On 02/16/2012 11:18 AM, Phillip Hallam-Baker wrote:
> All that I have seen proposed in this regard is to have a draft that states:
> 
> 1) This is a really bad idea in general
> 2) If you really have to do it then do it this way
> 2a) It is turned off by default
> 2b) It only permits the authorized MITM to intercept
> 2c) The user is repeatedly warned that MITM is taking place
> 2d) There is no way that any credentials or infrastructure created for
> authorized intercept can be used to support unauthorized intercept

eh?  it seems you're proposing a new mechanism, when Tom just pointed
out that the existing mechanism (endpoint-controlled trust policy)
already works for nearly every case.  (the exceptions being client-side
certs, and the hassle for IT staff of having to configure trust stores
on each client)

> I would rather have a defined path for this than to see another
> iteration where the primary goal is to minimize the effort required
> for the IT staff deploying the system.

IT staff already have a simple way to do this: embed a MITM-enabling
root authority (or comparable mechanism) in the client's trust policy.

Who exactly is trying to "minimize the effort required for the IT staff"
to deploy a MITM?

I can't believe that on a list titled "the right key" the majority of
the debate seems to be around whether we want a spec that enables
transparent MITMing or a spec that enables user-visible MITMing.  Which
part of "the right key" does any sort of MITM fit into?

The main argument seems to be "people need to do this for legal reasons"
-- well, ok, let's have someone with a legal requirement for
eavesdropping/monitoring step forward and propose an external,
session-key-sharing mechanism that is *separate* from TLS.  Then IT
staff can deploy such a system on the clients they're required to monitor.

If someone has a legal requirement to not only snoop but to alter
traffic in flight beyond just terminating a session (i find this
implausible, but what do i know), this can also be proposed as a
separate mechanism, outside of TLS, or as a TLS extension.  I don't see
how it's appropriate for this list, though.

Can we get back to discussing how to get the actual "right key" for the
network peer?

        --dkg
_______________________________________________
therightkey mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to