Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, -> logging

Joe Touch <touch@strayalpha.com> Mon, 14 October 2019 00:17 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBC2C12002E for <tsvwg@ietfa.amsl.com>; Sun, 13 Oct 2019 17:17:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.218
X-Spam-Level:
X-Spam-Status: No, score=-1.218 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YLu7pNjFCnhK for <tsvwg@ietfa.amsl.com>; Sun, 13 Oct 2019 17:17:46 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4959612001A for <tsvwg@ietf.org>; Sun, 13 Oct 2019 17:17:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=2lE4rl6qTmuoBt8pu2Tljs5P9/KgtTEj+uLEYsdbzbM=; b=NiF7xhrxka1C/IRTtfQStYVWx Gv8zsjMGAht9tXd6C7gDMGXzP3a9aXrSUap9dkRpnaZzB/X25Yrb+0lQEBKAk2sK/rUosr+Zmkeog pLZkHLtfM52jFj/ZBnByUJ7hC1Sn01iULDmQSUx8Kq8YKpraqhz/y4qa31oJqc+XmntxWKXTrogEb rID1bl5p+EiZwZQW9r+WVqaZnemopjSC1aqxdUao0AoaeGzC17eWJVR50fp1clyW2Ccw1R1MllMUr 4d3nPNnFw8BwKQCnESQorwRrC2jE+NbBXQ8HP/S/MgQOcErUJfhQVkE12Tv0PuL7BAqsc8iDj1NGj uF+SbNKgw==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:59173 helo=[192.168.1.10]) by server217.web-hosting.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1iJo3Q-0045ig-6X; Sun, 13 Oct 2019 20:17:44 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_20C9F6F6-C7F5-48C8-9D7E-EF97D3F67E40"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Joe Touch <touch@strayalpha.com>
In-Reply-To: <6EC6417807D9754DA64F3087E2E2E03E2D49CCEC@rznt8114.rznt.rzdir.fht-esslingen.de>
Date: Sun, 13 Oct 2019 17:17:39 -0700
Cc: Lars Eggert <lars@eggert.org>, Gorry Fairhust <gorry@erg.abdn.ac.uk>, Christian Huitema <huitema@huitema.net>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Message-Id: <8BA63348-F825-4862-9960-27748719D030@strayalpha.com>
References: <6EC6417807D9754DA64F3087E2E2E03E2D49CCEC@rznt8114.rznt.rzdir.fht-esslingen.de>
To: "Scharf, Michael" <Michael.Scharf@hs-esslingen.de>
X-Mailer: Apple Mail (2.3445.9.1)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/umz6pVlvrs0cYNKnq73V0EVLryQ>
Subject: Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, -> logging
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Oct 2019 00:17:48 -0000

Michael,

If that’s an issue, have them turn it off in their first tests.

No, students do not have a “right” to paw through Internet logs taken at access points - even to examine transport headers only. That’s still user data, still subject to IRB review, and still of a private enough nature that they shouldn’t be doing that without specific training on data privacy under controlled conditions.

Joe

> On Oct 13, 2019, at 1:49 PM, Scharf, Michael <Michael.Scharf@hs-esslingen.de> wrote:
> 
> Yep, but that assumes that an undergraduate student already understands the notion of a „key“ when learning Internet Transport for the first time. That is not necessarily compatible with the table of content of many current networking textbooks.
>  
> And, yes, also such „running code“ (in various text formats) can be modified, e.g., to introduce crypto much earlier. That may be as trivial as changing any other widely deployed „running code“...
>  
> Michael
>  
>  
>  
> Von: Lars Eggert <mailto:lars@eggert.org>
> Gesendet: Sonntag, 13. Oktober 2019 22:06
> An: Scharf, Michael <mailto:Michael.Scharf@hs-esslingen.de>
> Cc: Gorry Fairhust <mailto:gorry@erg.abdn.ac.uk>; Christian Huitema <mailto:huitema@huitema.net>; tsvwg@ietf.org <mailto:tsvwg@ietf.org>
> Betreff: Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, -> logging
>  
> Hi,
>  
> On 2019-10-13, at 7:58, Scharf, Michael <Michael.Scharf@hs-esslingen.de <mailto:Michael.Scharf@hs-esslingen.de>> wrote:
> > I guess many generations of young engineers and future software developers have learnt TCP/IP by looking at the IP and TCP headers in PCAP files.
>  
> my guess is that most students would be in control of one of the endpoints (sending or receiving the traffic of interest), in which case they can still dissect the protocol. Wireshark can decode QUIC traffic just fine if you provide it with the keys.
>  
> Lars