Re: I-D Action: draft-balaji-mpls-lawful-intercept-thru-label-dis-00.txt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Randy Bush wrote:
> 
> Scott O Bradner wrote:
>>
>> 2804 does not say not to talk about such things - or that such
>> documents should not be published as RFCs  - 2804 says that the
>> IETF will not do standards work in this area
> 
> for those of us who are easily confused, could you differentiate between
> working on douments and publishing them as rfcs from doing standards
> work?

I can not answer this on Scott's behalf, but my interpretation of
this paragraph of 2804:

   - The IETF, an international standards body, believes itself to be
     the wrong forum for designing protocol or equipment features that
     address needs arising from the laws of individual countries,
     because these laws vary widely across the areas that IETF standards
     are deployed in.  Bodies whose scope of authority correspond to a
     single regime of jurisdiction are more appropriate for this task.

means that while publishing information as independent submission
as RFCs would be OK, and talking about the technology or its consequences
for IETF protocols and standardization work is OK
(that is primarily a matter of free speech).

Discussion within the IETF on wiretapping technology, with the purpose
of changing either the wiretapping technology prior to publishing
it as RFC, or with the purpose of changing IETF protocols to facilitate
wiretapping technology is _not_ OK, independent of whether the document
is published on standards track or informational / experimental.


But it is really difficult to stay out of that rathole.

There is a wiretapping technology in use that is completely subverting
the security of "TLS" (Transport Layer Security), in form of transparent
intercepting SSL/TLS proxies, that impersonate the real communication
peers by forging themselves certificates on the fly, and by coercing
TLS clients, such as Web-Browsers through organizational authority,
to blindly trust and silently accept the certs that are forged by the
intercepting SSL/TLS proxies.

Such technology kills other protocol features of TLS besides integrity
and confidentiality protection along with it, such as client certificate
support and channel bindings.


It is not easy to decide what kind of discussion about such gear and
possible TLS extensions to facilitate such gear are OK, and which are
in conflict with rfc2804.


With DANE (DNSSEC-protected DNS "TLSA" records) conveying additional
information for verification the correctness of a TLS Server's
presented certificate (chain), silently intercepting TLS-protected
traffic will become _much_ harder for those intercepting SSL/TLS proxies.


-Martin


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]