Re: [therightkey] Basically, it's about keeping the CAs honest

Martin Rex <mrex@sap.com> Thu, 16 February 2012 05:24 UTC

Return-Path: <mrex@sap.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E15C221E802A for <therightkey@ietfa.amsl.com>; Wed, 15 Feb 2012 21:24:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.134
X-Spam-Level:
X-Spam-Status: No, score=-10.134 tagged_above=-999 required=5 tests=[AWL=0.115, BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mssPCSd77X6f for <therightkey@ietfa.amsl.com>; Wed, 15 Feb 2012 21:24:32 -0800 (PST)
Received: from smtpde01.sap-ag.de (smtpde01.sap-ag.de [155.56.68.170]) by ietfa.amsl.com (Postfix) with ESMTP id 7FECF21E8011 for <therightkey@ietf.org>; Wed, 15 Feb 2012 21:24:32 -0800 (PST)
Received: from mail.sap.corp by smtpde01.sap-ag.de (26) with ESMTP id q1G5OOGd001393 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 16 Feb 2012 06:24:25 +0100 (MET)
From: Martin Rex <mrex@sap.com>
Message-Id: <201202160524.q1G5ON2p003570@fs4113.wdf.sap.corp>
To: aerowolf@gmail.com
Date: Thu, 16 Feb 2012 06:24:23 +0100
In-Reply-To: <gym9r33x3m8ydl4xwbjezwJv4X.penango@mail.gmail.com> from "Kyle Hamilton" at Feb 13, 12 05:44:21 pm
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
X-SAP: out
Cc: nico@cryptonector.com, therightkey@ietf.org, mrex@sap.com, adam@cypherspace.org
Subject: Re: [therightkey] Basically, it's about keeping the CAs honest
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: mrex@sap.com
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>, <mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>, <mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Feb 2012 05:24:34 -0000

Kyle,

Kyle H wrote:
>
> We MUST permit every use of our protocols.  We MUST describe the
> computational processes and we MUST define the intended semantics,
> but we MUST NOT try to sabotage anything that the standards'
> implementors or consumers try to do.  If we do, we're overstepping
> the bounds of what authority we can legitimately claim as standards
> designers.

We seem to be talking about completely different protocols.

*I* am talking about TLS (any version), which has the clearly stated
design goal:

  http://tools.ietf.org/html/rfc2246

   Abstract

   This document specifies Version 1.0 of the Transport Layer Security
   (TLS) protocol. The TLS protocol provides communications privacy over
   the Internet. The protocol allows client/server applications to
   communicate in a way that is designed to prevent eavesdropping,
   tampering, or message forgery.

  http://tools.ietf.org/html/rfc5246

   Abstract

   This document specifies Version 1.2 of the Transport Layer Security
   (TLS) protocol.  The TLS protocol provides communications security
   over the Internet.  The protocol allows client/server applications to
   communicate in a way that is designed to prevent eavesdropping,
   tampering, or message forgery.


What these MITM proxies are doing is _completely_and_thoroughly_
subverting the entire purpose of the TLS protocol.  They're doing
it not by exploiting weaknesses in the TLS protocol itself
(at least prior to rfc5746), but instead, by exploiting a long-standing
fatal design flaw in the security in the existing TLS X.509 PKI trust model.

Those who want a protocol for encrypted communication that can be
arbitrarily MITMed should design themselves such a protocol.
Expecting the IETF to support continued exploitation of a serious
weakness in a security architecture that is the exact opposite of
its stated design goal is inappropriate for the IETF.


-Martin