I just sent this message to the W3C pre-WG mailing list. I think the message is 
equally applicable here only any new group/groups should either identify a 
different part of the problem to address or they should coordinate with the W3C 
group so that the groups avoid going off to hunt the same bear. When that 
happens the most likely outcome is the groups end up shooting each other 
instead of the bear.


I was at the TIPPI workshop yesterday which showed a similar tendency to become 
defocused as people became confused about the question of what problem was 
being addressed in a presentation.
 
Presenter shows plugin designed to explore the user interface issues:
 
        "What about key loggers", "what about a man in the middle attack", "no 
the real problem is the authentication credentials", "the phishing criminals 
will just go into selling plots of land in the Florida", and so on.
 
There are many problems here, when we are talking about digest algorithms we 
have an established vocabulary of terms, SHA-1 is not broken, it is subject to 
a compression collision attack but is still secure against the second pre-image 
attack. So when we are talking about S/MIME we say, no the SHA-1attacks do not 
compromise the use in that protocol but they are a sign we should start the 
transition process. 
 
What we need is a simple taxonomy of four or five terms (5 = 7-2) that we can 
use to refer to the various attacks. We choose to address one or at most two of 
those terms in this group. Everything else is out of scope.
 
Examples:
 
Platform Layer Attacks: OUT OF SCOPE
        
        Keyboard loggers, mouse click and screen capture trojans are all 
serious security issues. 
 
        Building platforms resistant to those attacks are the sole 
responsibility of Brian, Butler, Linus and Steve (surnames redacted for their 
own protection). It makes no sense for a standards working group to attempt to 
solve those problems. Preventing the circulation of malware is going to be the 
responsibility of the ISPs hosting the bots. 
 
Network Layer Attacks: OUT OF SCOPE
 
        We have several people in the group who are cryptographers and/or 
network security protocol designers. There is a place to discuss that work, 
this is not it. There is no shortage of forums that are developing 
authentication &ct. protocols. 
 
Trust Infrastructure Attacks: OUT OF SCOPE
 
        If we are going to stop phishing we are going to need a means of making 
sure that the site representing itself as Contoso bank on the net reall is the 
same corporation as the place where you opened the account abd handed over the 
check. This infrastructure is necessary, complex and I am currently sitting in 
the CA-Browser forum where we are discussing that exact problem.
 
User Interaction Attacks: IN SCOPE
 
        How does the browser communicate the security context to the user?
 
Chrome Attacks: IN SCOPE
 
        How does the browser ensure that the trusted path used to communicate 
the security context is trustworthy?
        
The title of this group is not 'the lone group that is going to stop the 
problem of phishing all by itself'. 

We have retrod the well trodden paths plenty of times. We have to assume that 
the groups that are dedicated to addressing those problems are going to deliver 
controls that are effective at an acceptable level.
 
At the moment the groups working on those problems are all saying 'we can stop 
the keylogger problem but what is the point if the social engineering attack is 
still open'.
 

_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to