ca>, IETF SAAG <saag@ietf.org>
References: <CAGL5yWb=5MomKHwNKiEDph3kjrcbvonaL2ZEytGpKeNk7A87sQ@mail.gmail.com> <CABcZeBOzzOU-HDb2hmzcCipgiVqB6gACQMfo9GJsTT7UNw+eOA@mail.gmail.com> <CAGL5yWZsFnV1eSrrT2-7yh=0VhwqyQJL-RaEU33M2P9S9_KF=g@mail.gmail.com> <CABcZeBMKx6pPwUaXy05dP9nOvNST0_zX46ChqvApKC__HL9ELA@mail.gmail.com> <17a053ac-2b91-7fa0-ef5a-01fde9d2599f@cdt.org> <5564.1683828197@localhost> <51ff9b6a-2822-c4ca-bd74-bdcf98a222e6@cdt.org> <19598.1683852196@localhost>
From: Mallory Knodel <mknodel@cdt.org>
In-Reply-To: <19598.1683852196@localhost>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/uc3DgbvtjwX9lLcymkrBn-FFCnk>
Subject: Re: [saag] Revised version of draft-knodel-e2ee-definition
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 May 2023 14:41:48 -0000

Hi,

On 5/11/23 8:43 PM, Michael Richardson wrote:
> We all need a computational agent to work for us.
> There are all sorts of agents that can be deployed, and it would e2e between
> the agents.  But, then someone else would say, "oh, no, that's not e2e, it's
> *converse* term"
>
>      >> One can easily describe many hop-by-hop encryption schemes where they
>      >> operate at layer-1, layer-2 [MACSEC, WEP], layer-3 [IPsec, Wireguard],
>      >> layer-4 [TLS,DTLS], up to layer-5/6 [smtp, Tor, HTTPS, SIP], layer-7
>      >> [SMIME,PGP,MLS].
>      >>
>      >> It seems that e2ee is a relative term, and it depends a whole bunch of
>      >> negatives.  OTH, when describing the properties of a protocol, it
>      >> would be easier to just explain where the ends are that can be
>      >> attacked.
>
>      > It is an explicit goal that we remove that relativity with this draft.
>
> Then, I think even if you can hold on to that through the review process, it
> will become irrelevant ten minutes after the RFC comes out.

Rather if 10 minutes after the RFC comes out there is a new thing that 
hits user devices or a new change to an e2ee service, the definition 
document can be useful to people to determine whether t his is e2ee 
based on its properties. Elided support for PFS? Well, this doc says 
your service is not trustworthy e2ee.

It answers, no matter what the future holds, what are the fundamental 
constituent pieces of e2ee?

>      > I think I've understood that the protocols you're primarily involved in
>      > are e2e and they use encryption but they are not e2ee messaging, video,
>      > audio, email, etc. So in that sense, we are out of your scope and I
>      > think that's the main reason why it's not that useful.
>
> No, I totally and completely disagree.
> Everything I (and the IETF) did in 1995, in 2000, in 2005, in 2010, they were
> all *AT THE TIME* bleeding edge work, and were all considered e2ee *at the time*.
> PGP and SMIME are 35 year old e2ee email systems... until they are deployed
> differently with the keys stored in someone else's server.
>
> IPsec is e2ee at layer-3.
> TLS is e2ee at layer-4/5.
It's not about bleeding edge work. It's about the end points, and in 
this document we are concerned with people who have agents that use keys 
to authenticate and encrypt their communications. IPsec and TLS are out 
of scope.
> But, neither they, nor SMIME are going to get audio to my BT headset in an
> e2e fashion: that hop will be seperately encrypted.
> Nor video to my monitor, or my eyes: that will get encrypted across the HDMI cable.
>    In fact, that HDMI cable has been secured *AGAINST* us by the movie industry.
>    So it's a really treasonous hop!
>
> So, "messaging/video/audio" can never, according to your definition, be
> actually e2ee.
>
> OTH, if you were able to define the various "failures" to get to the end:
>       1) smartapplication2smartapplication encryption
>       2) host2host encryption (with application2application integrity?)
>       3) sipserver2sipserver encryption (with host2host encryption of media)
>
> (1) for instance, can be attacked by Google or Apple (or LG or Samsung or
>      Huawei or ...) by changing the video and audio drivers.
>      Plus, BT attacks if you are using a headset.
>      Maybe also attacks via the baseband CPU on the audio channels.

We're worried about compromise at scale on the network, so this is also 
out of scope.

-Mallory

-- 
Mallory Knodel
CTO, Center for Democracy and Technology
gpg fingerprint :: E3EB 63E0 65A3 B240 BCD9 B071 0C32 A271 BD3C C780