Re: [Uta] Proposed definition of opportunistic encryption using TLS: draft-hoffman-uta-opportunistic-tls-00.txt

Paul Hoffman <paul.hoffman@vpnc.org> Mon, 03 February 2014 16:30 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A54911A0117 for <uta@ietfa.amsl.com>; Mon, 3 Feb 2014 08:30:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.347
X-Spam-Level:
X-Spam-Status: No, score=-1.347 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_COM=0.553] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mHrdKSyKTWt0 for <uta@ietfa.amsl.com>; Mon, 3 Feb 2014 08:30:48 -0800 (PST)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id D64771A0032 for <uta@ietf.org>; Mon, 3 Feb 2014 08:30:47 -0800 (PST)
Received: from [10.20.30.90] (50-1-98-67.dsl.dynamic.sonic.net [50.1.98.67]) (authenticated bits=0) by hoffman.proper.com (8.14.7/8.14.7) with ESMTP id s13GAd3a000453 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 3 Feb 2014 09:10:41 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
X-Authentication-Warning: hoffman.proper.com: Host 50-1-98-67.dsl.dynamic.sonic.net [50.1.98.67] claimed to be [10.20.30.90]
Content-Type: text/plain; charset="iso-8859-1"
Mime-Version: 1.0 (Mac OS X Mail 7.1 \(1827\))
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <CAKhHsXFmbc_CxPHSfzji-J7mJTUh4MOfwVFjnOdk-B+bA9miqA@mail.gmail.com>
Date: Mon, 03 Feb 2014 08:30:38 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <D9374419-5EFE-455D-B348-F2698001BDF6@vpnc.org>
References: <20140203045910.9714.53880.idtracker@ietfa.amsl.com> <B8691415-07F3-4081-8247-E103A60E5CF0@vpnc.org> <700ECF7E-253E-4CCC-BD73-6008216E5429@edvina.net> <CAKhHsXFmbc_CxPHSfzji-J7mJTUh4MOfwVFjnOdk-B+bA9miqA@mail.gmail.com>
To: Alan Johnston <alan.b.johnston@gmail.com>
X-Mailer: Apple Mail (2.1827)
Cc: uta@ietf.org, "Olle E. Johansson" <oej@edvina.net>
Subject: Re: [Uta] Proposed definition of opportunistic encryption using TLS: draft-hoffman-uta-opportunistic-tls-00.txt
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Feb 2014 16:30:48 -0000

On Feb 3, 2014, at 7:28 AM, Alan Johnston <alan.b.johnston@gmail.com> wrote:

> I'm less certain if the presence of a "transport=tls" parameter in the SIP message violates Paul's rule about not indicating that TLS has been used.

It does not violate the rule unless it is something that the user configures. If it is something set by the application developer (in this case, to follow the requirements of the protocol), but is not user-configurable, it's fine.

>  I'd need more explanation to understand this rule anyway, along with the rule that no user configuration be allowed. It is not clear to me how either of these does the harm that is described in the Security Considerations section.

Consider the HTTP / browser case. You have set up a TLS-accessible web site because security is good for the Internet, but you hate paying for and configuring a certificate for obvious reasons. If all common browsers let user say "always do TLS even for http: URLs, and ignore any server failure", you would configure your web server to do TLS with no certificate because that's good enough. That's a security reduction for the Internet.

> For VoIP and video calling in general, there is also the issue of encryption of the media - to use SRTP or use unencrypted RTP. For ZRTP, we developed an approach that could be considered opportunistic in this definition, although we described it "best effort encryption" (RFC 6189).  But that is a discussion for another thread!

Please, please note: "this definition" is only about TLS. I even called that out in the draft.

--Paul Hoffman