It's not like that at all.

The original text makes a claim about security and privacy around TLS. This is not true in the real world, and is becoming less true with every MitM deployed.

Client authentication is very rarely used because of the significant challenges of managing client certificates. I don' t see that improving any time soon. None of my banks even issued me with a client cert or want me to use one.

We saw the increase in pressure to provide a MitM option, and it coincided with google and facebook moving to https only. Ignore that if you like, but that's the honest experience of a proxy vendor. I would much rather not have had to do this, but in the end we had to.

So many people seem to think (Google included) that the browser user should have all the power, and not be able to be stopped or scanned. In a corporate network, the company is ENTIRELY justified in securing and restricting the use of its network. That's what a proxy is for. That need isn't going to go away just because everyone moves to https. That need just becomes harder to meet, and you won't find people are thankful for being forced to do that extra work to secure and control their networks. Putting https where it's not needed (and it's not needed everywhere) just worsens the user experience, and provides false signals to users (since all attempts at making a system where the user could know they were being MitMed were rejected by the people who would evidently rather just ignore the problem and hope it goes away). This is all customer needs driven. Until those needs change, then vendors will try to meet those needs.

So your final comment is completely out of place.

Adrien


------ Original Message ------
From: "Stephane Bortzmeyer" <[email protected]>
To: "Adrien de Croy" <[email protected]>
Cc: "Shane Kerr" <[email protected]>; "[email protected]" <[email protected]>
Sent: 6/05/2016 8:59:45 p.m.
Subject: Re: Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt

On Wed, May 04, 2016 at 10:13:09PM +0000,
 Adrien de Croy <[email protected]> wrote
 a message of 316 lines which said:

 TLS was designed to provide data integrity and security, but not in
 the face of MitM attacks.

You're playing with words here. It all depends if you use TLS in the
strict sense (just the protocol) or the wider one (with
authentication; note that authentication is a official part of the
spec, in section 7 of RFC 5246, it is not delegated to some other
RFC).

 Google's push for https everywhere has in our experience provided
 significant incentive for MitM deployment.

It seems an argument straight from the attackers: "we are forced to
improve our attacks because the users - the bastards, how do they
dare? - improved their defenses".


_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to