On 9/2/15, Paul Vixie <p...@redbarn.org> wrote: > > > John R Levine wrote: >> ... >> >> Tor is one approach to query security that seems to work pretty well >> give or take side channel leakage. Dunno if there are any others, but >> it is clearly a very hard problem, and not one we're going to solve >> any time soon. > > i think we have to be realistic. the national security apparatus of the > largest dozen economies have effectively unlimited resources. they will > spend as many of our tax dollars as it takes to buy as much equipment > and talent and methodology and electric power as it takes to watch what > they decide is important to watch.
What of the national security apparatus of the rest of the countries of the world? Or the criminal cops buying HackingTeam software? Or perhaps a teenager with tcpdump? Until the invention of quantum computers, we can protect data from being instantly available to most of these groups most of the time. Right now, we're not doing any such thing and in fact it is the opposite: we're failing to protect data from all of these groups, all of the time. I do agree though - we have to watch out for people that they try to buy. There is easy no technical solution to dealing with people who stop protections from being deployed. We know the NSA sends people to the IETF and specifically to make protocols easier to intercept and exploit. One might guess that other services do similar things. How might we find such people? How might we ensure that they stop harming users? I think we won't and so rather we should finding flaws which benefit such an adversary and fix them. > > i'm all for PFS on the cache miss path Could you identify all of the parties involved, what they do and which ones in your view should have privacy? It sounds like you want to support certain kinds of end user privacy. I'm extremely curious to hear a specific proposal of who deserves and who doesn't deserve privacy. My outline is as follows: everyone and every system should have security and privacy in the form of forward-secret authenticated cryptography, all of the time, enabled by default. Ideally we should design the link level protocols to look identical and to ensure that selector based surveillance is ineffective for any data relating to DNS inside of the encrypted protocol. Thus I expect a sniffer may see that it is encrypted DNS traffic but will be limited to that as an XKeyscore AppID. The others selectors available will be IP, port and other metadata leaked by the TCP/IP protocol itself. > but trying to hide who the query > came from so that an authority server has less insight, is nutball > stuff. I disagree and strongly. We need protocols that compose with other protocols. This needs to be one of the design goals. It won't happen over night. I already have this property when I use Tor with some other software - shouldn't everyone else have it too? > remember that the NSA (et al) is a form of "us" and that we will > not stop "us" with math. real change there will come in the voting booth. With the utmost respect, I believe your theory of change lacks evidence and flies in the face of what we've seen in practice. We've found that the math is the main thing that changes the economics of mass surveillance. Power, space and cooling are the other major factors. Agencies that tap fiber already *break* laws or the laws are written to ensure that non-US persons aren't considered as people. While I support a limited view of your theory of change in small pockets of the world, I believe that no matter how you or I vote - the fact remains: the BND, the PLA or the FSB won't care about your or my American vote, likewise with nearly every other country in the world we'll get what technology ensures for us. We need to step up our game and the zeroth step is to recognize that we need to change the technical and the political situation at the same time. Deploying forward secret tech is what is currently lacking for most protocols. In DNS the situation is worse. There is political will in many countries around the world but change stops when the technology isn't up to the task. Pervasive monitoring as discussed in RFC 7258 is an attack. DNS currently fails on a technical level to address this kind of attack. All the best, Jacob _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop