Re: [Smart] [Secdispatch] New Version Notification for draft-lazanski-smart-users-internet-00.txt

Eric Rescorla <ekr@rtfm.com> Mon, 15 July 2019 00:34 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: smart@ietfa.amsl.com
Delivered-To: smart@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C391512001A for <smart@ietfa.amsl.com>; Sun, 14 Jul 2019 17:34:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d1Nrj-Kc4_Wu for <smart@ietfa.amsl.com>; Sun, 14 Jul 2019 17:34:11 -0700 (PDT)
Received: from mail-lj1-x232.google.com (mail-lj1-x232.google.com [IPv6:2a00:1450:4864:20::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E22C1200B7 for <smart@irtf.org>; Sun, 14 Jul 2019 17:34:10 -0700 (PDT)
Received: by mail-lj1-x232.google.com with SMTP id x25so14393972ljh.2 for <smart@irtf.org>; Sun, 14 Jul 2019 17:34:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Z9rkWk9v2WlIyeEZ2QDYLGT2TpQRFMvMfs7x/hZ0kq0=; b=MZ6AwemFNuPGc4/7mNmG48NZamSAkzIvkU+dmS+iZWfjfUa+BKwRh/B99ROH5CICE6 3+xxluCsM5YirH1dVQX0ky65tdmwxWbWD4cQ6he9MgSXHaLOjm83TWgr5G6NxSgm6krr yC6eQTyWc4qO9YrR8o9qbI7h5aBF0FM49SpLxwFKM6GtlaQFgRGbtXWncUEsuAO/ryov RUVHzDHNXaDGpjyIJFow1pf1Rqq1sGd4himBA24ym4Z0R9NYbhoAhil9Y7/pNtJ7GIRO 5pG+udBGJPASZMfhuAfKMHWazn8+1784cP/XqCKMyXCNGKpB4lRo3P7CSFkCC7K3VmBB eapQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Z9rkWk9v2WlIyeEZ2QDYLGT2TpQRFMvMfs7x/hZ0kq0=; b=QcszqjRC3FSVfilMXVDNU8BihPCeYBUoRGSdn7nMt5N21JDgxW9rFq+KCUqjCnY89w HItowteb1vgLjvGQT2dOE4p4J6jQX7WtlZ/GNTiGv2kZwjHJBy3ZJ+ST2g3RNBg07V5k /FerDJDNVCyB5472nhhz/C/vYrS2rn+72R6lF7Y2HKVAR17vHSO2BaGQqjUuMfJTkLAG 7wbZabQ6ipAU7BSR0V/mxZm3G8IiqNZ44x8lI+uGO7X6GYhF2DzSxgeJmijMMwbpP+WY WsCFqB76WMgz6BKSKh/ys3A9hlx7yXvD26DaOutI3UcrrmTUB3rVgxjIxCziPGgl0WLQ SE8w==
X-Gm-Message-State: APjAAAXYMB/pBC2gNwkxbZUqyeTssSyCotFRI20Mx70IRAEDcAR6uyaF AYQLLm7nmAHmBj34qAOVwvdYwKLTKHAtKhfbqMQ=
X-Google-Smtp-Source: APXvYqw6heQzDgmHxVWJ0RWnCBG6y+YpZUGREfUEwSNBl4QGQ1Xg5zmdCwXQjqWuLAPB7wKLGZn4/N24BNzot2nGabg=
X-Received: by 2002:a2e:8892:: with SMTP id k18mr12524142lji.239.1563150848732; Sun, 14 Jul 2019 17:34:08 -0700 (PDT)
MIME-Version: 1.0
References: <0A8948DB-F97C-4F68-9173-7E627FB5019C@lastpresslabel.com> <4B10655B-8753-4B10-ACC9-16D7F78AD9F9@gmail.com> <CAMm+Lwh3KW6ZBbMktwmLcKyY8=_ysLYJF_7MsAuiOat6baQ=Kg@mail.gmail.com> <B551EF79-7E6E-4C4E-ADCA-6538F7972222@gmail.com> <CAMm+Lwg+2RFiXK43nJv7pD3OgM8y=ziVYxBkXD3F2kJyz37SxQ@mail.gmail.com> <50E59504-CA00-4792-AA72-FC08051E2486@gmail.com> <CAHbuEH5WUv-a4nKt5YAZosO-vE773Jh3xn1+-hA=4J7RBERc3g@mail.gmail.com> <78ccb680-9ccb-f13f-0442-02833cc7cc92@cs.tcd.ie> <CABcZeBNwmitpkJn0fCbNHOJtJ25yXdk6i6U9wK0a-9hwK1Tqcw@mail.gmail.com> <CAMm+Lwim0UK9YOO0vh+O0eOCQjZgsPQLdFZFQgsbpxpFNZChrA@mail.gmail.com>
In-Reply-To: <CAMm+Lwim0UK9YOO0vh+O0eOCQjZgsPQLdFZFQgsbpxpFNZChrA@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 14 Jul 2019 17:33:32 -0700
Message-ID: <CABcZeBOd9YM04OiY1BLw+YTn6FZKVg7PczLMggnowLjPo=k5Lg@mail.gmail.com>
To: Phillip Hallam-Baker <phill@hallambaker.com>
Cc: Stephen Farrell <stephen.farrell@cs.tcd.ie>, smart@irtf.org, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, Dominique Lazanski <dml@lastpresslabel.com>, IETF SecDispatch <Secdispatch@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000011c2d1058dad6be9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/smart/KQ9KV3Ol4_2n78eEmzOrBF2OJuU>
Subject: Re: [Smart] [Secdispatch] New Version Notification for draft-lazanski-smart-users-internet-00.txt
X-BeenThere: smart@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Stopping Malware And Researching Threats <smart.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/smart>, <mailto:smart-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/smart/>
List-Post: <mailto:smart@irtf.org>
List-Help: <mailto:smart-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/smart>, <mailto:smart-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Jul 2019 00:34:13 -0000

On Sun, Jul 14, 2019 at 5:27 PM Phillip Hallam-Baker <phill@hallambaker.com>
wrote:

>
>
> On Sun, Jul 14, 2019 at 5:25 PM Eric Rescorla <ekr@rtfm.com> wrote:
>
>> I more or less agree with Stephen's position.
>>
>> First, I recognize that this focus on secure endpoints talking to each
>> other is probably the part of 3552 that people are most unhappy
>> about. As I was almost certainly the person who wrote that text, it might
>> be helpful if I laid out some background.
>>
>> First, RFC 3552 isn't intended to say that endpoint threats aren't
>> real, but merely that they are out of scope because they are hard
>> to address. Here's the text in context:
>>
>>    The Internet environment has a fairly well understood threat model.
>>    In general, we assume that the end-systems engaging in a protocol
>>    exchange have not themselves been compromised.  Protecting against an
>>    attack when one of the end-systems has been compromised is
>>    extraordinarily difficult.  It is, however, possible to design
>>    protocols which minimize the extent of the damage done under these
>>    circumstances.
>>
>
> Hmm... restricting the requirements according to what problems we think we
> know how to solve seems to be a bit of a systematic problem in the
> industry.
>

Without taking the position on the industry as a whole, the E in IETF
stands for "engineering", so I think trying to solve problems we know how
to solve is prudent. As the list of things we know how to solve increases,
then we ought to attempt to solve those as well.


First, I'm not sure that I agree that cyber attacks on endpoints are
>> the greatest threat to the Internet, but even assuming that's so,
>> what are the implications of that for work in the IETF? It's one thing
>> to change the words of 3552, but what work specifically would we
>> do if those words were different.
>>
>
> I'm not keen on the focus on the end point. It seems like it is brought up
> as a trump card to 'prove' that all security efforts are futile and the
> criminals must always win.
>

Well, that's certainly not my position.


Endpoints don't require standards in quite the same degree. But that
> doesn't mean that nothing we do is relevant to endpoints.
>

Nor is this.

-Ekr

For example, forget 95% of trustworthy computing, the main residual
> vulnerability of crypto protocols is the risk of private keys being leaked
> off the machine. That is an endpoint security control that provides real
> leverage for relatively little cost. But it is a mechanism that can only be
> used in communication protocols if they are designed with that constraint
> in mind.
>
>
>
>