On 7/17/2017, 11:04, "Roland Dobbins" <rdobb...@arbor.net> wrote:
    The actual concern of intranet operators is the inadvertent breakage of 
    an important mechanism used for troubleshooting and security in the 
    context of TLS-encrypted traffic on their own networks, within their own 
    span of administrative control.

Something similar was brought up several decades ago, when some agencies 
expressed concerns that wide-spread availability of encryption would make 
national security and law enforcement jobs impossible. Thankfully, those fears 
proved unfounded then. They are likely to prove so now.

    > Considering that unless at least one of the end-points chooses to 
    > comply with the “rules” it will not work – the claim that this 
    > measure is to help the good guys does not sound very candid.
    
    To clarify, this technique is for use on intranets, within a single span 
    of administrative control.

“Intranet” is an administrative term, and has no technical meaning. As such, it 
has no bearing on the protocols.

Not to mention the obvious lack of enforcement mechanisms – how are you going 
to enforce on the protocol level that “this technique” never crosses the 
administrative domain?
    
    > Who is the intended target of this mechanism? What kind of criminals 
    > is it supposed to catch/detect? Surely not the malware that penetrated 
    > your infrastructure and tries to “call home”?
    
    Actually, it's been used for this very purpose, quite successfully, for 
    many years.  It's also used to detect and classify lateral movement and 
    propagation of malware and attacks within an intranet.

You can’t seriously expect this method of surveillance to stay available 
forever, as the criminals get smarter and their tool chest gets enriched by 
exploits from higher-level organizations? 

In any case, there are better mechanisms and tools to address this risk.    

    And it's used to detect and prevent malware downloads by intranet user 
    populations.

There are better tools for that.
    
    > The proponents of the “broken TLS” somehow expect that  those 
    > criminals would use weakened crypto for the convenience of the ntwork 
    > police. How much sense does this make?
    
    In most cases, the attackers don't use any additional crypto at all.  
    When they do, it's most often poor crypto.

You must be lucky then. Criminals that we’re concerned with, aren’t that dumb.
    
    > Experience shows that criminals use not just cutting edge – bleeding 
    > edge crypto.
    
    You're absolutely correct that a few do - as you note, Conficker is a 
    good example of that.

My point is that we should look at the trend – not just the status quo. And the 
trend shows the attackers become smarter.
    
    > Plus, there are many ways to foil this proposed mechanism – for 
    > example, super-encrypting the data before transmission.
    
    Sure.  But the ability to infer the presence of superencryption is 
    extremely valuable in and of itself.

If the adversary allows you to infer it. It’s next to impossible with the 
large-scale traffic, when the adversary is crafty enough.
    
    > Then there’s an issue of the abuses. First, not all of the 
    > “legitimate” authorities are “good guys” (all the time :). 
    > Second, I’m not aware of any “network security” tool that 
    > hasn’t been subverted at some point in time.
    
    Again, to clarify, this mechanism for use on intranets within a single 
    span of administrative control.  Like you, I would work to dissuade 
    anyone from using it across the public Internet.

Again, technically there is no such thing as “intranet”. It’s an 
*administrative* domain, and there is no distinction protocol-wise.

The only “dissuade” I’d consider is when it’s enforced on the protocol level 
(on the wire), and there are unambiguous ways to detect it (and explicitly opt 
in, or opt out).
    
    > The likely result of the “static-dh-…” proposal is improved mass 
    > surveillance by authorities, and exploits of this mechanism by the 
    > organized crime.
    
    Let's remember that this technique is in use on intranets around the 
    world, and that's the focus, here.

Let’s not forget that from the protocols point of view there is no “intranet”. 
There’s only “Internet” – a network of interconnected networks. Administrators 
can draw boundaries around hosts and routers they think they control – but it 
has no impact on the protocols themselves. 
    
    > Either you have PFS and the bad guys will benefit from it too (so you 
    > need to detect and fight them using other methods), or only the bad 
    > guys have PFS and you might [0] detect them because their 
    > “protection quality” stands out amidst the ocean of the 
    > automatically-inspected & censored traffic.
    
    The ability to infer superencryption is quite important, per the above.

First, this ability depends on your adversary letting you have it – it is not 
given. Second, I find it concerning that you seem to be OK with the second 
option of the choice I outlined.
    
    > Because there are well-known ways of hiding the presence of 
    > encryption, at the cost of increase of the ciphertext size.
    
    We should also keep in mind that are also ways to counter-detect these 
    obfuscation techniques, too.
    
For an individual connection – very likely so. For all the connections your 
subjects have within the company, and/or with the outside world? Not hardly. 

    > The hope that the encrypted traffic would stand out is unfounded.
    
    Actually, it does stand out, in many cases.

In fewer and fewer cases. As adversaries learn, they encode that learning into 
the tools that then become available to the lower-skills-level attackers. 
    
    > Considering how fast the attack sophistication is evolving, the 
    > likelihood that “they” would employ other countermeasures, but 
    > ignore this one is fairly low.
    
    This technique certainly isn't a universal panacea, as you rightly point 
    out.  

:-)

    But it's an extremely valuable and important technique that's been 
    in broad use for quite some time, so maintaining a mechanism for 
    intranet operators to analyze TLS-encrypted traffic within their own 
    spans of administrative control is important and worthwhile, IMHO.

We disagree here. 

Not to mention that a country might consider the entire traffic within its 
borders as “intranet”. Some already do (and some don’t even stop there). I’d 
rather that these operators mature and realize that as the time goes, some new 
capabilities arrive, and some old capabilities wither and die. 
    
    We don't want to inadvertently drive them into using proprietary, 
    non-auditable crypto.  That would be bad for everyone.

Publish that crypto, and it’s not proprietary any more. Subject it to an audit 
– and it’s now audited/auditable. 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to