Re: Proposal to remove three datatracker pages (https://datatracker.ietf.org/iesg/ann/ind/, /new, and /prev

2011-12-15 Thread Brian E Carpenter
Hi,

On 2011-12-16 09:20, Robert Sparks wrote:
> There are three pages exposed at the datatracker that have become stale
> or are producing erroneous information.
> https://datatracker.ietf.org/iesg/ann/ind/

"IESG Statements on Independent Submissions"

This is in theory very useful information. I haven't needed it recently, but 
I've
certainly used it in the past. How else will people find it? Searching the mail
archive (or the IESG minutes) is really not very convenient.

Please check with the ISE before scrapping this. It would be fine if these
announcements were collated on the RFC Editor site, but I don't see them
at http://www.rfc-editor.org/indsubs.html

> https://datatracker.ietf.org/iesg/ann/new/
> https://datatracker.ietf.org/iesg/ann/prev/
> 
> Has anyone been using those links?

Again, not recently, but it's still a lot more convenient than searching the 
mail
archive or the minutes.

I don't clearly remember, but I think these pages were created in response to
complaints about lack of IESG transparency and the inconvenience of searching
email archives. So I'd be a bit sorry to see them go.

OTOH they obviously need to work properly if they're kept, and they would be
much more useful if they included the full draft name as well as the title.

   Brian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Proposal to remove three datatracker pages (https://datatracker.ietf.org/iesg/ann/ind/, /new, and /prev

2011-12-15 Thread Robert Sparks
There are three pages exposed at the datatracker that have become stale 
or are producing erroneous information.

https://datatracker.ietf.org/iesg/ann/ind/
https://datatracker.ietf.org/iesg/ann/new/
https://datatracker.ietf.org/iesg/ann/prev/

Has anyone been using those links?

The first link, in particular has not been updated to reflect RFC5742, 
and is currently showing an incomplete set.


All of the information on those pages is available in other locations 
(at the very least at

<http://www.ietf.org/mail-archive/web/ietf-announce/current/maillist.html>.

Unless someone has been relying on these links, I propose removing them.

RjS
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-09-02 Thread Alexa Morris

The new SSL certificates have been received, and installed.

Regards,
Alexa

On Sep 1, 2011, at 8:57 AM, SM wrote:


At 03:50 26-08-2011, Scott Schmit wrote:

Mistakes happen. Hopefully lessons are learned so that they don't get
repeated.


It has been a week since the problem was reported and the SSL  
certificate is still showing up as expired.


Regards,
-sm
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf



---
Alexa Morris / Executive Director / IETF
48377 Fremont Blvd., Suite 117, Fremont, CA  94538
Phone: +1.510.492.4089 / Fax: +1.510.492.4001
Email: amor...@amsl.com

Managed by Association Management Solutions (AMS)
Forum Management, Meeting and Event Planning
www.amsl.com <http://www.amsl.com/>

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-09-01 Thread Marshall Eubanks
On Thu, Sep 1, 2011 at 11:57 AM, SM  wrote:

> At 03:50 26-08-2011, Scott Schmit wrote:
>
>> Mistakes happen. Hopefully lessons are learned so that they don't get
>> repeated.
>>
>
> It has been a week since the problem was reported and the SSL certificate
> is still showing up as expired.
>
>
This is definitely being worked on and the appropriate people are definitely
aware of it. I will try and get a status report.

Regards
Marshall



> Regards,
> -sm
> __**_____
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/**listinfo/ietf<https://www.ietf.org/mailman/listinfo/ietf>
>
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-09-01 Thread Frank Ellermann
On 2 September 2011 01:04, Adam Novak wrote:

> Who is the appropriate net monkey to handle this?

abuse@ietf works to create a ticket, but IIRC somebody
did that already using a similar address.  JFTR, I'd
prefer it if the IAOC doesn't waste money for a new
certificate, and the IETF simply starts its own CA.

Still dogfood + eating, but cheaper and much more fun.
Don't forget to delete DigiNotar everywhere [*].

-Frank

*: 
http://www.h-online.com/security/news/item/CA-hack-more-bogus-certificates-1334651.html>
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-09-01 Thread Adam Novak
Who is the appropriate net monkey to handle this?
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-09-01 Thread SM

At 03:50 26-08-2011, Scott Schmit wrote:

Mistakes happen. Hopefully lessons are learned so that they don't get
repeated.


It has been a week since the problem was reported and the SSL 
certificate is still showing up as expired.


Regards,
-sm 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-29 Thread t.petch
 Original Message -
From: "Hector Santos" 
To: "Adam Novak" 
Cc: "IETF Discussion" 
Sent: Friday, August 26, 2011 8:49 PM
Subject: Re: https


> I see, so as long as its not revoked, if compromised, you are hosed
> until it expires.
>
> I wonder if OCSP (Online Certificate Status Protocol) can help
> addresses this?

Hector

Back in 2008, some people could not access the IETF website using
TLS because of OCSP; I think that the URI for the OCSP site for
the certificate was unavailable, at least for some parts of the
world.  Another potential vector for failure.

Tom Petch

>Expired or not, it can still be revoked with dynamic
> checking as long as the browser as OCSP enabled.  So I guess its a
> matter of reporting the theft as soon as it is discovered.
>
>
> Adam Novak wrote:
> > On Fri, Aug 26, 2011 at 1:13 PM, Hector Santos 
wrote:
> >> Makes you wonder. Why is the concept of expiration required? �Did the IETF
> >> expire, die? �Did its value as an Organization go down and only valid on a
> >> year to year basis?
> >
> > As I understand it, expiration is supposed to solve the problem of
> > someone getting their hands on your old certificates and impersonating
> > you. In order to impersonate you, not only do they have to get into
> > your system, they have to have done it in the last year or so.
> >
> > It also keeps certificates for domains from outliving domain
> > registrations for too long. If you don't have the domain when you go
> > to renew the certificate, the CA shouldn't renew it.
> >
> > I guess it also keeps revocation lists short. You only have to
> > remember that a certain certificate was compromised until it expires,
> > instead of forever.
> > ___
> > Ietf mailing list
> > Ietf@ietf.org
> > https://www.ietf.org/mailman/listinfo/ietf
> >
> >
>
> --
> Sincerely
>
> Hector Santos
> http://www.santronics.com
>
>
>
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
>

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: authenticated archives, was https

2011-08-29 Thread Keith Moore
On Aug 27, 2011, at 7:30 PM, Hector Santos wrote:

> Keith Moore wrote:
>> On Aug 27, 2011, at 10:31 AM, John Levine wrote:
>>> TLS for session privacy is nice, but I find negligible value in a
>>> little lock icon in my browser that means only that one of the several
>>> dozen cert issuers configured into my browser, most of whom I've never
>>> heard of, and many of whom aren't even the organization in the cert
>>> name, signed something.
>> +1.  IMO browser vendors have made TLS nearly useless for web browsing by 
>> including so many default CAs; some with dubious integrity, and a few with a 
>> demonstrated lack of integrity.
> 
> Interesting viewpoint.  Are you advocating for a monopoly or oligopoly 
> centralization?

no, replacing one flawed model for another won't help.

the root problem is that users are being expected to extend trust to whatever 
set of CAs the browser vendors find "convenient", and browser vendors can be 
influenced/coerced in these choices by various means.

but it's not as if users are in a better position to decide which CAs are 
trustworthy.


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: authenticated archives, was https

2011-08-29 Thread Hector Santos

Keith Moore wrote:

On Aug 27, 2011, at 10:31 AM, John Levine wrote:


TLS for session privacy is nice, but I find negligible value in a
little lock icon in my browser that means only that one of the several
dozen cert issuers configured into my browser, most of whom I've never
heard of, and many of whom aren't even the organization in the cert
name, signed something.


+1.  IMO browser vendors have made TLS nearly useless for web browsing 
by including so many default CAs; some with dubious integrity, and a 
few with a demonstrated lack of integrity.


Interesting viewpoint.  Are you advocating for a monopoly or oligopoly 
centralization?


I having read anyone mention OCSP (Online Certificate Status Protocol) 
which use to be off by default, but appears to be enabled by default 
now by updated browsers. It was a painful to solve a customer problem 
when most browser work fine with a brand new certificate but failed 
when newer browser had OCSP enabled.  Some miscommunication issue on 
the type of certificate brought and wildcard domains.  The CA has 
revoked it but only via OSCP was it detectable.


The ongoing direction of dynamic tracking of anything and anyone 
continues to amaze me.


--
Sincerely

Hector Santos
http://www.santronics.com



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-29 Thread Hector Santos
Try it with Chrome and it makes you feel like the world blew up, I 
suppose intentionally as a fail-safe for the user-sake.


Doug Barton wrote:

Joel,

I don't know what "It doesn't" is supposed to mean, but visiting
https://www.ietf.org/* today with firefox it is still reporting that the
certificate expired yesterday.

Given the volume of discussion about the topic starting yesterday when
the problem started one could easily make a case for "it's still broken"
being a significant "issue."

cc'ing the address listed as "Report Website Errors" on the home page.


Doug


On 08/26/2011 07:44, Joel jaeggli wrote:

It doesn't...

http://www.ietf.org/mail-archive/web/v6ops/current/maillist.html

On 8/26/11 00:18 , t.petch wrote:

Why does the IETF website consider it necessary to use TLS to access the mailing
list archives, when they all appeared without it, or any other security, in the
first place?

Besides all the usual hassle of TLS, today the certificate is reported by IE as
expired, which sort of sums it up.

Tom Petch

_______
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


_______
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf






--
Sincerely

Hector Santos
http://www.santronics.com



_______
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-29 Thread Hector Santos
I see, so as long as its not revoked, if compromised, you are hosed 
until it expires.


I wonder if OCSP (Online Certificate Status Protocol) can help 
addresses this? Expired or not, it can still be revoked with dynamic 
checking as long as the browser as OCSP enabled.  So I guess its a 
matter of reporting the theft as soon as it is discovered.



Adam Novak wrote:

On Fri, Aug 26, 2011 at 1:13 PM, Hector Santos  wrote:

Makes you wonder. Why is the concept of expiration required? �Did the IETF
expire, die? �Did its value as an Organization go down and only valid on a
year to year basis?


As I understand it, expiration is supposed to solve the problem of
someone getting their hands on your old certificates and impersonating
you. In order to impersonate you, not only do they have to get into
your system, they have to have done it in the last year or so.

It also keeps certificates for domains from outliving domain
registrations for too long. If you don't have the domain when you go
to renew the certificate, the CA shouldn't renew it.

I guess it also keeps revocation lists short. You only have to
remember that a certain certificate was compromised until it expires,
instead of forever.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf




--
Sincerely

Hector Santos
http://www.santronics.com



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-29 Thread Hector Santos

Adam Novak wrote:


Once the certificate expiration business is fixed, it should be fairly
simple to make sure it's kept up to date so that this sort of thing
doesn't happen again.


Makes you wonder. Why is the concept of expiration required?  Did the 
IETF expire, die?  Did its value as an Organization go down and only 
valid on a year to year basis?


It just seem so arbitrary for one to certify another and say to the 
world come X day, you are no longer the same trusted entity when what 
he is really saying "He didn't pay me like he suppose to every yet" 
Does that imply the IETF is now downgraded, in debt and can not be 
trusted?


All rhetorical questions. After all, they did "Invent" it. It should 
be free to the IETF. :)


Just consider there are some in the DKIM arena who wanted for the x= 
expiration tag to be deprecated and removed.



--
Sincerely

Hector Santos
http://www.santronics.com



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: authenticated archives, was https

2011-08-29 Thread Iljitsch van Beijnum
On 27 Aug 2011, at 19:42 , Joel jaeggli wrote:

>> In the mean time, I would like TLS exterminated from the IETF website - any
>> reason will do - since the cost to me far outweighs the benefit.  So who 
>> decided to put it in, and on what grounds?

Good question. For me it also causes more trouble than benefits. But let's 
split the difference and let the HTTP and HTTPS sites exist side by side for 
all pages that contain public information.

> The datatracker, wikis, working group chairs pages, registration,
> mailing list management and tools sites all support authentication, I
> would find it completely unacceptable to pass my credentials  or
> activities I engaged in once authenticated in the clear.

There's more to life than HTTPS. Such as digest authentication, which is 
probably sufficient for most of the above.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-29 Thread Iljitsch van Beijnum
On 26 Aug 2011, at 16:24 , Tim Bray wrote:

> I'm increasingly coming to think that *everything* should be done with
> TLS unless you can prove it's harmful.  Call me paranoid, but given
> the general state of the world, secure-by-default seems like the way
> to go.  -Tim

That would be nice in a world where such security didn't slow everything down, 
especially on high RTT links. HTTPS really makes everything a whole lot slower 
on a mobile device, not to mention using extra battery power.

There is absolutely no reason mailinglist archives or most other stuff on 
www.ietf.org needs more protection than any other random web page and as such 
imposing the additional overhead on other people is very annoying.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-29 Thread t.petch
- Original Message -
From: "Joel jaeggli" 
To: "Doug Barton" 
Cc: "t.petch" ; "IETF Discussion" ;

Sent: Sunday, August 28, 2011 9:55 PM
> On 8/28/11 11:31 , Joel jaeggli wrote:
> > On 8/26/11 14:00 , Doug Barton wrote:
> >> Joel,
> >
> > "it doesn't" means that the mailing list archives do not require the use
> > of https, if the entry point urls point to the https server that bad in
> > this case...
>
> To be still more specific the mailman archives do not. the ibin archive
> does.

Joel

Um, I do not understand that statement; mailman I know, ibin I do not, but
either way, I am an archive user, not an e-mail administrator, and while I can
access some archives with http:, notably from the web page for specific WG,
others I cannot, notably from
http://www.ietf.org/list/nonwg.html
which is the only way I can access some of them, as far as I know: and on that
page, there are some 250 html anchors with a scheme of 'https:'
Edit the scheme to http: and the web site puts the 's' back in so either way,
I am stuffed.

Tom Petch

> > If one has forgotten to renew a certificate before it expires, it takes
> > time to get a new one issued. as an operational pratice is is necessary
> > to track the issue and expiration dates  of such resources.
> >
> >> I don't know what "It doesn't" is supposed to mean, but visiting
> >> https://www.ietf.org/* today with firefox it is still reporting that the
> >> certificate expired yesterday.
> >>
> >> Given the volume of discussion about the topic starting yesterday when
> >> the problem started one could easily make a case for "it's still broken"
> >> being a significant "issue."
> >>
> >> cc'ing the address listed as "Report Website Errors" on the home page.
> >>
> >>
> >> Doug
> >>
> >>
> >> On 08/26/2011 07:44, Joel jaeggli wrote:
> >>> It doesn't...
> >>>
> >>> http://www.ietf.org/mail-archive/web/v6ops/current/maillist.html
> >>>
> >>> On 8/26/11 00:18 , t.petch wrote:
> >>>> Why does the IETF website consider it necessary to use TLS to access the
mailing
> >>>> list archives, when they all appeared without it, or any other security,
in the
> >>>> first place?
> >>>>
> >>>> Besides all the usual hassle of TLS, today the certificate is reported by
IE as
> >>>> expired, which sort of sums it up.
> >>>>
> >>>> Tom Petch
> >>>>
> >>>> ___
> >>>> Ietf mailing list
> >>>> Ietf@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/ietf
> >>>>
> >>>
> >>> ___
> >>> Ietf mailing list
> >>> Ietf@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/ietf
> >>
> >>
> >>
> >
>

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-28 Thread Joel jaeggli
On 8/28/11 11:31 , Joel jaeggli wrote:
> On 8/26/11 14:00 , Doug Barton wrote:
>> Joel,
> 
> "it doesn't" means that the mailing list archives do not require the use
> of https, if the entry point urls point to the https server that bad in
> this case...

To be still more specific the mailman archives do not. the ibin archive
does.

> If one has forgotten to renew a certificate before it expires, it takes
> time to get a new one issued. as an operational pratice is is necessary
> to track the issue and expiration dates  of such resources.
> 
>> I don't know what "It doesn't" is supposed to mean, but visiting
>> https://www.ietf.org/* today with firefox it is still reporting that the
>> certificate expired yesterday.
>>
>> Given the volume of discussion about the topic starting yesterday when
>> the problem started one could easily make a case for "it's still broken"
>> being a significant "issue."
>>
>> cc'ing the address listed as "Report Website Errors" on the home page.
>>
>>
>> Doug
>>
>>
>> On 08/26/2011 07:44, Joel jaeggli wrote:
>>> It doesn't...
>>>
>>> http://www.ietf.org/mail-archive/web/v6ops/current/maillist.html
>>>
>>> On 8/26/11 00:18 , t.petch wrote:
>>>> Why does the IETF website consider it necessary to use TLS to access the 
>>>> mailing
>>>> list archives, when they all appeared without it, or any other security, 
>>>> in the
>>>> first place?
>>>>
>>>> Besides all the usual hassle of TLS, today the certificate is reported by 
>>>> IE as
>>>> expired, which sort of sums it up.
>>>>
>>>> Tom Petch
>>>>
>>>> ___
>>>> Ietf mailing list
>>>> Ietf@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/ietf
>>>>
>>>
>>> ___
>>> Ietf mailing list
>>> Ietf@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ietf
>>
>>
>>
> 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-28 Thread Joel jaeggli
On 8/26/11 14:00 , Doug Barton wrote:
> Joel,

"it doesn't" means that the mailing list archives do not require the use
of https, if the entry point urls point to the https server that bad in
this case...

If one has forgotten to renew a certificate before it expires, it takes
time to get a new one issued. as an operational pratice is is necessary
to track the issue and expiration dates  of such resources.

> I don't know what "It doesn't" is supposed to mean, but visiting
> https://www.ietf.org/* today with firefox it is still reporting that the
> certificate expired yesterday.
> 
> Given the volume of discussion about the topic starting yesterday when
> the problem started one could easily make a case for "it's still broken"
> being a significant "issue."
> 
> cc'ing the address listed as "Report Website Errors" on the home page.
> 
> 
> Doug
> 
> 
> On 08/26/2011 07:44, Joel jaeggli wrote:
>> It doesn't...
>>
>> http://www.ietf.org/mail-archive/web/v6ops/current/maillist.html
>>
>> On 8/26/11 00:18 , t.petch wrote:
>>> Why does the IETF website consider it necessary to use TLS to access the 
>>> mailing
>>> list archives, when they all appeared without it, or any other security, in 
>>> the
>>> first place?
>>>
>>> Besides all the usual hassle of TLS, today the certificate is reported by 
>>> IE as
>>> expired, which sort of sums it up.
>>>
>>> Tom Petch
>>>
>>> ___
>>> Ietf mailing list
>>> Ietf@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ietf
>>>
>>
>> ___
>> Ietf mailing list
>> Ietf@ietf.org
>> https://www.ietf.org/mailman/listinfo/ietf
> 
> 
> 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-28 Thread ned+ietf
> On 8/27/2011 4:12 PM, t.petch wrote:

> > Glen
> >
> > Me again.
> >
> > Just after I posted my last message, I received a post on the ietf-ssh list,
> > hosted by netbsd.org, and looking through the 'Received: from' headers, as 
> > one
> > does on a wet Saturday morning of a Bank Holiday weekend, there was TLS, 
> > used to
> > submit the message to the server, so even spammers have caught on that TLS
> > should be used everywhere.  End to end?

As a side note, the reason spammers use TLS to submit mail is obvious: It's
required by many submission servers so they really don't have a choice. (The
reason it's required is to protect the authentication exchange, not because
there's any real expectation that it provides useful privacy protection for the
submitted email itself.)

> Apparently, from the POV of the spammer & his SMTP server.  Email is a
> store & forward system.  In any case, my original question was not about
> the definition of end-to-end, it was about Ned usage of the term "hop".

I used the term "hop" in a very generic sense to refer to moving the
data around.

>  Upon further analysis, however, it seems clear that he was referring to
> the email archives as if they are something other than simple files (as
> betrayed by his statement that "Don't pretend a transfer protection
> mechanism covering exactly one hop provides real object security,
> because it doesn't."); thus, the retrieval of the archived data would be
> the last "hop" in the email system.

And that's incorrect. For one thing, I often retrieve material from web sites
and save it rather than looking at it right there on the screen. So the
transfer of the material from the web server is in no way, shape, or form the
final hop the information takes before it is consumed. As as Keith points out,
I and many others am often forced to do such access through corporate-mandated
proxies of various sorts - another hop.

> There seem to be two problems with
> this statement: one is taking the file transfer mechanism as if it was
> part of the email system itself,

Nobody is making any such claim.

> which it obviously is not (downloading
> an archived message is no different than downloading an RFC from a Web
> site); the other being that someone, somewhere was pretending that TLS
> does something that it was never designed to do (a straw man of, AFAICT,
> Ned's invention -- I don't recall anybody making such a claim on this
> thread,

I was responding to the justification given for the use of https in this
context. The exact words used were:

> > The mail archives (and the minutes of the physical meetings)
> > are the official record of the Working Groups, IETF, etc.
> > Those archives should be available with a reasonably high
> > level of integrity and authenticity.

Nor was I the only, or even the first, to suggest that object security
is needed for this sort of protection.

> nor for that matter saying they _wanted_ "real object security"
> applied to the archives, merely that it's not really a bad idea for a
> person retrieving them to have some assurance that they came from the
> IETF server and that they weren't modified in transit).

And once again, nobody is saying that TLS doesn't give some very limited
assurance along these lines - the notion that there are claims to the contrary 
is your own strawman. What we are saying is that there are also significant
costs, those costs appear to be greater than the benefits in this case, and if
there is real concern about archive integrity there are better ways to secure
them.

Anyway, this discussion is now well past it's sell-by date, so this will be my
final response on the topic.

Ned
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-27 Thread Glen Zorn
On 8/27/2011 4:12 PM, t.petch wrote:

> Glen
> 
> Me again.
> 
> Just after I posted my last message, I received a post on the ietf-ssh list,
> hosted by netbsd.org, and looking through the 'Received: from' headers, as one
> does on a wet Saturday morning of a Bank Holiday weekend, there was TLS, used 
> to
> submit the message to the server, so even spammers have caught on that TLS
> should be used everywhere.  End to end?

Apparently, from the POV of the spammer & his SMTP server.  Email is a
store & forward system.  In any case, my original question was not about
the definition of end-to-end, it was about Ned usage of the term "hop".
 Upon further analysis, however, it seems clear that he was referring to
the email archives as if they are something other than simple files (as
betrayed by his statement that "Don't pretend a transfer protection
mechanism covering exactly one hop provides real object security,
because it doesn't."); thus, the retrieval of the archived data would be
the last "hop" in the email system.  There seem to be two problems with
this statement: one is taking the file transfer mechanism as if it was
part of the email system itself, which it obviously is not (downloading
an archived message is no different than downloading an RFC from a Web
site); the other being that someone, somewhere was pretending that TLS
does something that it was never designed to do (a straw man of, AFAICT,
Ned's invention -- I don't recall anybody making such a claim on this
thread, nor for that matter saying they _wanted_ "real object security"
applied to the archives, merely that it's not really a bad idea for a
person retrieving them to have some assurance that they came from the
IETF server and that they weren't modified in transit).

...
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: authenticated archives, was https

2011-08-27 Thread Joel jaeggli
On 8/27/11 08:35 , t.petch wrote:

> In the mean time, I would like TLS exterminated from the IETF website - any
> reason
> will do - since the cost to me far outweighs the benefit.  So who decided to 
> put
> it in, and on what grounds?

The datatracker, wikis, working group chairs pages, registration,
mailing list management and tools sites all support authentication, I
would find it completely unacceptable to pass my credentials  or
activities I engaged in once authenticated in the clear.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-27 Thread ned+ietf

On 8/27/11 7:25 AM, ned+i...@mauve.mrochek.com wrote:
> I don't have an anwwer here, but the one thing I'm fairly sure of is that
> blindly pushing TLS everywhere is not the solution a lot of folks believe
> it is.



I tend to think that the problem here (and I agree that it's a big one)
isn't TLS, but that PKI as defined by pkix is very difficult to deploy
correctly.


Agreed.


I've seen similar sorts of problems with digital signatures
on email, but in those cases as often as not someone simply got
the certificate contents wrong (or the user doesn't understand how to
configure his mail client correctly and is using a name that doesn't
appear in the certificate) rather that the cert has expired (although
there's a lot of that, too).  There's a substantial usability problem.


Absolutely, and it's both architectural and operational - PKI is
full of complex and subtle concepts that implementations don't exactly
help you with.

Ned
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: authenticated archives, was https

2011-08-27 Thread John R. Levine

In the case of http: access, MSIE just times out.  Repeat the request and it
usually works; something has changed (could even be DNS).


It works fine for me in IE on Windows 7 on an ordinary consumer DSL 
connection, click through the warning about the expired cert and the pages 
come right up.  I suspect you will find that "my tools are broken" is not 
a persuasive argument to get people to remove security features, even 
fairly lame ones like this.



Recently, DKIM was added to outgoing mail.  The mail still works, the cost to
me is small and the benefit - to me -is nil.  Who decided to put it in?


The IAOC, I expect.  I find DKIM useful to skip mail filtering.  Are you 
saying that people are not allowed to use RFC-standard security features 
until you, Tom, approve of them?


R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: authenticated archives, was https

2011-08-27 Thread t.petch
 Original Message -
From: "John Levine" 
To: 
Sent: Saturday, August 27, 2011 4:31 PM

> I can't tell what problem we're trying to solve here.  The original
> question (other than that whoever runs the IETF web site should
> buy a new cert) seemed to have something to do with mailing list
> archives.

John

Yes, more generally it is the creeping changes to the IETF service that
makes work progressively more difficult.  https: access to the IETF web
site quite often fails for me, indeed access at all quite often fails.  It never
used
to, and I am hard put to say just when it changed, but it was a year or two ago.
In the case of http: access, MSIE just times out.  Repeat the request and it
usually works; something has changed (could even be DNS).

With https:, the CRL downloads as does the source of the web page and
then the process stalls, permanently; leaving it a couple of hours, or
refreshing
the page, with CRL now in place, and the little icon just goes on turning until
it
is time to stop work. Perhaps when I upgrade my PC it will work - or
perhaps not, without a diagnosis I cannot tell.

In the mean time, I would like TLS exterminated from the IETF website - any
reason
will do - since the cost to me far outweighs the benefit.  So who decided to put
it in, and on what grounds?

Recently, DKIM was added to outgoing mail.  The mail still works, the cost to
me is small and the benefit - to me -is nil.  Who decided to put it in?

There has been a discussion about adding 'subject_prefix' on IETF_Discuss.
(This is a welcome change, actually discussing it before doing it). For me,
the added cost would be small, and the benefit nil.

What is going to come next, and will we get any warning, or will the cost of
IETF activity just go up again?

Tom Petch

  I think it would be swell to know that the archives I
> retrieved were the real ones, but what does real mean here?
>
> A - The messages sent by authenticated senders
> B - The contents of the archive as of some past time when the
> archives were created
> C - The archives as they are on an IETF server now
> D - The archives as presented by some presumably reliable piece
> of software (pipermail)
> E - Something else
>
> While option A might be nice, it's not going to happen without an
> implausible level of S/MIME or PGP signing.
>
> Option B seems useful to me, since it defends against the threat of
> accidental or deliberate bitrot.  (An example might be restoring an
> archived copy that had the addresses xxx'ed out.)
>
> Options C and D seem less useful.
>
> Harking back to a previous argument about signing RFCs, the way I
> would do option B would be to publish hashes of the archive files in
> enough places to be sure they're persistent, e.g., print the latest
> set of hashes on the back of everyone's name card at IETF meetings.
>
> TLS for session privacy is nice, but I find negligible value in a
> little lock icon in my browser that means only that one of the several
> dozen cert issuers configured into my browser, most of whom I've never
> heard of, and many of whom aren't even the organization in the cert
> name, signed something.
>
> R's,
> John
>
>
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-27 Thread Melinda Shore

On 8/27/11 7:25 AM, ned+i...@mauve.mrochek.com wrote:

I don't have an anwwer here, but the one thing I'm fairly sure of is that
blindly pushing TLS everywhere is not the solution a lot of folks believe
it is.


I tend to think that the problem here (and I agree that it's a big one)
isn't TLS, but that PKI as defined by pkix is very difficult to deploy
correctly.  I've seen similar sorts of problems with digital signatures
on email, but in those cases as often as not someone simply got
the certificate contents wrong (or the user doesn't understand how to
configure his mail client correctly and is using a name that doesn't
appear in the certificate) rather that the cert has expired (although
there's a lot of that, too).  There's a substantial usability problem.

Melinda
_______
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-27 Thread ned+ietf
> I'm increasingly coming to think that *everything* should be done with
> TLS unless you can prove it's harmful.  Call me paranoid, but given
> the general state of the world, secure-by-default seems like the way
> to go.  -Tim

This sentiment always sounds nice, but the devil is in the details.

Back when STARTTLS was added to SMTP, a bunch of us thought this provided the
means to do opportunistic encyption of email transport, so there was a push to
deploy that. It was a total failure - it seems a certain large vendor with a
very popular implementation borked their server so it advertised STARTTLS even
though no certificate was installed and any attempt to negotiate TLS protection
would end in failure. And since the negotiation failure left the connection in
an unusable state, a new connection had to be tried, along with all the logic
to prevent the new one from ending up in the same state.

It tooks years before enough of the broken servers were fixed to try again, and
by then service defaults and deployment guidelines were well established and
the opportunity was gone as well.

Of course this set of issues was unique to the situation. But with TLS it's
always something - if it isn't broken default configurations, its incompatible
cipher suites, or problems with certificate formats, or expired certificates,
or dubious CAs, or major security holes in popular implementations, etc. etc.

The bottom line is this stuff is just too complicated for mere mortals to get
right, and the fact that they then proceed to get it wrong more often than not
causes an enormous amount of trouble.

In the present case, for example, you may think that an expired certificate is
not a big deal. Not so. For one thing, the more people have to click on the
"this really isn't secure, proceed anyway" button to get things done, the more
likely they are to do it when it's a real attack and not a maintenance problem.
And for another, there are some browser/certificate error combinations  where
there's no workaround - no amount of clicking "I agree" buttons will get you
the data you're after.

I don't have an anwwer here, but the one thing I'm fairly sure of is that
blindly pushing TLS everywhere is not the solution a lot of folks believe
it is.

Ned
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: authenticated archives, was https

2011-08-27 Thread Keith Moore
On Aug 27, 2011, at 10:31 AM, John Levine wrote:

> TLS for session privacy is nice, but I find negligible value in a
> little lock icon in my browser that means only that one of the several
> dozen cert issuers configured into my browser, most of whom I've never
> heard of, and many of whom aren't even the organization in the cert
> name, signed something.

+1.  IMO browser vendors have made TLS nearly useless for web browsing by 
including so many default CAs; some with dubious integrity, and a few with a 
demonstrated lack of integrity.



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-27 Thread Dave CROCKER

On 8/26/2011 12:18 AM, t.petch wrote:
> Why does the IETF website consider it necessary to use TLS to access the
> mailing list archives, when they all appeared without it, or any other
> security, in the first place?

There is a general move towards using https for all web exchanges, as already 
noted on this thread.  When a server-side cert is used, this includes 
protection against man-in-the-middle attacks.


As for providing confidentiality when the data are actually public, yeah, that's 
kind of wasted, but the web service can't know whether the data needs 
protecting.  For example you might be logging in to your mailing list account.


However, as Eliot notes, there is a degree of data authentication this provides.

As for the alternative of object-based signing, that's good in theory, but not 
as well deployed -- and some current IETF wg activity seeks to remedy this(*) -- 
and therefore not an immediately superior choice.  (As a fan of object-based 
signing, I would rather have the authentication be object-based.)




On 8/26/2011 10:29 PM, Glen Zorn wrote:

I could have sworn that TLS was an e2e mechanism.  Maybe you're using
the term "hop" in a manner unfamiliar to me?


Evidently so.

The likely disparity is with applications that have their own store-and-forward 
model, as already noted on this thread.  TLS covers only one step (hop) in the 
sequence; by definition, that's not end2end.


And note that this is a rather larger set of apps than most people realize.

The modern web, for example, is highly store and forward at the application 
level.  First, the author is typically far removed from the server that provides 
the data.  Second, caches and proxies mediate the exchange.  TLS protects none 
of the intermediary processes.


In other words, with respect to application-level protection, TLS is equivalent 
to a link-level protocol.  It is 'direct' between two apps participants during 
an immediate exchange.  It does not cover the sequence of nodes at the 
application level.  Having a sequence of TLS sessions provides protection of the 
communication exchanges, but does not protect within the nodes mediating the 
(apps-level) e2e sequence.


In other words, "end to end" is a relative construct.  Even email is not 
end2end, relative to some processes that use email, such as EDI...



d/


(*) A fundamental issue that arises especially for object-based signing is which 
identifier to use.  There is a very large difference between having it signed by 
the author's organization, versus by the web server operator, for example.


--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
_______
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: authenticated archives, was https

2011-08-27 Thread John Levine
I can't tell what problem we're trying to solve here.  The original
question (other than that whoever runs the IETF web site should
buy a new cert) seemed to have something to do with mailing list
archives.  I think it would be swell to know that the archives I
retrieved were the real ones, but what does real mean here?

A - The messages sent by authenticated senders
B - The contents of the archive as of some past time when the
archives were created
C - The archives as they are on an IETF server now
D - The archives as presented by some presumably reliable piece
of software (pipermail)
E - Something else

While option A might be nice, it's not going to happen without an
implausible level of S/MIME or PGP signing.

Option B seems useful to me, since it defends against the threat of
accidental or deliberate bitrot.  (An example might be restoring an
archived copy that had the addresses xxx'ed out.)

Options C and D seem less useful.

Harking back to a previous argument about signing RFCs, the way I
would do option B would be to publish hashes of the archive files in
enough places to be sure they're persistent, e.g., print the latest
set of hashes on the back of everyone's name card at IETF meetings.

TLS for session privacy is nice, but I find negligible value in a
little lock icon in my browser that means only that one of the several
dozen cert issuers configured into my browser, most of whom I've never
heard of, and many of whom aren't even the organization in the cert
name, signed something.

R's,
John


_______
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-27 Thread Nathaniel Borenstein
On Aug 26, 2011, at 10:24 AM, Tim Bray wrote:

> I'm increasingly coming to think that *everything* should be done with
> TLS unless you can prove it's harmful.  Call me paranoid, but given
> the general state of the world, secure-by-default seems like the way
> to go.  -Tim

You're not alone.  I think one reason this discussion suddenly flared up so 
dramatically is that this is at least as much a political issue as a technical 
one, and therefore not exactly the IETF's bailiwick.  EFF certainly seems to 
think so:

http://www.eff.org/https-everywhere

Nowadays the only reason I can see for not wanting to use any form of 
encryption you can, anywhere and anytime you can, is a desire to make it easier 
for governments to snoop on you.  Even flawed or partial schemes can provide 
some protection if deployed widely enough -- it's the same principle as 
steganography, more or less.  -- Nathaniel___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-27 Thread t.petch
Glen

Me again.

Just after I posted my last message, I received a post on the ietf-ssh list,
hosted by netbsd.org, and looking through the 'Received: from' headers, as one
does on a wet Saturday morning of a Bank Holiday weekend, there was TLS, used to
submit the message to the server, so even spammers have caught on that TLS
should be used everywhere.  End to end?

Tom Petch


- Original Message -
From: "t.petch" 
To: "Glen Zorn" ; 
Cc: "IETF Discussion" 
Sent: Saturday, August 27, 2011 10:53 AM
Subject: Re: https


> - Original Message -
> From: "Glen Zorn" 
> To: 
> Cc: "John C Klensin" ; "IETF Discussion" 
> Sent: Saturday, August 27, 2011 7:29 AM
> Subject: Re: https
>
>
> > On 8/26/2011 11:14 PM, ned+i...@mauve.mrochek.com wrote:
> >
> > > +1. If you want signatures, do them properly. Don't pretend a transfer
> > > protection mechanism covering exactly one hop provides real object
security,
> > > because it doesn't.
> >
> > I could have sworn that TLS was an e2e mechanism.  Maybe you're using
> > the term "hop" in a manner unfamiliar to me?
>
> Glen
>
> Without a precise context, then e2e can mean anything, from ends of a fibre
link
> to ends of a communication between two sentient beings.
>
> On other lists, there is sometimes disagreement as to what TLS is, transport,
> application or what.  What it is not is a secure channel from application to
> application, for that you need channel binding or some such, a problem which a
> number of WGs have wrestled with, such as isms for SNMPv3 (which used its own
> form of binding for both SSH and TLS between the secure transport and the
> application).
>
> I regularly hear, and cringe at, statements in the media that you must check
for
> the padlock to know that you are secure.
>
> A) you do not know what cryptography is in use (my local library recently
liked
> SSL2 as a default)
>
> B) you do not know where the endpoints of the channel are
>
> TLS and padlocks are often a spurious miasma of security.
>
> Tom Petch
>
> >
> > > And as for the "encrypt so the really secret stuff doesn't stand out"
> argument,
> > > that's fine as long as it doesn't cause inconvenience to anyone. That's
> clearly
> > > not the case here. And I'm sorry, the "mistakes were made" notion doesn't
> > > really fly: Certificates aren't a "set it and forget it" thing, so if you
> > > haven't noted expiration dates on someone's to-do list so they can be
> updated
> > > before expiration, you're not doing it right.
> >
> > Isn't "not doing it right" pretty much the definition of "mistake"
> > (assuming no evil intent)?
> > ___
> > Ietf mailing list
> > Ietf@ietf.org
> > https://www.ietf.org/mailman/listinfo/ietf
>
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-27 Thread t.petch
- Original Message -
From: "Glen Zorn" 
To: 
Cc: "John C Klensin" ; "IETF Discussion" 
Sent: Saturday, August 27, 2011 7:29 AM
Subject: Re: https


> On 8/26/2011 11:14 PM, ned+i...@mauve.mrochek.com wrote:
>
> > +1. If you want signatures, do them properly. Don't pretend a transfer
> > protection mechanism covering exactly one hop provides real object security,
> > because it doesn't.
>
> I could have sworn that TLS was an e2e mechanism.  Maybe you're using
> the term "hop" in a manner unfamiliar to me?

Glen

Without a precise context, then e2e can mean anything, from ends of a fibre link
to ends of a communication between two sentient beings.

On other lists, there is sometimes disagreement as to what TLS is, transport,
application or what.  What it is not is a secure channel from application to
application, for that you need channel binding or some such, a problem which a
number of WGs have wrestled with, such as isms for SNMPv3 (which used its own
form of binding for both SSH and TLS between the secure transport and the
application).

I regularly hear, and cringe at, statements in the media that you must check for
the padlock to know that you are secure.

A) you do not know what cryptography is in use (my local library recently liked
SSL2 as a default)

B) you do not know where the endpoints of the channel are

TLS and padlocks are often a spurious miasma of security.

Tom Petch

>
> > And as for the "encrypt so the really secret stuff doesn't stand out"
argument,
> > that's fine as long as it doesn't cause inconvenience to anyone. That's
clearly
> > not the case here. And I'm sorry, the "mistakes were made" notion doesn't
> > really fly: Certificates aren't a "set it and forget it" thing, so if you
> > haven't noted expiration dates on someone's to-do list so they can be
updated
> > before expiration, you're not doing it right.
>
> Isn't "not doing it right" pretty much the definition of "mistake"
> (assuming no evil intent)?
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-27 Thread t.petch
- Original Message -
From: "Doug Barton" 
To: "Joel jaeggli" 
Cc: "t.petch" ; "IETF Discussion" ;

Sent: Friday, August 26, 2011 11:00 PM
Subject: Re: https


> Joel,
>
> I don't know what "It doesn't" is supposed to mean, but visiting
> https://www.ietf.org/* today with firefox it is still reporting that the
> certificate expired yesterday.

Doug

How I interpreted the reply is that some mailing list archives can be accessed
without using TLS, typically by going to the Working Group page and selecting
the archive from there; v6ops is such a one.

But as I pointed out yesterday, if you go to the ietf mailing list pages, such
as
http://www.ietf.org/list/nonwg.html
then that contains some 250 or more html anchors with a scheme of https:, and
that is the only way I know of accessing some of the archives (I was looking for
the IESG comments on the approval of an I-D, comments which I had missed at
announce time).

I tried editing the URI to remove the 's' but the IETF website puts it back
again:-(

Tom Petch

>
> Given the volume of discussion about the topic starting yesterday when
> the problem started one could easily make a case for "it's still broken"
> being a significant "issue."
>
> cc'ing the address listed as "Report Website Errors" on the home page.
>
>
> Doug
>
>
> On 08/26/2011 07:44, Joel jaeggli wrote:
> > It doesn't...
> >
> > http://www.ietf.org/mail-archive/web/v6ops/current/maillist.html
> >
> > On 8/26/11 00:18 , t.petch wrote:
> >> Why does the IETF website consider it necessary to use TLS to access the
mailing
> >> list archives, when they all appeared without it, or any other security, in
the
> >> first place?
> >>
> >> Besides all the usual hassle of TLS, today the certificate is reported by
IE as
> >> expired, which sort of sums it up.
> >>
> >> Tom Petch
> >>
> >> ___
> >> Ietf mailing list
> >> Ietf@ietf.org
> >> https://www.ietf.org/mailman/listinfo/ietf
> >>
> >
> > ___
> > Ietf mailing list
> > Ietf@ietf.org
> > https://www.ietf.org/mailman/listinfo/ietf
>
>
>
> --
>
> Nothin' ever doesn't change, but nothin' changes much.
> -- OK Go
>
> Breadth of IT experience, and depth of knowledge in the DNS.
> Yours for the right price.  :)  http://SupersetSolutions.com/
>

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Glen Zorn
On 8/26/2011 11:14 PM, ned+i...@mauve.mrochek.com wrote:

> +1. If you want signatures, do them properly. Don't pretend a transfer
> protection mechanism covering exactly one hop provides real object security,
> because it doesn't.

I could have sworn that TLS was an e2e mechanism.  Maybe you're using
the term "hop" in a manner unfamiliar to me?

> And as for the "encrypt so the really secret stuff doesn't stand out" 
> argument,
> that's fine as long as it doesn't cause inconvenience to anyone. That's 
> clearly
> not the case here. And I'm sorry, the "mistakes were made" notion doesn't
> really fly: Certificates aren't a "set it and forget it" thing, so if you
> haven't noted expiration dates on someone's to-do list so they can be updated
> before expiration, you're not doing it right.

Isn't "not doing it right" pretty much the definition of "mistake"
(assuming no evil intent)?
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread John C Klensin


--On Friday, August 26, 2011 16:15 -0400 Eric Burger
 wrote:

> Two thoughts.
> 
> On the one hand, Ned is absolutely correct: the thing we want
> to make absolutely sure of is the integrity of the object. The
> way of doing that is making sure the object itself can prove
> its integrity.  In the messaging world, we do this with
> S/MIME.  The use of TLS for SMTP or IMAP does not convey any
> integrity assertions for the object.  Note this object should
> be signed by me when you receive it, by the way.

And it verifies too... sort of.  Note that the IETF mailing list
machinery tries to prevent it from doing so by appending a
footer to tell everyone who it is (independent of the standard
List-* headers that contain the same information).  Another
separate problem, but definitely falling into the "dogfood...
yum" category.

> On the other hand, while TLS is not at all sufficient for the
> integrity of the object, it is necessary to protect the
> individual accessing the object.  There are a number of
> countries where asking for the RFCs relating to privacy,
> security, and threats to such too many times could get you
> arrested.

Yes, although it isn't entirely clear that TLS actually provides
enough protection in practice.  A sufficiently paranoid
government with those concerns would either force the
connections through proxies that it controlled (see Keith's
note) or would notice connections to IETF servers and "inquire",
through out-of-band means, about what was being retrieved.
There are ways to protect against that risk, but assuming that
unadorned https is sufficient is almost certainly naive.

> Likewise, the presumption is the object might be
> signed, but it would be insane and useless to encrypt the
> object.  However, there are many, many times one would want
> the object encrypted, even if only to compress it.

Sure.  If TLS actually worked for its intended purpose in the
overwhelming number of cases, nothing that Ned or I have said
would argue against using it.  In that regard, the problems are
that it is assumed to solve several problems for which it is
useless and several others, including your example above, for
which its effectiveness is dubious against an attacker with
sufficient non-network resources.

> Given that, the question should not be, "Why are we using TLS
> if the object is not private?," but "What are we not using
> secure connections for all IETF access, over any modality?"
> 
> One of the answers seems to be, "Because it sucks."  That is
> the sentiment of the message below.

> So we are eating our dog food, and we are getting indigestion.
> Sounds like an opportunity to fix it!

I think it is more than that.  If we (and the Secretariat and
IASA) cannot get it together to keep certs up to date, or at
least to get them updated _very_ quickly when someone notices
that they have expired (note that it is now only a few minutes
short of 24 hours since the thing expired), we are sending a
pretty strong message to the community that we don't care and no
one else should either.  Remember that the message browsers pop
up when an invalid or expired certificate is encountered is
totally incomprehensible to a typical luser, offering only
choices of not accessing a site that contains useful information
and that was valid before and accepting the cert, errors and
all.  The more valid sites there are with invalid certificates,
the more we train the user to accept those invalid certificates,
rendering the whole certificate idea (and TLS with it)
pointless.  By choosing to contribute to that problem, the IETF
undermines the utility of TLS for addressing the real issues of
server authentication and client-> server encryption that it was
primarily intended to address.

john

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Doug Barton
Joel,

I don't know what "It doesn't" is supposed to mean, but visiting
https://www.ietf.org/* today with firefox it is still reporting that the
certificate expired yesterday.

Given the volume of discussion about the topic starting yesterday when
the problem started one could easily make a case for "it's still broken"
being a significant "issue."

cc'ing the address listed as "Report Website Errors" on the home page.


Doug


On 08/26/2011 07:44, Joel jaeggli wrote:
> It doesn't...
> 
> http://www.ietf.org/mail-archive/web/v6ops/current/maillist.html
> 
> On 8/26/11 00:18 , t.petch wrote:
>> Why does the IETF website consider it necessary to use TLS to access the 
>> mailing
>> list archives, when they all appeared without it, or any other security, in 
>> the
>> first place?
>>
>> Besides all the usual hassle of TLS, today the certificate is reported by IE 
>> as
>> expired, which sort of sums it up.
>>
>> Tom Petch
>>
>> ___
>> Ietf mailing list
>> Ietf@ietf.org
>> https://www.ietf.org/mailman/listinfo/ietf
>>
> 
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf



-- 

Nothin' ever doesn't change, but nothin' changes much.
-- OK Go

Breadth of IT experience, and depth of knowledge in the DNS.
Yours for the right price.  :)  http://SupersetSolutions.com/

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Eric Burger
Two thoughts.

On the one hand, Ned is absolutely correct: the thing we want to make 
absolutely sure of is the integrity of the object. The way of doing that is 
making sure the object itself can prove its integrity.  In the messaging world, 
we do this with S/MIME.  The use of TLS for SMTP or IMAP does not convey any 
integrity assertions for the object.  Note this object should be signed by me 
when you receive it, by the way.

On the other hand, while TLS is not at all sufficient for the integrity of the 
object, it is necessary to protect the individual accessing the object.  There 
are a number of countries where asking for the RFCs relating to privacy, 
security, and threats to such too many times could get you arrested.  Likewise, 
the presumption is the object might be signed, but it would be insane and 
useless to encrypt the object.  However, there are many, many times one would 
want the object encrypted, even if only to compress it.

Given that, the question should not be, "Why are we using TLS if the object is 
not private?," but "What are we not using secure connections for all IETF 
access, over any modality?"

One of the answers seems to be, "Because it sucks."  That is the sentiment of 
the message below.

So we are eating our dog food, and we are getting indigestion.  Sounds like an 
opportunity to fix it!

--
- Eric

On Aug 26, 2011, at 3:32 PM, Melinda Shore wrote:

> On 08/26/2011 11:22 AM, Adam Novak wrote:
>> For what reasons? Is it that things scheduled every year or every ten
>> years are easy for admins to miss? Or is it that it's hard to stay on
>> top of certificate revocations when they occur?
> 
> Firewall researchers have found at least one error of some sort in
> 99% (yes, really) of the firewall rulesets they've examined.  If
> I had to guess how many PKI deployments have problems, I'd put it in
> the same ballpark.  They seem to fall into several broad categories
> 1) naming (including SANs), 2) expiration, 3) faulty trust
> establishment.  These may or may not be fixable, but what doesn't
> appear to be fixable is that too people don't really understand what 
> certificates represent, the difference between a certificate and
> a key, or what it means to TLS-protect traffic.
> 
> Listen to Ned, Adam.  He's right.
> 
> Melinda
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf



smime.p7s
Description: S/MIME cryptographic signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Melinda Shore

On 08/26/2011 11:22 AM, Adam Novak wrote:

For what reasons? Is it that things scheduled every year or every ten
years are easy for admins to miss? Or is it that it's hard to stay on
top of certificate revocations when they occur?


Firewall researchers have found at least one error of some sort in
99% (yes, really) of the firewall rulesets they've examined.  If
I had to guess how many PKI deployments have problems, I'd put it in
the same ballpark.  They seem to fall into several broad categories
1) naming (including SANs), 2) expiration, 3) faulty trust
establishment.  These may or may not be fixable, but what doesn't
appear to be fixable is that too people don't really understand what 
certificates represent, the difference between a certificate and

a key, or what it means to TLS-protect traffic.

Listen to Ned, Adam.  He's right.

Melinda
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Keith Moore
On Aug 26, 2011, at 3:22 PM, Adam Novak wrote:

> On Fri, Aug 26, 2011 at 1:12 PM, Ned Freed  wrote:
>>> It ensures that what you're getting is the same as what the IETF has
>>> on file,
>> 
>> No, it really doesn't do that. There can be, and usually are, a lot of steps
>> involves besides the one https hop.
>> 
> 
> What other steps are there? HTTPS prevents what the web server sends
> from being tampered with on its way to the browser. If the web server
> storing the archives is itself trusted, this would seem to be all that
> is needed.

There can be web proxies on the front end (if the client is configured to use 
them) and the web server itself can be implemented in such a way as to retrieve 
content from other servers (via a number of means, e.g. NFS, CIFS, web services 
calls, sql calls).  Though I don't know whether the latter is the case for 
content served from IETF's servers.

Keith

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Adam Novak
On Fri, Aug 26, 2011 at 1:12 PM, Ned Freed  wrote:
>> It ensures that what you're getting is the same as what the IETF has
>> on file,
>
> No, it really doesn't do that. There can be, and usually are, a lot of steps
> involves besides the one https hop.
>

What other steps are there? HTTPS prevents what the web server sends
from being tampered with on its way to the browser. If the web server
storing the archives is itself trusted, this would seem to be all that
is needed.

Obviously HTTPS is not a solution to long-term preservation of the
integrity of the mailing list database itself. What protections, if
any, are currently in place to protect the archive from tampering on
IETF's end? Perhaps the whole thing should be signed by someone
official at regular intervals?

>
> I'm sorry, but the notion that the present use of https provides any
> sort of protection against this sort of thing is just silly. The simple
> facts that the archives are also available via regular http and that
> there is no stated policy about the availability of archives via https
> means the present setup is completely vulnerable to downgrade attacks.
>

A downgrade attack is certainly possible. But there are measures
available to ensure that, once an HTTPS connection has been
established once, future HTTP sessions will be rejected client-side.
And creating an official policy and going HTTPS-only could be done
relatively easily. If HTTPS everywhere is where the Web should be
going, then IETF should be leading the charge.

> 10+ years of experience with multiple certificates having multiple failures
> says this is, at best, a crapshoot.
>

For what reasons? Is it that things scheduled every year or every ten
years are easy for admins to miss? Or is it that it's hard to stay on
top of certificate revocations when they occur?
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread ned+ietf
> On Fri, Aug 26, 2011 at 11:14 AM,   wrote:
> >
> > +1. If you want signatures, do them properly. Don't pretend a transfer
> > protection mechanism covering exactly one hop provides real object security,
> > because it doesn't.
> >

> It ensures that what you're getting is the same as what the IETF has
> on file,

No, it really doesn't do that. There can be, and usually are, a lot of steps
involves besides the one https hop.

> and (assuming you trust the IETF's archive integrity, which
> is a separate problem)

On the contrary, it's the same problem. You're just pretending that solving an
insignificant subset of that problem is useful. It isn't.

> what everyone else on the list received.

This, OTOH, *is* a separate problem, one that isn't addressed in any way by
https on archive archive access. Nor does a signed archive address this issue.

Nonrepudiation of delivery is in fact a very difficult problem to solve - the
algorithms I'm aware of for it either involve a TTP or are exceptionaly ugly -
and the fact that the architecture of our email services isn't designed for it
doesn't exactly help. (In case you care, it's the nontransactional nature of
POP and IMAP that gets in the way of doing nonrepudiation of delivery at the
email protocol level.)

We're very lucky that we don't operate in a regime where this is actually a
requirement. (And such regimes do exist, although the solutions they actually
use tend to be hacks.)

> It
> seems to me it's more important to know that than to know that stuff
> sent to the list actually came from who it claims to come from. Does
> it really matter if a proposed standard wasn't really designed by who
> the archive says it was designed by?

And now you're talking about yet a third problem - nonrepudiation of
submission. It's completely doable, but only by significantly increasing the
barriers to participation by requiring signed messages. I don't believe the
benefits come even close to the costs.

> > And as for the "encrypt so the really secret stuff doesn't stand out" 
> > argument,
> > that's fine as long as it doesn't cause inconvenience to anyone. That's 
> > clearly
> > not the case here. And I'm sorry, the "mistakes were made" notion doesn't
> > really fly: Certificates aren't a "set it and forget it" thing, so if you
> > haven't noted expiration dates on someone's to-do list so they can be 
> > updated
> > before expiration, you're not doing it right.

> Yeah, it seems like the IETF would be on top of certificate
> expiration, having invented it. But I think having the encryption is a
> very good thing. Some government interests would be happy to keep
> information about some aspects of IETF business away from their
> citizenry, and have the resources to launch a MITM attack. (Of course,
> those governments may also have the resources to sign a fake
> certificate, but that is, again, a separate problem.)

I'm sorry, but the notion that the present use of https provides any
sort of protection against this sort of thing is just silly. The simple
facts that the archives are also available via regular http and that
there is no stated policy about the availability of archives via https
means the present setup is completely vulnerable to downgrade attacks.

Again, if you really care about this sort of stuff, the archives need to be
timestamped and signed. 

> Once the certificate expiration business is fixed, it should be fairly
> simple to make sure it's kept up to date so that this sort of thing
> doesn't happen again.

10+ years of experience with multiple certificates having multiple failures
says this is, at best, a crapshoot.

Ned
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Adam Novak
On Fri, Aug 26, 2011 at 1:13 PM, Hector Santos  wrote:
> Makes you wonder. Why is the concept of expiration required?  Did the IETF
> expire, die?  Did its value as an Organization go down and only valid on a
> year to year basis?

As I understand it, expiration is supposed to solve the problem of
someone getting their hands on your old certificates and impersonating
you. In order to impersonate you, not only do they have to get into
your system, they have to have done it in the last year or so.

It also keeps certificates for domains from outliving domain
registrations for too long. If you don't have the domain when you go
to renew the certificate, the CA shouldn't renew it.

I guess it also keeps revocation lists short. You only have to
remember that a certain certificate was compromised until it expires,
instead of forever.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Adam Novak
On Fri, Aug 26, 2011 at 11:14 AM,   wrote:
>
> +1. If you want signatures, do them properly. Don't pretend a transfer
> protection mechanism covering exactly one hop provides real object security,
> because it doesn't.
>

It ensures that what you're getting is the same as what the IETF has
on file, and (assuming you trust the IETF's archive integrity, which
is a separate problem) what everyone else on the list received. It
seems to me it's more important to know that than to know that stuff
sent to the list actually came from who it claims to come from. Does
it really matter if a proposed standard wasn't really designed by who
the archive says it was designed by?

> And as for the "encrypt so the really secret stuff doesn't stand out" 
> argument,
> that's fine as long as it doesn't cause inconvenience to anyone. That's 
> clearly
> not the case here. And I'm sorry, the "mistakes were made" notion doesn't
> really fly: Certificates aren't a "set it and forget it" thing, so if you
> haven't noted expiration dates on someone's to-do list so they can be updated
> before expiration, you're not doing it right.

Yeah, it seems like the IETF would be on top of certificate
expiration, having invented it. But I think having the encryption is a
very good thing. Some government interests would be happy to keep
information about some aspects of IETF business away from their
citizenry, and have the resources to launch a MITM attack. (Of course,
those governments may also have the resources to sign a fake
certificate, but that is, again, a separate problem.)

Once the certificate expiration business is fixed, it should be fairly
simple to make sure it's kept up to date so that this sort of thing
doesn't happen again.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread t.petch
- Original Message -
From: "Joel jaeggli" 
To: "t.petch" 
Cc: "IETF Discussion" 
Sent: Friday, August 26, 2011 4:44 PM
Subject: Re: https


> It doesn't...
>
> http://www.ietf.org/mail-archive/web/v6ops/current/maillist.html

Try the source of
http://www.ietf.org/list/discussion.html
where https: outumbers http: or
http://www.ietf.org/list/nonwg.html
where I run out of numbers before I run out of https:

Tom Petch


>
> On 8/26/11 00:18 , t.petch wrote:
> > Why does the IETF website consider it necessary to use TLS to access the
mailing
> > list archives, when they all appeared without it, or any other security, in
the
> > first place?
> >
> > Besides all the usual hassle of TLS, today the certificate is reported by IE
as
> > expired, which sort of sums it up.
> >
> > Tom Petch
> >
> > ___
> > Ietf mailing list
> > Ietf@ietf.org
> > https://www.ietf.org/mailman/listinfo/ietf
> >
>

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread ned+ietf


> --On Friday, August 26, 2011 09:43 -0400 Donald Eastlake
>  wrote:

> >> Yup, but why are we using https at all?  Who decided, and
> >> please would they undecide?  Unexpired certificates can be
> >> circumvented, but all too often, the https parts of the web
> >> site just do not work and, more importantly, I think it wrong
> >> to use industrial grade security where none is called for.
> >
> > The mail archives (and the minutes of the physical meetings)
> > are the official record of the Working Groups, IETF, etc.
> > Those archives should be available with a reasonably high
> > level of integrity and authenticity.

> Don,

> If that is the goal, wouldn't we be lots better off just
> digitally signing those things, just as we are gradually
> starting to create signatures for I-Ds, etc.?  Verifying that
> one is talking to the right server and that the content is not
> tampered with in transit is all well and good, but it doesn't
> protect against compromised documents or a compromised server at
> all.

+1. If you want signatures, do them properly. Don't pretend a transfer
protection mechanism covering exactly one hop provides real object security,
because it doesn't.

And as for the "encrypt so the really secret stuff doesn't stand out" argument,
that's fine as long as it doesn't cause inconvenience to anyone. That's clearly
not the case here. And I'm sorry, the "mistakes were made" notion doesn't
really fly: Certificates aren't a "set it and forget it" thing, so if you
haven't noted expiration dates on someone's to-do list so they can be updated
before expiration, you're not doing it right.

Ned
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Melinda Shore

On 8/26/11 5:43 AM, Donald Eastlake wrote:

The mail archives (and the minutes of the physical meetings) are the
official record of the Working Groups, IETF, etc. Those archives
should be available with a reasonably high level of integrity and
authenticity.


I'm not fully sold, but either way it seems to me that a technology
with such a very, very high error rate in deployment probably needs
some reconsideration.

Melinda
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Joel jaeggli
It doesn't...

http://www.ietf.org/mail-archive/web/v6ops/current/maillist.html

On 8/26/11 00:18 , t.petch wrote:
> Why does the IETF website consider it necessary to use TLS to access the 
> mailing
> list archives, when they all appeared without it, or any other security, in 
> the
> first place?
> 
> Besides all the usual hassle of TLS, today the certificate is reported by IE 
> as
> expired, which sort of sums it up.
> 
> Tom Petch
> 
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
> 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread John C Klensin


--On Friday, August 26, 2011 09:43 -0400 Donald Eastlake
 wrote:

>> Yup, but why are we using https at all?  Who decided, and
>> please would they undecide?  Unexpired certificates can be
>> circumvented, but all too often, the https parts of the web
>> site just do not work and, more importantly, I think it wrong
>> to use industrial grade security where none is called for.
> 
> The mail archives (and the minutes of the physical meetings)
> are the official record of the Working Groups, IETF, etc.
> Those archives should be available with a reasonably high
> level of integrity and authenticity.

Don,

If that is the goal, wouldn't we be lots better off just
digitally signing those things, just as we are gradually
starting to create signatures for I-Ds, etc.?  Verifying that
one is talking to the right server and that the content is not
tampered with in transit is all well and good, but it doesn't
protect against compromised documents or a compromised server at
all.

   john



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread t.petch

- Original Message -
From: "Donald Eastlake" 
To: "t.petch" 
Cc: "IETF Discussion" 
Sent: Friday, August 26, 2011 3:43 PM
On Fri, Aug 26, 2011 at 4:39 AM, t.petch  wrote:
> - Original Message -
> From: "SM" 
> To: "t.petch" 
> Cc: "IETF Discussion" 
>
>
>> Hi Tom,
>> At 00:18 26-08-2011, t.petch wrote:
>> >Besides all the usual hassle of TLS, today the certificate is
>> >reported by IE as
>> >expired, which sort of sums it up.
>>
>> Already reported to ietf-action@.
>>
>> Regards,
>> -sm
>>
>> P.S. My experience of ietf-action@ is that they are responsive and do
>> fix problems that are reported.
>
> Yup, but why are we using https at all? Who decided, and please would they
> undecide? Unexpired certificates can be circumvented, but all too often, the
> https parts of the web site just do not work and, more importantly, I think it
> wrong to use industrial grade security where none is called for.

The mail archives (and the minutes of the physical meetings) are the
official record of the Working Groups, IETF, etc. Those archives
should be available with a reasonably high level of integrity and
authenticity.


Ys but for the mail archives they provide authenticity and integrity only as
far as the Man In The Middle, namely the IETF server/process; this adds a
spurious, to me, impression of security for e-mails that could have come from
anyone masquerading as anyone.  And when there is some defence against
masquerade - DKIM (and yes I know what it does and its limitations) - then the
DKIM signature is invalidated by the list process, that MITM again.

If there are requirements for archives to be provided with a degree of trust, eg
in response to a subpoena, then that should be a separate process, leaving us
ordinary folk to access them in a simple and straighforward manner.

Tom Petch







Thanks,
Donald
=
Donald E. Eastlake 3rd +1-508-333-2270 (cell)
155 Beaver Street, Milford, MA 01757 USA
d3e...@gmail.com

> Tom Petch
>
>
>>
>
> _______
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
>

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Tim Bray
I'm increasingly coming to think that *everything* should be done with
TLS unless you can prove it's harmful.  Call me paranoid, but given
the general state of the world, secure-by-default seems like the way
to go.  -Tim

On Fri, Aug 26, 2011 at 1:39 AM, t.petch  wrote:
> - Original Message -
> From: "SM" 
> To: "t.petch" 
> Cc: "IETF Discussion" 
> Subject: Re: https
>
>
>> Hi Tom,
>> At 00:18 26-08-2011, t.petch wrote:
>> >Besides all the usual hassle of TLS, today the certificate is
>> >reported by IE as
>> >expired, which sort of sums it up.
>>
>> Already reported to ietf-action@.
>>
>> Regards,
>> -sm
>>
>> P.S. My experience of ietf-action@ is that they are responsive and do
>> fix problems that are reported.
>
> Yup, but why are we using https at all?  Who decided, and please would they
> undecide?  Unexpired certificates can be circumvented, but all too often, the
> https parts of the web site just do not work and, more importantly, I think it
> wrong to use industrial grade security where none is called for.
>
> Tom Petch
>
>
>>
>
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
>
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Donald Eastlake
On Fri, Aug 26, 2011 at 4:39 AM, t.petch  wrote:
> - Original Message -
> From: "SM" 
> To: "t.petch" 
> Cc: "IETF Discussion" 
> Subject: Re: https
>
>
>> Hi Tom,
>> At 00:18 26-08-2011, t.petch wrote:
>> >Besides all the usual hassle of TLS, today the certificate is
>> >reported by IE as
>> >expired, which sort of sums it up.
>>
>> Already reported to ietf-action@.
>>
>> Regards,
>> -sm
>>
>> P.S. My experience of ietf-action@ is that they are responsive and do
>> fix problems that are reported.
>
> Yup, but why are we using https at all?  Who decided, and please would they
> undecide?  Unexpired certificates can be circumvented, but all too often, the
> https parts of the web site just do not work and, more importantly, I think it
> wrong to use industrial grade security where none is called for.

The mail archives (and the minutes of the physical meetings) are the
official record of the Working Groups, IETF, etc. Those archives
should be available with a reasonably high level of integrity and
authenticity.

Thanks,
Donald
=
 Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
 155 Beaver Street, Milford, MA 01757 USA
 d3e...@gmail.com

> Tom Petch
>
>
>>
>
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
>
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Eric Burger
+100

On Aug 26, 2011, at 6:50 AM, Scott Schmit wrote:

> On Fri, Aug 26, 2011 at 09:18:41AM +0200, t.petch wrote:
>> Why does the IETF website consider it necessary to use TLS to access
>> the mailing list archives, when they all appeared without it, or any
>> other security, in the first place?
> 
> TLS provides more than confidentiality--it also provides authenticity.
> If I were living in a hostile regime, I'd appreciate knowing that the
> RFCs, etc that I'm getting really come from the IETF unmodified.
> 
> Also, as a general principle, I'd rather someone not be able to read
> over my shoulder, even if it is harmless stuff. Using encryption only
> when I need it makes all of my encrypted traffic less secure.
> 
> For example, if I were out to modify the traffic you read to make sure
> that you didn't even know that a working group existed, I'd have a lot
> easier time of it if you use DNS without DNSSEC, HTTP without TLS, TLS
> without HASTLS, DANE, HSTS, etc. Now, not all of that is completed
> protocol work, but one step at a time.
> 
>> Besides all the usual hassle of TLS, today the certificate is reported
>> by IE as expired, which sort of sums it up.
> 
> Mistakes happen. Hopefully lessons are learned so that they don't get
> repeated.
> 
> If it's a protocol problem, whose fault is that but ours?
> 
> -- 
> Scott Schmit
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf



smime.p7s
Description: S/MIME cryptographic signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Thomas Narten
"t.petch"  writes:

> Why does the IETF website consider it necessary to use TLS to access
> the mailing list archives, when they all appeared without it, or any
> other security, in the first place?

Archives have long been and continue to be available at
ftp://ftp.ietf.org/ietf-mail-archive/

Thomas
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Scott Schmit
On Fri, Aug 26, 2011 at 09:18:41AM +0200, t.petch wrote:
> Why does the IETF website consider it necessary to use TLS to access
> the mailing list archives, when they all appeared without it, or any
> other security, in the first place?

TLS provides more than confidentiality--it also provides authenticity.
If I were living in a hostile regime, I'd appreciate knowing that the
RFCs, etc that I'm getting really come from the IETF unmodified.

Also, as a general principle, I'd rather someone not be able to read
over my shoulder, even if it is harmless stuff. Using encryption only
when I need it makes all of my encrypted traffic less secure.

For example, if I were out to modify the traffic you read to make sure
that you didn't even know that a working group existed, I'd have a lot
easier time of it if you use DNS without DNSSEC, HTTP without TLS, TLS
without HASTLS, DANE, HSTS, etc. Now, not all of that is completed
protocol work, but one step at a time.

> Besides all the usual hassle of TLS, today the certificate is reported
> by IE as expired, which sort of sums it up.

Mistakes happen. Hopefully lessons are learned so that they don't get
repeated.

If it's a protocol problem, whose fault is that but ours?

-- 
Scott Schmit
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Eliot Lear

Bert, Tom,


I don't see this as being a matter of encrypting, but rather providing
verifiable information the community.  What's more, in as much as the
IETF is a trusted site by many, it's probably a good idea to have at
least some confidence that when you click on a link, you're not going to
get hacked.  Finally, the IETF designed this system, and if we don't
like the fragility, perhaps we should fix it.  There's a saying about
eating one's own dogfood.  After all, if we won't eat ours, why should
anyone else?

By the way, Tom, you're not quite right.  Mail sent out from the IETF
list (including this one and the one you sent to the list) is signed by
the IETF with DKIM.  Again, eating our own dogfood.

Eliot
_______
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread Bert Wijnen (IETF)

Yup, but why are we using https at all?  Who decided, and please would they
undecide?  Unexpired certificates can be circumvented, but all too often, the
https parts of the web site just do not work and, more importantly, I think it
wrong to use industrial grade security where none is called for.



I agree with Tom here. In my understanding, all IETF communications
and (mailing list) discussions are open and public.
So why do we need to protect/encrypt?

I would say: protect what must be protected
  but don't protect what is not supposed to be protected.

just encrypting everything seems incorrect to me.

Bert


Tom Petch


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread t.petch
- Original Message -
From: "SM" 
To: "t.petch" 
Cc: "IETF Discussion" 
Subject: Re: https


> Hi Tom,
> At 00:18 26-08-2011, t.petch wrote:
> >Besides all the usual hassle of TLS, today the certificate is
> >reported by IE as
> >expired, which sort of sums it up.
>
> Already reported to ietf-action@.
>
> Regards,
> -sm
>
> P.S. My experience of ietf-action@ is that they are responsive and do
> fix problems that are reported.

Yup, but why are we using https at all?  Who decided, and please would they
undecide?  Unexpired certificates can be circumvented, but all too often, the
https parts of the web site just do not work and, more importantly, I think it
wrong to use industrial grade security where none is called for.

Tom Petch


>

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: https

2011-08-26 Thread SM

Hi Tom,
At 00:18 26-08-2011, t.petch wrote:
Besides all the usual hassle of TLS, today the certificate is 
reported by IE as

expired, which sort of sums it up.


Already reported to ietf-action@.

Regards,
-sm

P.S. My experience of ietf-action@ is that they are responsive and do 
fix problems that are reported. 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


https

2011-08-26 Thread t.petch
Why does the IETF website consider it necessary to use TLS to access the mailing
list archives, when they all appeared without it, or any other security, in the
first place?

Besides all the usual hassle of TLS, today the certificate is reported by IE as
expired, which sort of sums it up.

Tom Petch

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Request about: https://datatracker.ietf.org/ipr/1026/

2009-02-09 Thread Paul O'Malley - gnu's not unix -

To whom it may concern,

This is about:
"Transport Layer Security (TLS) Authorization Extensions"
(draft-housley-tls-authz-extns-07)

Patent information: 11/234,404 ; 60/646,749 ; PCT/US2006/001342

Which can be found by reading the document: 
https://datatracker.ietf.org/ipr/1026/
The section where RedPhone Security asserts that the protocol would hold 
nothing that infringes the patent, they then say that there are four 
ways to do business with this protocol, and implementing these methods 
would infringe what they call their IPR.


Then they go on to state:

"RedPhone Security agrees to grant licenses for such uses in a fair and 
nondiscriminatory manner. This statement applies to the Disclosed Patent 
Information, including all amendments in all nations as published during 
the course of prosecution."


This statement says "you now need licences to make the internet work".

This is an attempt to put a toll booth on an onramp to the internet, 
even if this toll booth is cashless it would be unforgivable to allow 
such a construction. Precedence as we all know is a bad thing, and this 
would be a really bad case of it the start of the closing of the highway 
that is the internet.


Therefore I strongly recommend that this draft be dropped until such 
time as RedPhone Agrees to allow a complete and free use of any works 
they feel they can lay claim to in the implementation of this protocol 
where the methods of authentication against violate their IPR.


The only offer that would be acceptable would be for RedPhone security 
to grant all parties involved a full and free use of any of their IP 
that is associated with this protocol.


If you wish to run a sanity test why not ask "What would Jon Postel have 
said in this case?".



Regards,

Paul O'Malley
_______
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf