Hi Phill,

On 10/19/2013 06:48 PM, Phillip Hallam-Baker wrote:
> On Sat, Oct 19, 2013 at 11:46 AM, Stephen Farrell <[email protected]
>> wrote:
> 
>>
>> Hiya,
>>
>> FWIW, I don't buy Phill's theory at all.
>>
> 
> We have a document that states there is a $250 million budget set for a
> program that includes infiltrating the standards process as a stated part
> of the program.

I'll come back on that in a separate mail.

> Now we can dispute the authenticity of the document but I see it as
> confirming my earlier strong suspicion.
> 
>> On the specific topics below, if I recall correctly, both
>> were uncontroversial parts of the "design" of PKI for years
>> before they became problematic for the web PKI when it
>> finally started to seriously consider revocation.
> 
> 
> They were uncontroversial until the DigiNotar and Flame incidents and until
> the EFF certificate observatory started a FUD attack making spurious claims
> . Until that point I was mainly concerned with the risk that one of my CAs
> might be breached. I did not see the need for Name constraints because I
> had other controls that I consider to be sufficient.
> 
> The OCSP feature was very controversial at the time the limitation was
> originally introduced. The reason I did not press the issue then was that I
> did not see it as critical and insisting on a strong status result could
> arguably be seen as interfering with the Valicert business model at the
> time.

Right, I tihnk we're agreeing that these features were introduced
years ago as part of the normal process. No conspiracy needed nor
credible.

>> And it
>> seems to me that both "sides" in that debate were inflexible
>> and unwilling to make changes. I still don't know why that
>> was, and it still seems dumb to me, but life's full of little
>> mysteries like that.
>>
> 
> My position is based on the actions taken by the deployed base. I can't
> change that and so I don't have much ability to change my position.
> 
> I can't see why the inability of the DoD to support an accurate status
> result should require the rest of us to adopt their lowest common
> denominator security.

That's re-litigating the argument though. You had your position,
others had theirs. All of 'em had merits. None of the relevant
parties seemed willing to change. 'twas just dumb IMO.

However, we now have the wpkops wg, which should provide a better
venue and process for handling any similar issues that arise in
future. If the web PKI folks do actively work on that, (and I'm
more hopeful on that than I was a month or two ago) then we
shouldn't hit that kind of problem again I'd hope.

>> And I am just not seeing how this is related to pervasive
>> monitoring except very very tangentially - Phill, can you
>> please explain its relevance?
>>
> 
> I believe that the vulnerability exploited in Flame would have been closed
> had the standards changes resisted by the DoD been adopted in a timely

Flame was relatively targetted and more of a host-based attack tool
rather than an attack on the n/w. But yes, its relevant to monitoring
though arguable as to whether its in scope here I think. (I do agree
its a relevant part of the background for sure though.)

> fashion and that the DigiNotar incident might have been detected earlier.

Again, that's fairly weak I think.

> The documentary evidence shows that interfering with the standards process
> to prevent deployment of countermeasures is part of the cost of running
> PRISM etc. That is a cost that I am not prepared to pay because these
> generals who I have to sit in rooms with and listen to their plans for
> cyber-attack are making use less safe by compromising our ability to
> achieve strong cyber-defense.
> 
> The question of how we can build open standards to defend against covert
> pervasive monitoring in the face of attempts to disrupt these efforts is a
> very difficult one.

I'll respond in a separate mail on the general inferference issue.

My conclusion here is that the specific issues you raise aren't
convincingly part of this and is better not intertwined with the
generic point about interference.

S.

>> And finally the subject line also seems unwise as it'll probably
>> just annoy folks and just distract us from getting real work
>> done. (So, if it does annoy you, please try be moderate in
>> your response, or maybe don't even send that mail, until we
>> see how Phill justifies its relevance.)
>>
> 
> Well we could spend the next few years dancing round the subject and
> pretending that the elephants are not in the room but I have no intention
> of doing so.
> 
> Now that my question on Alexander has been answered, I am looking for an
> answer to the question I raised at the RSA conference this year: How can we
> have a government-industry partnership to improve cyber security when a
> part of the military is actively engaged in subverting the standards
> process to protect vulnerabilities they might use in attacks? This is not
> the only forum I am raising this question, I am raising it with the policy
> makers in government as well.
> 
> I am quite used to being accused of peddling an agenda. For some reasons
> CAs are always accused of having some covert agenda and raising this on the
> lists is never seen as objectionable because it is so frequent. But the
> response I give is not 'how dare you ask that question' but instead 'why
> don't you hold all the other parties you rely on to the same degree of
> scrutiny'.
> 
> 
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to