Re: [Uta] Opportunistic encryption and authentication agility

Trevor Perrin <trevp@trevp.net> Tue, 25 March 2014 20:47 UTC

Return-Path: <trevp@trevp.net>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A890D1A0231 for <uta@ietfa.amsl.com>; Tue, 25 Mar 2014 13:47:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.678
X-Spam-Level:
X-Spam-Status: No, score=-1.678 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-0.7] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZLdKQKxpjtyH for <uta@ietfa.amsl.com>; Tue, 25 Mar 2014 13:47:28 -0700 (PDT)
Received: from mail-we0-f182.google.com (mail-we0-f182.google.com [74.125.82.182]) by ietfa.amsl.com (Postfix) with ESMTP id 67B7E1A0215 for <uta@ietf.org>; Tue, 25 Mar 2014 13:47:28 -0700 (PDT)
Received: by mail-we0-f182.google.com with SMTP id p61so713855wes.41 for <uta@ietf.org>; Tue, 25 Mar 2014 13:47:26 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=10A2msiRFmobuQFREa9N1+GAPrgUQ1cnweayVRPb13E=; b=Ax7sDaMShbQf95Rbw+rsrTZ1jS6jz6YTKyL7WCs9JiqOcFB0jFc7/pWQtGvIO9UJnC ZzUFF3J1qDQEWmnzJVi+pEHvg5/D9J5SagmB5olYO4Yh55K+ajJwnyP1ziK6iLPzW1NL SQhJi06o7rqKSkVKBjj2gtWpGqFreIa3AIzTNDCzkJI3xZAoxj7DmgV4/iTXKOJRFbMm oG1G602+y4+4jAnqU/pIORBiRZd1ASKVvvyq6ZBRkYv1D/pdaD4ngAoZ0IlMZ4i9EO7F dZ4HCVNCGqCo7rntiUSn6eV4Dv30mSvspsPU/CNKYi5vNJo/7hAnuk7m31TrJEFnUdfS yNKg==
X-Gm-Message-State: ALoCoQl3VQvABDkES2BCGEm0QEJMeWWM3ekjZbSMttNBhaTW48JSnBgM1d1uCeiBwXo3Zf+EVoEG
MIME-Version: 1.0
X-Received: by 10.180.187.237 with SMTP id fv13mr24538327wic.26.1395780446742; Tue, 25 Mar 2014 13:47:26 -0700 (PDT)
Received: by 10.216.45.146 with HTTP; Tue, 25 Mar 2014 13:47:26 -0700 (PDT)
X-Originating-IP: [184.23.29.222]
In-Reply-To: <CAA4WUYhffWpsxU1FrmQ1np1EObaC5EgMC-R7QDj8C0ODTRLPdQ@mail.gmail.com>
References: <CAGZ8ZG0rBxiE2dGZXhpvhKiyJOu=6Bn8sQ2seJ9_KvgPjmaaRg@mail.gmail.com> <532CFAB0.4070301@network-heretics.com> <10492.1395613933@sandelman.ca> <533042FF.7060603@network-heretics.com> <53305B5D.8030708@fifthhorseman.net> <53305EFD.9030003@network-heretics.com> <53306294.4070205@fifthhorseman.net> <CAGZ8ZG2GYTYfrSDGxEMS3eRsg2g_LaWP_pyHt9vmz4NV2cGAEw@mail.gmail.com> <CAA4WUYhffWpsxU1FrmQ1np1EObaC5EgMC-R7QDj8C0ODTRLPdQ@mail.gmail.com>
Date: Tue, 25 Mar 2014 13:47:26 -0700
Message-ID: <CAGZ8ZG0nyfNvpkL2e39Or0W8WVeDXjdcCzPQE-DNjaY2t+j-sw@mail.gmail.com>
From: Trevor Perrin <trevp@trevp.net>
To: "William Chan (陈智昌)" <willchan@chromium.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: http://mailarchive.ietf.org/arch/msg/uta/HzOHUAehbmJVhrNXuVWwif6Rn7o
Cc: "uta@ietf.org" <uta@ietf.org>
Subject: Re: [Uta] Opportunistic encryption and authentication agility
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Mar 2014 20:47:30 -0000

On Tue, Mar 25, 2014 at 1:24 PM, William Chan (陈智昌)
<willchan@chromium.org> wrote:
> On Tue, Mar 25, 2014 at 1:09 PM, Trevor Perrin <trevp@trevp.net> wrote:
>>
>> On Mon, Mar 24, 2014 at 9:51 AM, Daniel Kahn Gillmor
>> <dkg@fifthhorseman.net> wrote:
>> > On 03/24/2014 12:36 PM, Keith Moore wrote:
>> >
>> >> So, what's the incentive for either clients or servers to support OE if
>> >> clients just silently accept it without any indication to the user?
>> >> Just for the good of mankind?
>> >
>> > I'd say "to increase the cost of pervasive monitoring" and "to resist
>> > surveillance by passive attackers"
>>
>> I'd go further - OE for HTTP could have strong auth added to it in the
>> future, such as pinning or DANE, which *could* be indicated to the
>> user.
>
>
> Please be cautious about suggesting user indications. UI is complicated and
> all that. More specifically in the browser case, even if you could strongly
> authenticate a connection over which you request a http:// page, I wouldn't
> want to give that page the https lock treatment. Note that https:// has
> different semantics (referer semantics, mixed content, etc).

Good points, thanks.  Maybe adding other auth methods to HTTP-over-TLS
would be best done silently, with no UI unless a security failure
occurs?

I think I like that, as I think catching "badness" is more useful than
indicating "goodness".  But these are hard Qs, I'm just trying point
out some possibilities at this point.


Trevor