Tony, While you may have concerns or otherwise disagree with the contents of this draft, let’s please keep discussion on this list, on all issues, polite and professional.
spt (as co-chair) > On Jul 23, 2019, at 16:05, Tony Arcieri <basc...@gmail.com> wrote: > > On Sun, Jul 21, 2019 at 6:51 AM Nancy Cam-Winget (ncamwing) > <ncamw...@cisco..com> wrote: > Hi, > > Thanks to all the feedback provided, we have updated the > https://tools.ietf.org/html/draft-camwinget-tls-use-cases-04 > > draft. At this point, we believe the draft is stable and would like to > request its publication as an informational draft. > > > I read this draft as the latest attempt in a disinformation campaign by > manufacturers and users of middleboxes that passively decrypt TLS connections > to politicize and reframe the argument around what is, at its core, a > fundamentally insecure practice which is incompatible with technically sound > and highly desirable protocol improvements to TLS. > > I implore you stop using overly broad terminology, euphemisms, weasel words, > and other deceptive language to argue your points. > > This draft is titled "TLS 1.3 Impact on Network-Based Security", but the > subtext is quite clearly the much narrower subfield of middlebox TLS > decryption. By using such a grandiose title which is deceptively hiding the > true subject matter, you are implying that middleboxes are the sum total of > network security. > > The draft begins "Enterprises [...] need to defend their information systems > from attacks originating from both inside and outside their networks." I am > co-owner of a company which heavily leverages firewalls for layer 3/4 network > security in conjunction with TLS. We care deeply about network security, and > believe that our network is *more secure* specifically because we *don't* > perform middlebox interception of TLS. > > I consider our company to be in the category of enterprise TLS users, and as > an enterprise TLS user who cares deeply about network security, I do not > identify whatsoever with the claims this draft is making about the needs of > enterprise TLS users as a whole. In as much as what it describes to "network > security", it is but one niche consideration within a vastly broader field, > and one which is increasingly controversial. > > I will point out, since you appear to work at Cisco, that your company works > on approaches to network security (e.g. malware detection) which avoid > decrypting TLS: > > https://blogs.cisco.com/security/detecting-encrypted-malware-traffic-without-decryption > > There is an entire world of network IDS systems beyond middleboxes which > passively decrypt TLS. > > It is factually inaccurate for this draft to be described as "TLS 1.3 Impact > on Network-Based Security". If you are going to write a draft about the > impact of TLS 1.3 on middleboxes for passive TLS decryption, please call a > spade a spade and don't try to hide your true intentions under a bunch of > weasel words and overly broad claims that make it sound like > middlebox-related TLS decryption problems are the end of network security as > we know it. > > My 2c, on behalf of non-middlebox-using enterprise TLS users who feel that > attempts by middlebox-using enterprise TLS users to weaken TLS in order to > retain compatibility with their traffic decryption appliances is a threat to > the security of our enterprise TLS deployments. > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls