Re: [Uta] Proposed definition of opportunistic encryption using TLS: draft-hoffman-uta-opportunistic-tls-00.txt
Leif Johansson <leifj@mnt.se> Mon, 03 February 2014 17:35 UTC
Return-Path: <leifj@mnt.se>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B4571A01CF for <uta@ietfa.amsl.com>; Mon, 3 Feb 2014 09:35:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.829
X-Spam-Level:
X-Spam-Status: No, score=-1.829 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_SORBS_WEB=0.77] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7FHsgvki2YR4 for <uta@ietfa.amsl.com>; Mon, 3 Feb 2014 09:34:58 -0800 (PST)
Received: from mail-lb0-f179.google.com (mail-lb0-f179.google.com [209.85.217.179]) by ietfa.amsl.com (Postfix) with ESMTP id 7B2231A016D for <uta@ietf.org>; Mon, 3 Feb 2014 09:34:58 -0800 (PST)
Received: by mail-lb0-f179.google.com with SMTP id l4so5676607lbv.10 for <uta@ietf.org>; Mon, 03 Feb 2014 09:34:57 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:message-id:date:from:user-agent:mime-version:to :subject:references:in-reply-to:content-type; bh=MQWWcjly4Q7Yrbzbm+yxUF86wjxuTym34/niTAI6zXM=; b=XUAA2hZc7Mxo2lrYDybHsqas7GMdwlw/FXKLT5Q3H3cJYhgSRjUubew+bHmxkv45va nulJtj3h7mwlvc/uhBL+7LCnYzc0HJ3QBRH36U0K9CbsAN2cBBam6zNNBPV1z9DZkkVz VqwxMUME8YsrHimhTEVrVqSso2XRKDBHgD8kTgMUmT67tC0NLWc3PUAIgXZA3TeRoe0o EawG9NK/GtwUFIVh3OHok/+ALRJk1RhS7ilXcQC0mNKGGtsYw0bWxgDHEltPzDtvNarm 8ps3PceEHY+od6bGBfQPCEzGEfGVSizYOTwDD07r0Rg1+mjzGvMV7HCy6voZ7yuWHPuG wZ2g==
X-Gm-Message-State: ALoCoQkMbVroUKsTQzfEkX42iV7OrLifTmuGTGH0ZIxELPELNYAHLaTfRMV+f2WLlNgpAU/pRmL0
X-Received: by 10.152.209.7 with SMTP id mi7mr2129919lac.42.1391448897724; Mon, 03 Feb 2014 09:34:57 -0800 (PST)
Received: from [10.33.1.140] ([212.247.15.226]) by mx.google.com with ESMTPSA id dm8sm30937384lad.7.2014.02.03.09.34.57 for <uta@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 03 Feb 2014 09:34:57 -0800 (PST)
Message-ID: <52EFD340.2040001@mnt.se>
Date: Mon, 03 Feb 2014 18:34:56 +0100
From: Leif Johansson <leifj@mnt.se>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: uta@ietf.org
References: <20140203045910.9714.53880.idtracker@ietfa.amsl.com> <B8691415-07F3-4081-8247-E103A60E5CF0@vpnc.org> <700ECF7E-253E-4CCC-BD73-6008216E5429@edvina.net> <CAKhHsXFmbc_CxPHSfzji-J7mJTUh4MOfwVFjnOdk-B+bA9miqA@mail.gmail.com> <D9374419-5EFE-455D-B348-F2698001BDF6@vpnc.org> <CAKhHsXHvme7-26MFHwsdvR-osqhy4L1dk6gZve9YR5jPduNi1A@mail.gmail.com>
In-Reply-To: <CAKhHsXHvme7-26MFHwsdvR-osqhy4L1dk6gZve9YR5jPduNi1A@mail.gmail.com>
X-Enigmail-Version: 1.6
Content-Type: multipart/alternative; boundary="------------060404020705080805010403"
Subject: Re: [Uta] Proposed definition of opportunistic encryption using TLS: draft-hoffman-uta-opportunistic-tls-00.txt
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Feb 2014 17:35:01 -0000
On 2014-02-03 18:13, Alan Johnston wrote: > Paul, > > Thanks for your reply - see a comment below. > > - Alan - > > > On Mon, Feb 3, 2014 at 10:30 AM, Paul Hoffman <paul.hoffman@vpnc.org > <mailto:paul.hoffman@vpnc.org>> wrote: > > On Feb 3, 2014, at 7:28 AM, Alan Johnston > <alan.b.johnston@gmail.com <mailto:alan.b.johnston@gmail.com>> wrote: > > > I'm less certain if the presence of a "transport=tls" parameter > in the SIP message violates Paul's rule about not indicating that > TLS has been used. > > It does not violate the rule unless it is something that the user > configures. If it is something set by the application developer > (in this case, to follow the requirements of the protocol), but is > not user-configurable, it's fine. > > > I'd need more explanation to understand this rule anyway, along > with the rule that no user configuration be allowed. It is not > clear to me how either of these does the harm that is described in > the Security Considerations section. > > Consider the HTTP / browser case. You have set up a TLS-accessible > web site because security is good for the Internet, but you hate > paying for and configuring a certificate for obvious reasons. If > all common browsers let user say "always do TLS even for http: > URLs, and ignore any server failure", you would configure your web > server to do TLS with no certificate because that's good enough. > That's a security reduction for the Internet. > > > But it's the "ignore any server failure" part that is the security > reduction, and that is not OE by your definition but "unathenticated > TLS" that you describe in the Appendix, right? > > Here's a real example: The EFF's HTTP Everywhere browser extension > (https://www.eff.org/https-everywhere). It finds HTTPS connections > even when I just try to visit the HTTP site. Does the browser > displaying the padlock hurt anything? How does this reduce security > for the Internet? Thats different though - in that case you have a "valid" TLS server cert, you just didn't know to ask for it. The OE case is (imo) when the all the server has is a (possibly) un-authenticated key. Displaying the padlock in that case is ... questionable. > > > > > For VoIP and video calling in general, there is also the issue > of encryption of the media - to use SRTP or use unencrypted RTP. > For ZRTP, we developed an approach that could be considered > opportunistic in this definition, although we described it "best > effort encryption" (RFC 6189). But that is a discussion for > another thread! > > Please, please note: "this definition" is only about TLS. I even > called that out in the draft. > > --Paul Hoffman > > > > > _______________________________________________ > Uta mailing list > Uta@ietf.org > https://www.ietf.org/mailman/listinfo/uta
- [Uta] Proposed definition of opportunistic encryp… Paul Hoffman
- Re: [Uta] Proposed definition of opportunistic en… Olle E. Johansson
- Re: [Uta] Proposed definition of opportunistic en… Stephen Farrell
- Re: [Uta] Proposed definition of opportunistic en… Alan Johnston
- Re: [Uta] Proposed definition of opportunistic en… Paul Hoffman
- Re: [Uta] Proposed definition of opportunistic en… Paul Hoffman
- Re: [Uta] Proposed definition of opportunistic en… Alan Johnston
- Re: [Uta] Proposed definition of opportunistic en… Daniel Kahn Gillmor
- Re: [Uta] Proposed definition of opportunistic en… Leif Johansson
- Re: [Uta] Proposed definition of opportunistic en… Daniel Kahn Gillmor
- Re: [Uta] Proposed definition of opportunistic en… Alan Johnston
- Re: [Uta] Proposed definition of opportunistic en… Daniel Kahn Gillmor
- Re: [Uta] Proposed definition of opportunistic en… Paul Hoffman
- Re: [Uta] Proposed definition of opportunistic en… Paul Hoffman
- Re: [Uta] Proposed definition of opportunistic en… Paul Hoffman
- Re: [Uta] Proposed definition of opportunistic en… Daniel Kahn Gillmor
- Re: [Uta] Proposed definition of opportunistic en… Paul Hoffman
- Re: [Uta] Proposed definition of opportunistic en… Stephen Farrell
- Re: [Uta] Proposed definition of opportunistic en… Alan Johnston
- Re: [Uta] Proposed definition of opportunistic en… Paul Hoffman