Peter,

Eric makes here some valid points and I would like to repeat some well known
issues (forgive the repetition) of what intercept means to your network,
even if the facilities are presumably(!) well protected (how about bad
insiders?):

* Shopping is not safe if there is intercept
* Banking is not safe if there is intercept
* B-B financial transactions are not safe if there is intercept
* Private communications are not safe if there is intercept
* Private habits are not safe if there is intercept

But:

* Stalkers, extortionists, kidnappers and other criminals can get you
* Injured consumers and businesses can sue your pants off
* You break the privacy laws in the EU, US and elsewhere
* Someone may or will go to jail for the above and/or
Your network goes out of business for economic and legal reasons.

User will just avoid networks known or even only suspected of having
intercept.

Feel free to discuss these costs with your business development and legal
folks and make a return on investment analysis.

Much success!

Henry


On 9/25/08 4:28 PM, "Eric Burger" <[EMAIL PROTECTED]> wrote:

> Let us try it another way:
> 
> In the U.S., we have a strong regime of lawful intercept, that
> includes the courts for wiretap orders and multiple, independent keys
> required to do the wiretap.
> 
> With all of this protocol and legal protections...
> 
> Most of the carriers executed unlawful intercept. Our answer was to
> give them blanket immunity.
> 
> Do not be surprised if soon it will be illegal to use cryptographic
> means to secure communications.
> 
> Thus...
> Unless you have a written directive to ensure insecure communications,
> this model is hopelessly broken.
> 
> (signed with my cryptographic signature, if only so you can detect
> integrity degradation)
> 
> On Sep 25, 2008, at 1:51 PM, Schneider, Peter (NSN - DE/Munich) wrote:
> 
>> See inline
>> 
>> Peter
>> 
>>> -----Ursprüngliche Nachricht-----
>>> Von: ext Dean Willis [mailto:[EMAIL PROTECTED]
>>> Gesendet: Donnerstag, 25. September 2008 21:32
>>> An: Schneider, Peter (NSN - DE/Munich)
>>> Cc: [email protected]
>>> Betreff: Re: [Sip] Pub request for
>>> draft-ietf-sip-dtls-srtp-framework-03
>>> 
>>> 
>>> On Sep 25, 2008, at 2:50 AM, Schneider, Peter (NSN - DE/Munich)
>>> wrote:
>>>> 
>>>> Dean, I assume that you refer to the proposal to use SDES that is
>>>> discussed in 3GPP. However, 3GPP does not focus on that approach.
>>>> Other signaling path solutions are discussed in 3GPP that exclude
>>>> all intermediaries from access to the key. Clearly,
>>> allowing lawful
>>>> interception is a requirement for 3GPP, as is preventing "unlawful
>>>> interception".
>>> 
>>> The two forms of interception cannot be technically differentiated.
>>> Anything that allows one allows the other.
>>> 
>> Allowing lawful interception does not imply allowing anyone to
>> intercept the communication. You must have access control for the
>> facilities that allow lawful interception. Compare this with the
>> authentication service described in RFC4474 (SIP identity). Who
>> controls that service, can mount a man in the middle attack that
>> cannot be detected by the means provided by DTLS-SRTP.
>> 
>>> The USA has recently shown that it is possible to convert unlawful
>>> intercept into lawful intercept retroactively, despite a
>>> constitutional bar on ex post facto laws. If you're going to
>>> break one
>>> law, you might as well break 'em all, right?
>>> 
>>>> The middlebox issue is NOT a pretense for allowing only weak
>>>> solutions for 3GPP.
>>> 
>>> I believe you.
>>> 
>>>> My proposals concerning the framework draft wouldn't make
>>> DTLS-SRTP
>>>> any weaker, right?
>>> 
>>> I'm not sure. Security is such a frail thing, and it is easy for
>>> unintended consequences to occur. You may well be right, but I'm a
>>> little slow to commit.  Further study is required.
>>> 
>>>> And making DTLS-SRTP more adequate for 3GPP/TISPAN scenarios would
>>>> be a good thing, wouldn't it?
>>> 
>>> It might, it might not. It depends on what your definition of
>>> "adequate" entails and which scenarios you are talking about. The
>>> requirements rejected by the IETF during the Media Security
>>> Requirements drafting arguably provide a proof case against this
>>> assertion.
>>> 
>> Well, making DTLS-SRTP more adequate for 3GPP/TISPAN scenarios
>> (excluding lawful interception) without making it weaker would be a
>> good thing - better now?
>> 
>>> --
>>> Dean
>>> 
>> _______________________________________________
>> Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
>> This list is for NEW development of the core SIP Protocol
>> Use [EMAIL PROTECTED] for questions on current sip
>> Use [EMAIL PROTECTED] for new developments on the application of sip
> 
> _______________________________________________
> Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
> This list is for NEW development of the core SIP Protocol
> Use [EMAIL PROTECTED] for questions on current sip
> Use [EMAIL PROTECTED] for new developments on the application of sip

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to