[TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks
David Adrian <davadria@umich.edu> Sat, 20 July 2024 02:13 UTC
Return-Path: <davadria@umich.edu>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2084CC180B4F for <tls@ietfa.amsl.com>; Fri, 19 Jul 2024 19:13:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.394
X-Spam-Level:
X-Spam-Status: No, score=-4.394 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=umich.edu
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Syr_IrktXMl4 for <tls@ietfa.amsl.com>; Fri, 19 Jul 2024 19:13:04 -0700 (PDT)
Received: from fearless-modron.relay-egress.a.mail.umich.edu (relay-egress-host.us-east-2.a.mail.umich.edu [18.219.209.13]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E484EC16941A for <tls@ietf.org>; Fri, 19 Jul 2024 19:13:03 -0700 (PDT)
Received: from earthy-brounie.authn-relay.a.mail.umich.edu (ip-10-0-72-53.us-east-2.compute.internal [10.0.72.53]) by fearless-modron.relay-egress.a.mail.umich.edu with ESMTPS id 669B1D2E.16063944.2C19B169.3795224; Fri, 19 Jul 2024 22:13:02 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umich.edu; s=relay-0; t=1721441582; bh=N25FHbtl2urcBVyPquksFXuxOfupcX6ub2wU5+BFf0w=; h=References:In-Reply-To:From:Date:Subject:To:Cc; b=RwtiylJsNAx6cS9jz/itdrKz0hY+eWQYiOUWixqwZNiypQx0O6m7YhJrHxWPNhbmn Q8d2bKIBcr90zl493t/eIhPrGxrd6DrljUl7/1jFTURrBFNqDVn0GdjThkUwaG6s2u E/30UJkaBDAhN0rb9U++OhIgK/f8UaAFHmV5EhvZ1PQb7nzNcBK9ZpOh6DDEVUMz87 +5S5xY1FrB3s4a8czJ/EErt7z6rbkxjxo+NbNTDAmbMlxuLzX65Uw8PrDf7zaQY4jZ jH4pwWi+lIrNgVhmsuPMLgubpczeGsGPKiHmh5wmpd/ekIWoFfiFOUAy5v72fsryZy w1xusoasewYZw==
Authentication-Results: earthy-brounie.authn-relay.a.mail.umich.edu; iprev=pass policy.iprev=209.85.217.50 (mail-vs1-f50.google.com); auth=pass smtp.auth=davadria
Received: from mail-vs1-f50.google.com (mail-vs1-f50.google.com [209.85.217.50]) by earthy-brounie.authn-relay.a.mail.umich.edu with ESMTPSA id 669B1D2D.349EE0C9.5F4406DC.3825800; Fri, 19 Jul 2024 22:13:01 -0400
Received: by mail-vs1-f50.google.com with SMTP id ada2fe7eead31-4928d2f45e2so17726137.0 for <tls@ietf.org>; Fri, 19 Jul 2024 19:13:01 -0700 (PDT)
X-Forwarded-Encrypted: i=1; AJvYcCUxscz//gzJ25OihOAcEGvHXZ3GqTu7ByYHngNCsl/sauQZSdDTfRk1OHvkyPiahfGdUNAmlD7oJA6MOZk=
X-Gm-Message-State: AOJu0YzpK6MA74mP+3WMUH2SVteoKqXQSAS6fewSZoLmWYdQxTprdpKm szbkNELX/MV2Ew/EfMkNmoUhgXVyd/MpuYREWvQb6FQoIoMs4fTipyVToxnvuvV2DYY6KQ7AJZk i8FRUc5fH4alXatRGoZxjyuwn9dM=
X-Google-Smtp-Source: AGHT+IF6lYPl3sP4a+UwW/oTWD4TDibLNkXBiD1saEG1m4mKIXxdIe/5v2ypeCf6jSsOyJ+YxoXW7Gy/zSMx18To3vA=
X-Received: by 2002:a05:6102:3308:b0:48f:461c:ab86 with SMTP id ada2fe7eead31-4928b955997mr318687137.12.1721441580872; Fri, 19 Jul 2024 19:13:00 -0700 (PDT)
MIME-Version: 1.0
References: <CAD2nvsT4qWqudiv1C1wZn6rB4_s-9EDENq5TXEbxr_ygcMFjDQ@mail.gmail.com> <CAChr6Sw+gxK3dO29F9bsLTQReJz6LzT2hZb5O7LAXmKzQbKTSw@mail.gmail.com>
In-Reply-To: <CAChr6Sw+gxK3dO29F9bsLTQReJz6LzT2hZb5O7LAXmKzQbKTSw@mail.gmail.com>
From: David Adrian <davadria@umich.edu>
Date: Fri, 19 Jul 2024 22:12:49 -0400
X-Gmail-Original-Message-ID: <CACf5n7_29CNXLf+SmpKKOWkc_3Oi2BZqZ8irU+z=3btJns_1-Q@mail.gmail.com>
Message-ID: <CACf5n7_29CNXLf+SmpKKOWkc_3Oi2BZqZ8irU+z=3btJns_1-Q@mail.gmail.com>
To: Rob Sayre <sayrer@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000ee0338061da4590c"
Message-ID-Hash: YPIDMVGA6BZWUSX4QOKNQ5PX5MRN7SXV
X-Message-ID-Hash: YPIDMVGA6BZWUSX4QOKNQ5PX5MRN7SXV
X-MailFrom: davadria@umich.edu
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Devon O'Brien <asymmetric=40google.com@dmarc.ietf.org>, Bob Beck <bbe@google.com>, tls@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/5dCS3YJ4vo4hRJnfrgVGKfyHUL0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
> Isn’t the most obvious issue that more than one party have the private keys? This is inaccurate. Trust Expressions does not define or propose any form of key escrow, nor are there any changes to which parties control the private keys of a connection. I encourage you (and others!) to read the drafts, or at minimum, read the supporting documentation. https://github.com/davidben/tls-trust-expressions On Fri, Jul 19, 2024 at 10:06 PM Rob Sayre <sayrer@gmail.com> wrote: > Isn’t the most obvious issue that more than one party have the private > keys? > > thanks, > Rob > > On Fri, Jul 19, 2024 at 18:29 Devon O'Brien <asymmetric= > 40google.com@dmarc.ietf.org> wrote: > >> Hi all, We’ve added a document that attempts to summarize, and offer an >> initial analysis of, several of the scenarios that have been raised in >> on-list discussions related to the possibilities that Trust Expressions (or >> more broadly, Trust Anchor Negotiation) could be used to enable >> surveillance, or to make surveillance easier to achieve than with existing >> solutions. >> >> We’ve been adding to this document for some time, and while there is >> overlap with the documents that Dennis has recently shared, it is not a >> response to them, as it was nearly complete by the time they were posted. >> Our goal is for this analysis to be complete and accurate, so we will >> incorporate additional scenarios, arguments, and analysis over time based >> on the ensuing discussion. >> >> >> https://github.com/davidben/tls-trust-expressions/blob/main/surveillance-and-trust-anchor-negotiation.md >> >> As with any of the other documents in the repository, we encourage you to >> ask on list, or file a github issue if you feel we have missed something or >> that our analysis is incorrect >> >> We look forward to the WGs comments and hope to see those coming to >> Vancouver next week. >> >> - Devon, Bob, David >> _______________________________________________ >> TLS mailing list -- tls@ietf.org >> To unsubscribe send an email to tls-leave@ietf.org >> > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-leave@ietf.org >
- [TLS]Trust Anchor Negotiation Surveillance Concer… Devon O'Brien
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Nick Harper
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Adrian
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Nick Harper
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Watson Ladd
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Devon O'Brien
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Watson Ladd
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin