Re: [therightkey] Basically, it's about keeping the CAs honest

Phillip Hallam-Baker <hallam@gmail.com> Thu, 16 February 2012 18:42 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A810311E8089 for <therightkey@ietfa.amsl.com>; Thu, 16 Feb 2012 10:42:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.398
X-Spam-Level:
X-Spam-Status: No, score=-3.398 tagged_above=-999 required=5 tests=[AWL=0.201, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xPDBAU0U0EMk for <therightkey@ietfa.amsl.com>; Thu, 16 Feb 2012 10:41:57 -0800 (PST)
Received: from mail-tul01m020-f172.google.com (mail-tul01m020-f172.google.com [209.85.214.172]) by ietfa.amsl.com (Postfix) with ESMTP id CF7E511E8074 for <therightkey@ietf.org>; Thu, 16 Feb 2012 10:41:56 -0800 (PST)
Received: by obbwd15 with SMTP id wd15so3868358obb.31 for <therightkey@ietf.org>; Thu, 16 Feb 2012 10:41:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=CHRXxxcg+g5ZbjW9m3pkTiJH5O/Vu3O9s7r89nPtx/0=; b=g4xd/noSkQWbRj567Vu6x1OBCwHglKTAObENm2bRJ9VQx/fJ82nl/uLG+1xdRJzIOQ eV5Hu+eBGlxS12AOuqtYoIvlYoZA9vrx+tmHOeEjYVLbLmG7QprMN+xzEFYj7UYAgOaJ y65ZKTb5gC71taIRLgtaY2RcacwojPL5sbjGM=
MIME-Version: 1.0
Received: by 10.182.160.37 with SMTP id xh5mr2711303obb.29.1329417716496; Thu, 16 Feb 2012 10:41:56 -0800 (PST)
Received: by 10.182.75.138 with HTTP; Thu, 16 Feb 2012 10:41:56 -0800 (PST)
In-Reply-To: <4F3D481E.40001@fifthhorseman.net>
References: <gym9r33x3m8ydl4xwbjezwJv4X.penango@mail.gmail.com> <201202160524.q1G5ON2p003570@fs4113.wdf.sap.corp> <CA+cU71n1HeQ3nK_FjM67dO8U7=HmDBG3q0_4cvH9CY6Y0_=9BQ@mail.gmail.com> <CAMm+LwiQdXo6bmYmtyR7aw1S=A889edFdSU5aAJVgN4ZMwNrFw@mail.gmail.com> <4F3D481E.40001@fifthhorseman.net>
Date: Thu, 16 Feb 2012 13:41:56 -0500
Message-ID: <CAMm+LwhrxnznFUTf_TJERjt0rNo+Offs2aUnKLPP2JBR8SYVSA@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: therightkey@ietf.org, Tom Ritter <tom@ritter.vg>
Subject: Re: [therightkey] Basically, it's about keeping the CAs honest
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>, <mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>, <mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Feb 2012 18:42:01 -0000

On Thu, Feb 16, 2012 at 1:17 PM, Daniel Kahn Gillmor
<dkg@fifthhorseman.net> wrote:
> On 02/16/2012 11:18 AM, Phillip Hallam-Baker wrote:
>> All that I have seen proposed in this regard is to have a draft that states:
>>
>> 1) This is a really bad idea in general
>> 2) If you really have to do it then do it this way
>> 2a) It is turned off by default
>> 2b) It only permits the authorized MITM to intercept
>> 2c) The user is repeatedly warned that MITM is taking place
>> 2d) There is no way that any credentials or infrastructure created for
>> authorized intercept can be used to support unauthorized intercept
>
> eh?  it seems you're proposing a new mechanism, when Tom just pointed
> out that the existing mechanism (endpoint-controlled trust policy)
> already works for nearly every case.  (the exceptions being client-side
> certs, and the hassle for IT staff of having to configure trust stores
> on each client)
>
>> I would rather have a defined path for this than to see another
>> iteration where the primary goal is to minimize the effort required
>> for the IT staff deploying the system.
>
> IT staff already have a simple way to do this: embed a MITM-enabling
> root authority (or comparable mechanism) in the client's trust policy.

It is a solution to the IT depts problem but there isn't transparency
for the user. The user is not told that they are being MITM'd.

Further, if DANE was deployed or any of the proposals made here was
deployed they would stop the MITM enabling root authority from
working. So we are proposing to break the escape hole you are
proposing they use.

Now breaking that escape hole might be a good thing. But we should
certainly think about the consequences and it should be a deliberate
decision to break it and not provide an alternative.

> Who exactly is trying to "minimize the effort required for the IT staff"
> to deploy a MITM?

BlueCoat did.


> I can't believe that on a list titled "the right key" the majority of
> the debate seems to be around whether we want a spec that enables
> transparent MITMing or a spec that enables user-visible MITMing.  Which
> part of "the right key" does any sort of MITM fit into?

One of the requirements that drives this work is that people did this
in the past and did it in a very bad way. So we need to either tell
them not to do it again or work out a safe way for them to do it.


> The main argument seems to be "people need to do this for legal reasons"
> -- well, ok, let's have someone with a legal requirement for
> eavesdropping/monitoring step forward and propose an external,
> session-key-sharing mechanism that is *separate* from TLS.  Then IT
> staff can deploy such a system on the clients they're required to monitor.

And how does that work?

Saying that 'it should be separate' does not absolve you from
proposing how it would work. If you are putting a proposal on the
table then it needs to be either 'don't do it at all' or 'this is how
to do it', I can't see how 'let someone else do it' helps us.




-- 
Website: http://hallambaker.com/