Re: [Uta] Opportunistic encryption and authentication agility

Keith Moore <moore@network-heretics.com> Tue, 25 March 2014 20:24 UTC

Return-Path: <moore@network-heretics.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5CD831A022F for <uta@ietfa.amsl.com>; Tue, 25 Mar 2014 13:24:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JLEn4XZiC5wH for <uta@ietfa.amsl.com>; Tue, 25 Mar 2014 13:24:23 -0700 (PDT)
Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) by ietfa.amsl.com (Postfix) with ESMTP id 95BD21A020B for <uta@ietf.org>; Tue, 25 Mar 2014 13:24:23 -0700 (PDT)
Received: from compute2.internal (compute2.nyi.mail.srv.osa [10.202.2.42]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id F1FD920F24 for <uta@ietf.org>; Tue, 25 Mar 2014 16:24:21 -0400 (EDT)
Received: from frontend1 ([10.202.2.160]) by compute2.internal (MEProxy); Tue, 25 Mar 2014 16:24:21 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=message-id:date:from:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; s=smtpout; bh=/YVPcuLvCn0Vd+rHB2Ayha ji/IQ=; b=ZvSA0njrv8brVgeoQOcZtlNUCELg1EvKLopMOUiDpHG7Hsli5V0kYj s3OpGUGrURlS1PJX93caf2IEWqCeadbiaSK8B1wULcs8hS1KwP9eUVkJov2vPU81 m+fCBkFjW5XDPSDgVi0I42zdHpGW8u7VcmJ0CC4EJ7CkzpevvlcOQ=
X-Sasl-enc: +SvIvyElq58E+u1XRMD8zGeNjhbekg5iuezRt5gKZ/Wi 1395779061
Received: from [192.168.1.4] (unknown [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id E7648C00005; Tue, 25 Mar 2014 16:24:20 -0400 (EDT)
Message-ID: <5331E5F1.2060004@network-heretics.com>
Date: Tue, 25 Mar 2014 16:24:17 -0400
From: Keith Moore <moore@network-heretics.com>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: Trevor Perrin <trevp@trevp.net>, Daniel Kahn Gillmor <dkg@fifthhorseman.net>
References: <CAGZ8ZG0rBxiE2dGZXhpvhKiyJOu=6Bn8sQ2seJ9_KvgPjmaaRg@mail.gmail.com> <532CFAB0.4070301@network-heretics.com> <10492.1395613933@sandelman.ca> <533042FF.7060603@network-heretics.com> <53305B5D.8030708@fifthhorseman.net> <53305EFD.9030003@network-heretics.com> <53306294.4070205@fifthhorseman.net> <CAGZ8ZG2GYTYfrSDGxEMS3eRsg2g_LaWP_pyHt9vmz4NV2cGAEw@mail.gmail.com>
In-Reply-To: <CAGZ8ZG2GYTYfrSDGxEMS3eRsg2g_LaWP_pyHt9vmz4NV2cGAEw@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/uta/iOr2JQ835PGwqQSyOZL03SmDTFw
Cc: "uta@ietf.org" <uta@ietf.org>, Michael Richardson <mcr+ietf@sandelman.ca>
Subject: Re: [Uta] Opportunistic encryption and authentication agility
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Mar 2014 20:24:29 -0000

On 03/25/2014 04:09 PM, Trevor Perrin wrote:
> On Mon, Mar 24, 2014 at 9:51 AM, Daniel Kahn Gillmor
> <dkg@fifthhorseman.net> wrote:
>> On 03/24/2014 12:36 PM, Keith Moore wrote:
>>
>>> So, what's the incentive for either clients or servers to support OE if
>>> clients just silently accept it without any indication to the user?
>>> Just for the good of mankind?
>> I'd say "to increase the cost of pervasive monitoring" and "to resist
>> surveillance by passive attackers"
> I'd go further - OE for HTTP could have strong auth added to it in the
> future, such as pinning or DANE, which *could* be indicated to the
> user.
Why wait?   Even if pinning, DANE, or whatever (as appropriate for that 
particular protocol) weren't required immediately, we might as well 
specify it now.

Maybe we could even recommend a transition schedule - e.g. clients could 
ignore the lack of AE for X years after adoption, after which they'd 
start providing some sort of warning indication if recommended form of 
AE were not present.  After Y years, they'd refuse to connect without 
AE.   Obviously the details and the assumed transition dates would have 
to vary according to the deployment considerations for that particular 
protocol, and they should perhaps even be implementation-configurable, 
but we might as well start encouraging implementation and testing now.   
Site developers could set the transition dates to sooner in order to 
test features in advance of users' clients actually complaining.

The point is: if you're going to install stepping stones, don't stop 
after placing the first stone and assume that the others will be placed 
eventually.   We have a rare opportunity in which there is considerable 
public interest in improving communications privacy. We should not 
squander it by specifying only that which is easiest to do.

Also: it is unlikely that we'll improve privacy in practice without also 
raising user expectations.

Keith