Re: [Uta] Proposed definition of opportunistic encryption using TLS: draft-hoffman-uta-opportunistic-tls-00.txt

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Mon, 03 February 2014 17:29 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0584B1A01B0 for <uta@ietfa.amsl.com>; Mon, 3 Feb 2014 09:29:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kEuwQ2zbEVJV for <uta@ietfa.amsl.com>; Mon, 3 Feb 2014 09:29:13 -0800 (PST)
Received: from che.mayfirst.org (che.mayfirst.org [209.234.253.108]) by ietfa.amsl.com (Postfix) with ESMTP id B7F421A017E for <uta@ietf.org>; Mon, 3 Feb 2014 09:29:13 -0800 (PST)
Received: from [192.168.23.229] (dsl254-070-154.nyc1.dsl.speakeasy.net [216.254.70.154]) by che.mayfirst.org (Postfix) with ESMTPSA id D86AFF984 for <uta@ietf.org>; Mon, 3 Feb 2014 12:29:11 -0500 (EST)
Message-ID: <52EFD1E4.6020200@fifthhorseman.net>
Date: Mon, 03 Feb 2014 12:29:08 -0500
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Icedove/24.2.0
MIME-Version: 1.0
To: uta@ietf.org
References: <20140203045910.9714.53880.idtracker@ietfa.amsl.com> <B8691415-07F3-4081-8247-E103A60E5CF0@vpnc.org> <700ECF7E-253E-4CCC-BD73-6008216E5429@edvina.net> <CAKhHsXFmbc_CxPHSfzji-J7mJTUh4MOfwVFjnOdk-B+bA9miqA@mail.gmail.com> <D9374419-5EFE-455D-B348-F2698001BDF6@vpnc.org> <CAKhHsXHvme7-26MFHwsdvR-osqhy4L1dk6gZve9YR5jPduNi1A@mail.gmail.com>
In-Reply-To: <CAKhHsXHvme7-26MFHwsdvR-osqhy4L1dk6gZve9YR5jPduNi1A@mail.gmail.com>
X-Enigmail-Version: 1.6
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="6QoKJdG2PqcTQRbkboPFAX1NPVqp9OVFm"
Subject: Re: [Uta] Proposed definition of opportunistic encryption using TLS: draft-hoffman-uta-opportunistic-tls-00.txt
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Feb 2014 17:29:16 -0000

On 02/03/2014 12:13 PM, Alan Johnston wrote:
> But it's the "ignore any server failure" part that is the security
> reduction, and that is not OE by your definition but "unathenticated TLS"
> that you describe in the Appendix, right?
> 
> Here's a real example:  The EFF's HTTP Everywhere browser extension (
> https://www.eff.org/https-everywhere).  It finds HTTPS connections even
> when I just try to visit the HTTP site.  Does the browser displaying the
> padlock hurt anything?  How does this reduce security for the Internet?

https-everywhere (HTTPS-E) deliberately only includes rules for sites
which are believed to have a non-expired, valid X.509 certificate that
was issued by a member of the CA cartel, using standard https://, and
for which the content served over http is expected to match the content
served over https.  HTTPS-E also *enforces* HTTPS access, so if the web
servers for the sites flagged by HTTPS-E were to stop listening on port
443 or to stop negotiating TLS in the first place, (or an MiTM were to
make it look this way), the browser's connections to those sites would
break.

In these contexts, where the user is not vulnerable to an MiTM,
displaying a lock is reasonable, and is *not* what Paul is warning
against, if i understand the draft correctly.

Opportunistic encryption as declared by the draft is encryption that
*will* fail against an active attacker or MiTM.  It would be bad for the
'net if our tools were to indicate that MiTM-able connections are
"secure" using the same UI as non-MiTM-able connections.

	--dkg