Stephen,

Since you solicited feedback ...

We have had considerable, recent, experience with the need to avoid adding delay to a user's web experience (e.g., "Happy Eyeballs") in the v4/v6 transition context. Suggestions that we increase delay in favor of security are not likely to be well received by users or service providers.
I think there are a couple of principles that we need to adopt IETF-wide.

Part of the definition of "good Internet citizen" for a protocol or application 
is that not only does that protocol/application include anti-surveillance principles for 
itself, but that it helps OTHER protocols avoid surveillance. Surveillance-resistance is 
MORE IMPORTANT than optimizing transport efficiency.
given the quantity of meta-data (and personal data) collected by Google, Facebook, and many other commercial entities, and the willingness of users to supply such data, it's hard to believe that most users would agree with this statement.
1) Everything SHOULD be encrypted, unless there is an absolute operational requirement not to. This 
means "encryption by default" in new protocols, and not even specifying unencrypted 
operations modes unless necessary. Older protocol specs still in use should be revised to require 
encryption. Deprecate the non "s" versions of protocols.
One of the reasons many enterprises decline to employ e-t-e encryption within their nets is because it interferes with debugging and scanning of traffic for malware. While I am in favor of mandatory to implement encryption for our protocols, mandatory to use
is not a good idea in all cases.
2) Well-known ports should be avoided. Or overloaded to the point where the port number 
is no longer a significant indicator to the application. This gives rise to the 
"everything over 443" mentality, which we need to find a way to handle 
gracefully. Demuxing the service within the channel is a better idea than I used to think.
others have already noted that this is a bad idea from a protocol perspective. in an era when many folks try to minimize the number of round trips needed to provide a service to a user, this add to the total. again, while security folks might see this as attractive, I
doubt that many users and service providers wold agree.
3) Packet sizes should be variable, preferably random. This is the opposite of the 
"discover the MTU and fill every packet" model of efficiency. Or, we could make 
all packets the same fixed size by padding small ones. I like random better, but there 
might well be some hardware optimizations around fixed packet sizes.
we have long understood what it takes to provide TFS, and nobody has wanted to waste the bandwidth to do it properly. I doubt that this view has changed.
4) Every protocol spec needs to include a pseudonymous usage model, and most 
should include an anonymous usage model.
Use of pseudonyms is applicable to very few of our protocols, and most of the ones where it is applicable, it is already satisfied. Anonymous use, depending on the definition one
uses, may be easy or nearly impossible.
5) New protocols should be built around end-to-end crypto rather than relying 
on transport-level wrappers for everything. It's too easy to use a compromised 
CA-cert to dynamically build a TLS proxy cert. Some level of key delivery 
out-of-band, coupled to in-band footprint verification, is probably needed. 
zRTP is a good model.
see comments above re #1.
6) Randomizing interpacket timing is useful. This does all sorts of horrible 
things to both TCP optimization and the jitter buffers in real-time 
communications. But it's worth it. Remember, surveillance-resistance is MORE 
IMPORTANT than efficiency.
not, it's not worth it. see comment above re #3.
7) Peer-to-peer, DTN, and peer-relay (TURN, for example) all have lessons we 
should learn. So does TOR.
DTN is great for the interplanetary Internet. I prefer realtime performance for almost all of my Earth-bound Internet apps. I suspect other users fell the same way. P2P is fine
for some apps, but not all, maybe not even many.
8) Every piece of crypto-advice needs serious, multiparty, international, and 
aggressive review. No more documents authored by NSA shills (which Schneier 
says we seem to have).
I think we have generally good review for the algs we choose; we periodically review algs and key sizes and make revisions as deemed necessary. We have folks like David McGrew (Cisco) providing much of this expert review. I think we have operated in this mode for many years.

Steve
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to