Moving the bar from MTI to mandatory-to-use (can we overload the acronym
MTU?) goes beyond just questions of policy, and into the questions of how
we build consensus and what the shapes the output of our engineering
process.

Just to take an example I've followed a bit, SIP is relatively successful
IETF protocol. It has some notable security issues. We could have designed
SIP in a way that reduced the ability of middlemen to work themselves into
the path of SIP messages, and thus reduced the potential for eavesdropping
on the sessions that SIP creates - and its usefulness as a tool of
surveillance.

Had we made some of those design decisions, however, it's unclear to me
that SIP would have been such a successful protocol. But we wouldn't have
made those decisions anyway, because the relevant documents would never
have garnered consensus in the working groups. Our consensus process
reflects the aggregate of the requirements of our participants, which come
from many sources: employers, or regulators, or academic interests, or
personal consciences.

If we had designed SIP to be a protocol that didn't meet those
requirements, of course it wouldn't see much deployment. Extensions to SIP
that have leaned in this direction have had little impact on the
protocol's use. That is the purpose of a consensus process, to reflect the
likely implementation and deployment community. Like it or not, the
participants in our consensus process want protocols like SIP to be
modifiable by intermediaries for numerous reasons - and once we open that
door, we have to understand it will be open for all comers.

We could change our process so that it overrides consensus on some of
these crucial points. I think it would be safe to say that we already do
so, in a limited way, as a results of various forms of cross-area review.
As popular protocol go through our process, we levy requirements that are
winked at by document authors and ignored by implementers. There are
however lines here we could cross that would result in nothing but the
severing of IETF work from the reality of deployment. That would not serve
our mission of making the Internet better.

We undoubtedly need to make changes to reflect our new understanding of
the threats facing the Internet. I think this needs to come from the
bottom up, though, not from the top down. I am heartened that our
consensus process has elevated core security mechanisms to
mandatory-to-use level for some recent work, like in RTCWeb. We need to
shed the brightest light we can on these issues, educate the community
about the new risks and the practical countermeasures, and then execute
our consensus process as we always have. In some cases, mandatory-to-use
will be the right choice. In others, it won't.

Jon Peterson
Neustar, Inc.

On 10/8/13 2:14 PM, "Stephen Farrell" <[email protected]> wrote:

>
>Hi,
>
>Steve's mail argues for the current IETF position that
>mandatory-to-implement (MTI) is the correct target IETF
>specifications.
>
>Some folks (me included to be honest) wonder if the current
>situation argues for raising the bar there somewhat on the
>basis that MTI security features are frequently turned off
>or not sufficiently well tested to be usable. (Pick your
>favourite example, mine are usually rfc4744 or Diameter
>being run in clear.) And an upshot from that is that that
>helps those who want to pervasively monitor everything.
>
>Others argue that that'd be the IETF straying into the
>space of policy - all we should do is define how to use
>strong security features and make sure the code is there so
>they can be turned on and the rest is policy.
>
>I'm sure there are loads more arguments, and I do think
>it'd be useful to see those discussed here.
>
>Thanks,
>Stephen.
>
>PS: Our -00 privacy BCP doesn't go beyond MTI for now, but
>were there consensus for that, I think it'd be good if we
>could go further.
>
>
>_______________________________________________
>perpass mailing list
>[email protected]
>https://www.ietf.org/mailman/listinfo/perpass

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to