Re: [tcpinc] Summary of arguments from call

Joe Touch <touch@isi.edu> Tue, 04 August 2015 17:29 UTC

Return-Path: <touch@isi.edu>
X-Original-To: tcpinc@ietfa.amsl.com
Delivered-To: tcpinc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65A5F1A8874 for <tcpinc@ietfa.amsl.com>; Tue, 4 Aug 2015 10:29:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.61
X-Spam-Level:
X-Spam-Status: No, score=-1.61 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_8BIT_HEADER=0.3, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MusfnFm1g0Vn for <tcpinc@ietfa.amsl.com>; Tue, 4 Aug 2015 10:29:34 -0700 (PDT)
Received: from nitro.isi.edu (nitro.isi.edu [128.9.208.207]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D35B71A8893 for <tcpinc@ietf.org>; Tue, 4 Aug 2015 10:29:34 -0700 (PDT)
Received: from [128.9.184.236] ([128.9.184.236]) (authenticated bits=0) by nitro.isi.edu (8.13.8/8.13.8) with ESMTP id t74HTHGp027002 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Tue, 4 Aug 2015 10:29:17 -0700 (PDT)
To: Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>, tcpinc <tcpinc@ietf.org>
References: <6F2592D7-158D-481C-A5F7-3CC1EDD774BC@tik.ee.ethz.ch>
From: Joe Touch <touch@isi.edu>
Message-ID: <55C0F66C.7030600@isi.edu>
Date: Tue, 04 Aug 2015 10:29:16 -0700
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.0.1
MIME-Version: 1.0
In-Reply-To: <6F2592D7-158D-481C-A5F7-3CC1EDD774BC@tik.ee.ethz.ch>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
X-MailScanner-ID: t74HTHGp027002
X-ISI-4-69-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <http://mailarchive.ietf.org/arch/msg/tcpinc/r6IMeemX8fqw4TJkjUFof6BYMBQ>
Cc: touch@isi.edu
Subject: Re: [tcpinc] Summary of arguments from call
X-BeenThere: tcpinc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion list for adding encryption to TCP." <tcpinc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpinc>, <mailto:tcpinc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpinc/>
List-Post: <mailto:tcpinc@ietf.org>
List-Help: <mailto:tcpinc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpinc>, <mailto:tcpinc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Aug 2015 17:29:36 -0000

FWIW, there were a number of issues raised when tcpcrypt was presented
to the transport area. I haven't seen those raised here, and it would be
useful to know how they affect both current proposals.

You might want to contact the TSV for that.

Joe

On 8/3/2015 8:15 AM, Mirja Kühlewind wrote:
> Hi all,
> 
> as promised my summary of arguments for and against a certain approach (see below). Text in quotes is more or less copied from someone's mail as an indication what exactly the argument was and how often this point was raised. Not guarantee I’ve captured everything but I’ve tried my best.
> 
> I personally would summarize this as simplicity and maturity are the main arguments for tcpcrypt, while people at the same time are afraid that the dependencies on TLS could hold up the work. For TCP-use-TLS the main argument is that re-use might help to avoid bugs and make it simpler, as well as good interactions with the higher layer TLS which may allow transition in future.
> 
> Probably no surprising results; hope it’s still helpful for you to have the summary below!
> 
> Mirja
> 
> -------------------------------------------------
> 
> a) TCP-use-TLS
> Pro: 
> - re-use of existing code/mechanisms will help to avoid bugs: 
> 	- "security bugs in developing a new security protocol; less problems than something new“
> 	- "TLS will ensure better and deeper security analysis“
> 	- "light weight filter can be smaller, and thus easier to verify, debug, or even prove“
> 	- "New code is undesirable in security systems"
> - re-use makes it simpler: 
> 	- "simple and direct application of TLS“
> 	- "better than an entirely distinct protocol"
> - better interaction with/transition to use of application-layer TLS:
> 	- "good fit for out-of-band negotiation of application-layer TLS“
> 	- "allows applications to seek full TLS if available and upgrade to it“
> 	- "TCP INC as a transition technology/simple evolution path“
> - easier to deploy: 
> 	-„more likely to achieve ubiquitous encryption because easier to deploy“
> 	- "TLS-the-brand is established and trusted by vendors -> acceptance more quickly"
> - can also be implemented in kernel: 
> 	- "profile of tls can be produced that will be acceptable to kernel developers“
> 	- "embedded systems already do TLS in the kernel“
> 	- "TCP-use-TLS is not restricted to implementation in applications *or* in user-space"
> - appropriate candidate to pick one: 
> 	- "serves the purpose of opportunistic encryption“
> 	- "two stacks means twice the attack surface and twice the number of security bugs"
> 
> Contra:
> - dependency on TLS and update cycles of other working group
> 	- "opposed to putting TLS into TCP"
> 	- "TLS is very slow to update at the institutional level“
> 	- "TLS depends on other WG“
> 	- "do not want see TCPINC and TLS1.3 tightly coupled -> can lead to delay and friction“
> 	- "TLS proposal also limits the ability to make modifications because need to interoperate w/ the TLS spec/WG“
> - can’t not be implemented in the kernel:
> 	- "TLS not be suited for running in supervisor mode“
> - no code available/no proof of feasibility 
> 	- "TLS has only working code/substantial experience outside TCP“
> 	- ""passthrough" mode of TLS proposal looks unlikely to work"
> - effectively there is no re-use:
> 	- "TLS1.3 which is brand new - experience argument does not apply here"
> 	- "codebase is going to be new anyway“
> 	- "likely flawed argument applies equally to both proposals“
> - should not require a userland implementation/modification
> 	- "TLS proposal still allows for implementations to do a minimal implementation where TLS is pushed down to userland“
> 
> b) tcpcrypt
> Pro:
> - simplicity: 
> 	- "Tcpcrypt looks much simpler“
> 	- "clean, tight, simple“
> 	- "is simpler“
> 	- "_simple_ protocol“
> 	- "simplicity“
> 	- "simpler"
> 	- "a simple, easily-understood security primitive with provable security properties“
> 	- "simple approach to authentication"
> - running code and higher level of maturity
> 	- "working code and experience"
> 	- "one complete document"
> 	- "some current runing code“
> 	- "started working earlier since there is more content to review“
> 	- "basically ready-to-go“
> 	- "experience of a working implementation“
> 	- "research on the impact on middleware boxes“
> 	- "the Internet-Draft is more detailed“
> 	- "running code“
> - ‚cleaner‘, more self-contained approach (more suitable to TCP, separation of authentication, …)
> 	- "more specifically suited to TCP"
> 	- "more self-contained“
> 	- "a clean break with legacy systems"
> 	- "a natural separation between application-specific authentication and general-purpose encryption“
> - easier to implement in the kernel:
> 	- "use in a kernel (FreeBSD) environment“
> 	- "more likely to make it into a kernel"
> - higher chance of (quick) deployment:
> 	- "quick adoption by major Linux distributions"
> 	- "more likely to see actual deployment, especially in a kernel“
> - no dependencies on TLS/other working group
> 	- "less dependence on other WGs or legacy standards/formats“
> 	- "isn't anchored to another working group's specification -> easier to modify“
> - Diversity:
> 	- "broader base of applicability"
> 	- "experience with working on tcpcrypt will be informative (if not followed on)"
> 	- "adds to the diversity of protocols"
> 	- "additional genetic diversity" 
> 
> c) both
> Pro:
> - "Kernel vs user space arguments aren't really important"
> - "both good starting points"
> - "more implementation and experimentation experience needed“
> 
> Contra
> - "risk of nothing much happening until November"
> 
> 
> 
> _______________________________________________
> Tcpinc mailing list
> Tcpinc@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpinc
>