Re: [TLS] Working Group Last Call for SSLKEYLOG File

2024-03-13 Thread Yaakov Stein
This document does a good job of documenting current practice,
and hence I support
(and my thanks to Martin for addressing an issue I communicated to him
off-list).

I think that timestamping and/or autosegmenting entries in the file format
would be a useful extension
(current implementations, such as Wireshark, need to linearly search
through potentially large SSLKEYLOG files).

Y(J)S (usually just lurking on this list)
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Adoption Call for draft-davidben-tls-key-share-prediction

2024-05-05 Thread Yaakov Stein
I support adoption of this document.

Y(J)S
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS]Re: I-D Action: draft-ietf-tls-svcb-ech-04.txt

2024-08-21 Thread Yaakov Stein
Bootstrapping is REALLY not appropriate, since this is not TLS with ECH 
enabling itself,
but rather a DNS mechanism enabling ECH.

But the document is ready for LC.

Y(J)S


-Original Message-
From: Salz, Rich 
Sent: Tuesday, August 20, 2024 8:00 PM
To: tls@ietf.org
Subject: [TLS]Re: I-D Action: draft-ietf-tls-svcb-ech-04.txt


I read the document [1].  I think it's ready for WGLC. I suggest one change. I 
find the use of "bootstrapping" in the title misleading.  I suggest "Enabling 
TLS Encrypted ClientHello via DNS Service Bindings."

[1] https://datatracker.ietf.org/doc/draft-ietf-tls-svcb-ech/


___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org
CAUTION: This email originated from outside the organization. Do not follow 
guidance, click links or open attachments unless you recognize the sender and 
know the content is safe.
This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: [EXTERNAL] Re: 2nd Working Group Last Call for The SSLKEYLOGFILE Formatfor TLS

2025-02-25 Thread Yaakov Stein
All,

I fully support standardizing the SSLKEYLOGFILE Format.

While it is a debugging tool, that doesn’t mean it doesn’t have to be 
standardized.

Where I work we maintain a large set of protocol analysis tools
used to verify correct operation of various programs, and document variant 
behaviors.
This often requires visibility into the internal operation of various browsers 
and apps.
So, while it is fine for some company’s program to output arbitrary debug files 
for their own development,
this wouldn’t enable others to understand these files.

The documentation really doesn’t have to be produced by the IETF,
as long as everyone abides by it.
But I don’t know of anywhere else with broad enough remit
to mandate a behavior for all applications using TLS.

Y(J)S

From: Aaron Zauner 
Sent: Tuesday, February 25, 2025 12:27 AM
To: Martin Thomson 
Cc: Bellebaum, Thomas ; tls@ietf.org
Subject: [EXTERNAL] [TLS] Re: 2nd Working Group Last Call for The SSLKEYLOGFILE 
Formatfor TLS

Hey,

On Mon 24. Feb 2025 at 22:54, Martin Thomson 
mailto:m...@lowentropy.net>> wrote:
On Tue, Feb 25, 2025, at 06:56, Aaron Zauner wrote:
> To be clear; I agree with that in principle but have the feeling that
> the discussion around an applicable threat model misses the issue of
> what should be in IETF and what should be in development docs,
> debugging tools etc entirely. I'm not currently working on maintaining
> a crypto lib as many of you are but you can't honestly tell me it's not
> possible to work on your end without IETF guidance on debug specifics
> that allow encrypted traffic detail export -- which you already have in
> place for debug and dev anyway.

This also misses the point.  The existence of this format (it will exist 
whether the IETF publishes a document or not) has enabled interoperation 
between a number of tools.  The point of moving this work to the IETF was to 
transfer governance from what was ad hoc to something recognized and respected 
by the community of people who build the interoperating tools.

Some people view interoperable standards as somehow changing the demand and 
availability of the thing they document.  Maybe that's true in some markets, 
but my experience is that the demand is what causes the creation of standards, 
not the other way around.  Also, if there were not already interoperation and 
you were concerned that interoperation would cause problems, this might be 
problematic, but this is a case where that interoperation already exists

I understand your point and just like config formats I see why you'd want to 
have a published document. But just like with configs it's part of the local 
tool chain and not a wire format. Open source projects have been able to work 
with them and use them without involving IETF. I'm just not sure this is the 
right place for the document. You've done the work and documentation anyway 
already, and you're interoperable. What do you really gain by having this in 
IETF? It's also a fringe topic; With that I mean in this case that it's debug 
specific to a few projects related to TLS and while this is the TLS WG it's 
still a tooling issue in my estimate. I'm really not sure what the big upside 
is of having it published here. A lot of chrome, openssl and other tool chain 
specifics are likewise only documented in the relevant project documents and it 
works fine for everyone involved; Is there any precedent that showed we need 
this in IETF - ie. where interop and debugging didn't work out because you 
couldn't already agree on a format and document it? Because it seems to me the 
community has already achieved all of this due to your and other people's 
contribution without adding it as an IETF doc.

Thanks,
Aaron



This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: [EXTERNAL] Re: WG Adoption Call for ML-KEM Post-Quantum Key Agreement for TLS 1.3

2025-04-03 Thread Yaakov Stein
> Even with Recommended=N, I can imagine many managers reacting to a 
> presentation on "YOU NEED TO USE PQC LIKE ML-KEM BECAUSE ELSE..." by googling 
> "deploy ML-KEM now" and being recommended this rather than a safer hybrid[1]. 
> I am not convinced that such a person, if given more knowledge, "doesn't want 
> to do that".
> [1] After all, the manager was told to deploy MLKEM, not this suspicious 
> X25519MLKEM, whatever scam that must surely be.


Really?

I asked ChatGPT "Should I use MLKEM alone or a hybrid ECC + PQC combination?" 
and received the following balanced reply:


The decision between using ML-KEM (Kyber) alone or a hybrid ECC + PQC 
combination depends on your specific security and performance requirements.

Considerations for Each Approach:

ML-KEM (Kyber) Alone
✅ Pros:

Post-quantum security: ML-KEM (Kyber) is designed to resist quantum attacks, 
unlike ECC.

Simpler implementation: Using just one algorithm reduces complexity.

More future-proof: ECC could become obsolete when quantum computers become 
practical.

❌ Cons:

Less tested in the real world: Though NIST has standardized Kyber, it's still 
relatively new compared to ECC.

Potential hidden vulnerabilities: Post-quantum cryptography (PQC) is evolving, 
and new attacks might emerge.



Hybrid ECC + PQC Combination
✅ Pros:

Strongest security option: If ML-KEM is broken, ECC still provides security 
(and vice versa).

Defense in depth: Combining a well-established (ECC) and a new (PQC) algorithm 
increases resilience.

Better interoperability: Many current systems still rely on ECC.

❌ Cons:

More computationally expensive: Hybrid approaches increase handshake size and 
latency.

Complexity in implementation: Managing two key exchanges means additional 
attack vectors if not handled properly.


Which Should You Choose?
If you need maximum security and don’t mind extra computational costs, go for 
hybrid ECC + ML-KEM.

If you prefer a simpler, efficient, and future-proof approach, ML-KEM alone is 
a strong choice.

If your system needs to work with existing ECC-based infrastructures while 
transitioning to PQC, hybrid makes sense.


💡 Current Best Practice: Many organizations (e.g., Cloudflare, AWS) are using 
hybrid modes during the transition to fully post-quantum cryptography. If 
you’re designing a system today, hybrid is the safer option for now.


Y(J)S


This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: WG Adoption Call for ML-KEM Post-Quantum Key Agreement for TLS 1.3

2025-04-02 Thread Yaakov Stein
I support adoption of pure PQC KEMs drafts with Intended status: Informational
(meaning that the IETF is not recommending using).

Any IPR that can be asserted against Kyber can be asserted against already 
adopted hybrid methods incorporating Kyber.
If anything, one may attempt to argue that hybrids do not implement NIST's 
MLKEM scheme
and are thus not covered by the NIST licenses.

Y(J)S

-Original Message-
From: Sean Turner 
Sent: Tuesday, April 1, 2025 8:58 AM
To: TLS List 
Subject: [TLS] WG Adoption Call for ML-KEM Post-Quantum Key Agreement for TLS 
1.3

We are continuing with our pre-announced tranche of WG adoption calls; see [0] 
for more information. This time we are issuing a WG adoption call for the 
ML-KEM Post-Quantum Key Agreement for TLS 1.3 I-D [1]. If you support adoption 
and are willing to review and contribute text, please send a message to the 
list. If you do not support adoption of this draft, please send a message to 
the list and indicate why. This call will close at 2359 UTC on 15 April 2025.

In response to other WG adoption calls, Dan Bernstein pointed out some 
potential IPR (see [2]), but no IPR disclosure has been made in accordance with 
BCP 79.  Additional information is provided here; see [3].

BCP 79 makes this important point:

  (b) The IETF, following normal processes, can decide to use
technology for which IPR disclosures have been made if it decides
that such a use is warranted.

WG members can take this information into account during this adoption call to 
determine if we should adopt these drafts.

Reminder:  This call for adoption has nothing to do with picking the 
mandatory-to-implement cipher suites in TLS.

Cheers,
Joe and Sean

[0] https://mailarchive.ietf.org/arch/msg/tls/KMOTm_lE5OIAKG8_chDlRKuav7c/
[1] https://datatracker.ietf.org/doc/draft-connolly-tls-mlkem-key-agreement/
[2] https://mailarchive.ietf.org/arch/msg/tls/mt4_p95NZv8duZIJvJPdZV90-ZU/
[3] https://mailarchive.ietf.org/arch/msg/spasm/GKFhHfBeCgf8hQQvhUcyOJ6M-kI/

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org
This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: FW: New Version Notification for draft-stein-tls-ech-considered-harmful-00.txt

2025-07-03 Thread Yaakov Stein
Just to be clear, I didn't say that ECH is a kind of phishing.
What I said was that DGA and ECH share a common goal of hiding malicious 
traffic.

As to RFC8744, I don't see any consensus on desirability there.
What I see is an informational RFC explaining the history of SNI,
the fact that it has been used for reasons other than its original intent,
explanations for rejecting many ill-advised SNI encryption proposals
(omitting the current one that was not yet on the table),
and ending with the correct statement
"Replacing cleartext SNI transmission by an encrypted variant will break
 or reduce the efficacy of the operational practices and techniques implemented 
in middleboxes".

In fact, other than the vague statements that SNI is PROBABLY included in 
metadata collection by pervasive surveillance actors,
and that encrypted SNI helps thwart unanticipated (but not necessarily 
negative) usages
I don't see any explanation, let alone consensus.

Y(J)S


-Original Message-
From: Stephen Farrell 
Sent: Thursday, July 3, 2025 4:57 PM
To: Yaakov Stein ;  
Subject: Re: [TLS] FW: New Version Notification for 
draft-stein-tls-ech-considered-harmful-00.txt



On 03/07/2025 14:51, Yaakov Stein wrote:
> Stephen,
>
> ECH is not yet another confidentiality feature.

We disagree.

> TLS already provides perfectly good user content confidentiality.

The IETF reached consensus on the desirability of this back in
2020 via RFC8744.

> ECH is more akin to DNS tunneling or phishing based on domain names that look 
> correct.

Phishing? That's quite the stretch - so much so I think it quite breaks your 
argument;-)

> It is yet another method of hiding malicious traffic.

ECH and TLS has nothing to say about whether traffic is good or bad.

As I said, I think this is just regurgitating old arguments, so I don't plan to 
continue arguing, unless/until I see something new, which (other than a claim 
that ECH==phishing;-), I've not.

Cheers,
S.


>
> Y(J)S
>
> -Original Message-----
> From: Stephen Farrell 
> Sent: Thursday, July 3, 2025 4:24 PM
> To: Yaakov Stein ;  
> Subject: Re: [TLS] FW: New Version Notification for
> draft-stein-tls-ech-considered-harmful-00.txt
>
>
> Hiya,
>
> On 02/07/2025 15:43, Yaakov Stein wrote:
>> Just in case anyone missed this ...
>
> I see nothing new or noteworthy in the text. It's the same set of arguments 
> emitted whenever there's the prospect that some new protocol confidentiality 
> feature looks like it may get to be widely deployed.
>
> It mostly reminds me of a meeting I was at where (mobile) telcos
> (loudly:-) predicted the sky would fall because youtube had turned on https. 
> The sky didn't fall.
>
> Cheers,
> S.
>
> This message is intended only for the designated recipient(s). It may contain 
> confidential or proprietary information. If you are not the designated 
> recipient, you may not review, copy or distribute this message. If you have 
> mistakenly received this message, please notify the sender by a reply e-mail 
> and delete this message. Thank you.

This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: [EXTERNAL] Re: New Version Notification for draft-stein-tls-ech-considered-harmful-00.txt

2025-07-07 Thread Yaakov Stein
Watson,


  *   Your document argues that ECH isn't good because it simultaneously can be 
defeated by flow behavior classification and that it defeats flow based 
allocation required for QoS. These can't both be right.

Not what I said. I said that 90% of the flows (the common and in general benign 
ones) can be identified.
The rare applications/sites (which are more likely to be malicious) can not.
So, we are OK from the QoS point of view, but at a higher (monetary and 
ecological) cost.
We are not OK regarding security.


  *   Furthermore, the flow based enforcement isn't actually for QoS: we have 
lots of technologies for sharing these streams in a good manner and bounding 
delay now.

I am not sure what you are saying. I interpret it as no-one uses DPI for 
applying QoE-related policy, which is simply not true.


  *   And if you understood the Internet architecture the network isn't 
supposed to provide these kinds of services.
In a perfect end-to-end-principle world this would be correct and there would 
be n middleboxes.
We do not live in such a world.
And in such a world the network can’t prioritize under congestion, and 
malicious packets are never blocked.


  *   The IETF cannot guarantee product categories remain useful just because 
forever.
So, IETF WGs shouldn’t carefully consider unintended effects of protocol 
changes ?

Y(J)S
This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: [EXTERNAL] Re: I-D Action: draft-ietf-tls-wkech-08.txt

2025-07-08 Thread Yaakov Stein
Stephen,

Small nit regarding the definition :
Zone factory (ZF):  an entity that has write-access to the DNS
and similar text in the intro.

First, it leaves unclear what THE DNS means (although clear from later on that 
you are talking about the authoritative DNS server)
and so you mean write access to the authoritative DNS server's zone files or 
zone database (or "binding data" if you prefer).
So, something l like
   Zone factory (ZF):  an entity that has write-access to the authoritative DNS 
server zone database.

In addition, I am not sure that the ZF really needs real "write access".
Later on you use the term "publish" as in
   ZF publishes new HTTPS RR
which implies a separate ZF entity with a pub/sub interface
in which case the ZF has no "write access" to the DNS internals,
it merely publishes information that the DNS server can decide to consume.

Y(J)S



-Original Message-
From: Stephen Farrell 
Sent: Monday, July 7, 2025 7:04 PM
To: tls@ietf.org
Subject: [EXTERNAL] [TLS] Re: I-D Action: draft-ietf-tls-wkech-08.txt

External Email: Be cautious do not click links or open attachments unless you 
recognize the sender and know the content is safe

Hiya,

I figure this one's about ready for WGLC so if given the chance to present it 
in Madrid, asking for that'd be the last slide:-)

As the chairs prefer, that could be started before, during or after Madrid.

Cheers,
S.

PS: Not sure if a pressie in Madrid is needed, as the changes since -07 are 
modest, though not entirely trivial, so happy to do a pressie, or to just ask 
for WGLC and see if that causes any upset:-)

On 07/07/2025 16:44, internet-dra...@ietf.org wrote:
> Internet-Draft draft-ietf-tls-wkech-08.txt is now available. It is a
> work item of the Transport Layer Security (TLS) WG of the IETF.
>
> Title:   A well-known URI for publishing service parameters
> Authors: Stephen Farrell
>  Rich Salz
>  Benjamin Schwartz
> Name:draft-ietf-tls-wkech-08.txt
> Pages:   18
> Dates:   2025-07-07
>
> Abstract:
>
> We define a well-known URI at which an HTTP origin can inform an
> authoritative DNS server, or other interested parties, about its
> Service Bindings.  The data can include Encrypted ClientHello (ECH)
> configurations, allowing the origin, in collaboration with DNS
> infrastructure elements, to publish and rotate its own ECH keys.
>
> Note
>
> This note is to be removed before publishing as an RFC.
>
> The source for this draft is in https://github.com/sftcd/wkesni/
> Issues and PRs are welcome there too.
>
> The IETF datatracker status page for this Internet-Draft is:
> https://datatracker.ietf.org/doc/draft-ietf-tls-wkech/
>
> There is also an HTMLized version available at:
> https://datatracker.ietf.org/doc/html/draft-ietf-tls-wkech-08
>
> A diff from the previous version is available at:
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-tls-wkech-08
>
> Internet-Drafts are also available by rsync at:
> rsync.ietf.org::internet-drafts
>
>
> ___
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org

This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: FW: New Version Notification for draft-stein-tls-ech-considered-harmful-00.txt

2025-07-10 Thread Yaakov Stein
Raghu,

I certainly am not advocating believing in only SNI by itself,
an advanced DPI system will use dozens of metadata features, SNI being only one.

Indeed, in those cases where there is a single service behind an IP address,
there is no reason for SNI to be present (although it often is anyway)
and can certainly be faked.

As I said in my ID you can't rely on client-side software.
99% of clients don't know what they are doing, and won't keep their protections 
up-to-date.
And MiTM of any type is an abomination - we don't want to replace one attack 
with a worse one.

In any case I am talking about a large ISP network, not a small or campus-size 
one where admins
can set up proxies for individual users.

Y(J)S


-Original Message-
From: Raghu Saxena 
Sent: Thursday, July 10, 2025 11:50 AM
To: tls@ietf.org
Subject: [EXTERNAL] [TLS] Re: FW: New Version Notification for 
draft-stein-tls-ech-considered-harmful-00.txt

External Email: Be cautious do not click links or open attachments unless you 
recognize the sender and know the content is safe

Dear Yaakov,

I would be careful about relying on plaintext SNI for detecting malicious 
flows. The SNI parameter is controlled by the client, and can even be ignored 
by the server. One would think that any decent malware author would either not 
set the SNI, or just "spoof" it - in which case if threat analysis software is 
relying on this field, it'd think the flow is legitimate and let is pass, which 
is probably even worse. In fact, recently when traveling on British Airways, I 
was able to (ab)use SNI, to use their "Free Messaging WiFi" for arbitrary 
traffic [0].

In environments where it is essential that network administrators inspect 
users' traffic to detect malicious flows, I think the better solution is to 
install MiTM CAs on client, which then allow the network admin to decrypt TLS 
and inspect the traffic. If this is then considered as an invasion of privacy 
in that setting, I'd argue inspecting SNI is the same; the client would rather 
hide it if they can. In fact, personally, I think browser's behavior to set SNI 
by default is actually harmful to privacy, since there are very popular 
websites (Top25) that function fine without the SNI extension, yet ISPs (such 
as "Jio" in India - from my experience) use this leakage to block them.

If you want to argue that the users' are "OK" with monitoring of the domains, 
but not of their entire TLS traffic, then the network admin can setup an 
HTTP(S) proxy (without MiTM), which would be able to log the domains via the 
`CONNECT` header, while blocking all other traffic. Once again, if this level 
of control over client's traffic is not possible, one should rethink if the 
"admins" should be able to peek into the SNI at all.

Regards,
Raghu Saxena

[0] https://www.saxrag.com/tech/reversing/2025/06/01/BAWiFi.html


On 7/2/25 10:43 PM, Yaakov Stein wrote:
> Just in case anyone missed this ...
>
> Y(J)S
>
> -----Original Message-
> From: internet-dra...@ietf.org 
> Sent: Tuesday, July 1, 2025 4:52 PM
> To: Yaakov Stein ; Yaakov Stein 
> Subject: New Version Notification for
> draft-stein-tls-ech-considered-harmful-00.txt
>
> A new version of Internet-Draft
> draft-stein-tls-ech-considered-harmful-00.txt
> has been successfully submitted by Yaakov (J) Stein and posted to the IETF 
> repository.
>
> Name: draft-stein-tls-ech-considered-harmful
> Revision: 00
> Title:ECH Considered Harmful
> Date: 2025-07-01
> Group:Individual Submission
> Pages:7
> URL:  
> https://www.ietf.org/archive/id/draft-stein-tls-ech-considered-harmful-00.txt
> Status:   
> https://datatracker.ietf.org/doc/draft-stein-tls-ech-considered-harmful/
> HTML: 
> https://www.ietf.org/archive/id/draft-stein-tls-ech-considered-harmful-00.html
> HTMLized:
> https://datatracker.ietf.org/doc/html/draft-stein-tls-ech-considered-h
> armful
>
>
> Abstract:
>
> Encrypted Client Hello is designed to enhance personal privacy, in
> particular obstructing the ability of communications service
> providers (but not Over The Top service providers) to map packet
> flows to applications.  While mostly ineffective in attaining this
> goal, it does severely hamper network-based detection of malicious
> flows, thus exposing end-users to various security risks that were
> previously avoidable.
>
>
>
> The IETF Secretariat
>
>
> This message is intended only for the designated recipient(s). It may contain 
> confidential or proprietary information. If you are not the designated 
> recipient, you may not review, copy or distribute this message. If you have 
> mistakenly received this message, please notify the sender by a reply e-mail 
> and de

[TLS] Re: [EXTERNAL] Re: Re: FW: New Version Notification for draft-stein-tls-ech-considered-harmful-00.txt

2025-07-13 Thread Yaakov Stein
There are many references that state that the vast majority of people don’t 
understand and can’t configure security features,
and complementing these many references that claim that the vast majority of 
breaches are human related.

For example: https://purplesec.us/resources/cybersecurity-statistics/
“It’s estimated that 99% of cloud security failures through 2025 will be the 
customers’ fault.”

See also
https://arxiv.org/pdf/2212.10382,
https://www.computerworld.com/article/1361241/90-of-security-incidents-trace-back-to-pebkac-and-id10t-errors.html
https://www.csoonline.com/article/544717/security-awareness-studies-prove-once-again-that-users-are-the-weakest-link-in-the-security-chain.html

Y(J)S

From: Rob Sayre 
Sent: Saturday, July 12, 2025 4:24 AM
To: TLS@ietf.org; Yaakov Stein 
Subject: [EXTERNAL] Re: [TLS] Re: FW: New Version Notification for 
draft-stein-tls-ech-considered-harmful-00.txt


External Email: Be cautious do not click links or open attachments unless you 
recognize the sender and know the content is safe
Yaakov Stein mailto:yst...@allot.com>> wrote:
> 99% of clients don't know what they are doing,

Interesting. What's the citation there?

thanks,
Rob
This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: [EXTERNAL] Re: New Version Notification for draft-stein-tls-ech-considered-harmful-00.txt

2025-07-03 Thread Yaakov Stein
Rich,

I never said that TLS without ECH provides sufficient privacy.
I said it provides sufficient security, and I fully admit that SNI raises 
privacy concerns.

The difference between us is that I believe that this privacy concern is minor
(and almost negligible in the most common case where flows are classified
 without associating them with particular subscribers)
as compared to the much more invasive privacy intrusions of the OTTs.

Unlike you I believe that we need to consider the privacy vs. security tradeoff 
-
comparing an almost insignificant privacy intrusion vs. major security threats.

I don't recall saying that ECH is itself an attack, but if I did, I humbly 
rescind that statement.
In a perfect world with no malicious sites, ECH is completely innocuous.
In a perfect world where antivirus and IDS work perfectly, are always 
up-to-date, and zero-days don't exist, ECH is completely innocuous.
ECH is merely a highly efficient method of hiding the actual attacks from 
network-based security mechanisms.

Y(J)S

From: Salz, Rich 
Sent: Thursday, July 3, 2025 6:39 PM
To: Yaakov Stein ;  
Subject: Re: [EXTERNAL] Re: New Version Notification for 
draft-stein-tls-ech-considered-harmful-00.txt


External Email: Be cautious do not click links or open attachments unless you 
recognize the sender and know the content is safe
Well, I didn't write this to merely get things off my chest.

Well, it sure reads that way. For example, calling it an "attack" is needlessly 
provocative. Saying that TLS provides sufficient privacy, when the ECH document 
itself points out that having the SNI in the clear is a privacy concern, shows 
a poor understanding.  You seem to disagree with that concern, which is fine, 
but your argument in the document is not persuasive. Take this feedback however 
you want; it's worth what you paid for it.

This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: FW: New Version Notification for draft-stein-tls-ech-considered-harmful-00.txt

2025-07-03 Thread Yaakov Stein
Stephen,

ECH is not yet another confidentiality feature.
TLS already provides perfectly good user content confidentiality.

ECH is more akin to DNS tunneling or phishing based on domain names that look 
correct.
It is yet another method of hiding malicious traffic.

Y(J)S

-Original Message-
From: Stephen Farrell 
Sent: Thursday, July 3, 2025 4:24 PM
To: Yaakov Stein ;  
Subject: Re: [TLS] FW: New Version Notification for 
draft-stein-tls-ech-considered-harmful-00.txt


Hiya,

On 02/07/2025 15:43, Yaakov Stein wrote:
> Just in case anyone missed this ...

I see nothing new or noteworthy in the text. It's the same set of arguments 
emitted whenever there's the prospect that some new protocol confidentiality 
feature looks like it may get to be widely deployed.

It mostly reminds me of a meeting I was at where (mobile) telcos
(loudly:-) predicted the sky would fall because youtube had turned on https. 
The sky didn't fall.

Cheers,
S.

This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: [EXTERNAL] Re: New Version Notification for draft-stein-tls-ech-considered-harmful-00.txt

2025-07-03 Thread Yaakov Stein
Rich,

Well, I didn't write this to merely get things off my chest.
I have been active in the IETF for over 25 years, and this is the first time I 
have seen an attack pass IETF LC.

Regarding using 5-tuples, random dynamic + 443 port numbers are mostly useless,
and server IP address does not provide granular application classification.
I don't really care if the server belongs to Google since the same IP address 
can be used for about 20 different applications
with wildly diverging forwarding policy requirements. Gmail can be delayed for 
seconds, search has intermediate delay but low data-rate,
Youtube DASH has critical delay issues at startup and then none afterwards, but 
high bandwidth, etc.
And a large percentage of the traffic may be on an operator CDN, so that 
different OTTs share IP addresses.

And that covers only the traffic management issue I raised.
Regarding the more serious malware detection issue, I assume that you expect me 
to rely on the RFC 3514 marking in the IP header?

Y(J)S

From: Salz, Rich 
Sent: Wednesday, July 2, 2025 6:28 PM
To: Yaakov Stein ;  
Subject: [EXTERNAL] Re: New Version Notification for 
draft-stein-tls-ech-considered-harmful-00.txt


External Email: Be cautious do not click links or open attachments unless you 
recognize the sender and know the content is safe
I appreciate that sometimes it's just good to get something off your chest.

Why doesn't TCP-level filtering and control work? Nobody's hiding the 
five-tuple.
This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] FW: New Version Notification for draft-stein-tls-ech-considered-harmful-00.txt

2025-07-02 Thread Yaakov Stein
Just in case anyone missed this ...

Y(J)S

-Original Message-
From: internet-dra...@ietf.org 
Sent: Tuesday, July 1, 2025 4:52 PM
To: Yaakov Stein ; Yaakov Stein 
Subject: New Version Notification for 
draft-stein-tls-ech-considered-harmful-00.txt

A new version of Internet-Draft draft-stein-tls-ech-considered-harmful-00.txt
has been successfully submitted by Yaakov (J) Stein and posted to the IETF 
repository.

Name: draft-stein-tls-ech-considered-harmful
Revision: 00
Title:ECH Considered Harmful
Date: 2025-07-01
Group:Individual Submission
Pages:7
URL:  
https://www.ietf.org/archive/id/draft-stein-tls-ech-considered-harmful-00.txt
Status:   
https://datatracker.ietf.org/doc/draft-stein-tls-ech-considered-harmful/
HTML: 
https://www.ietf.org/archive/id/draft-stein-tls-ech-considered-harmful-00.html
HTMLized: 
https://datatracker.ietf.org/doc/html/draft-stein-tls-ech-considered-harmful


Abstract:

   Encrypted Client Hello is designed to enhance personal privacy, in
   particular obstructing the ability of communications service
   providers (but not Over The Top service providers) to map packet
   flows to applications.  While mostly ineffective in attaining this
   goal, it does severely hamper network-based detection of malicious
   flows, thus exposing end-users to various security risks that were
   previously avoidable.



The IETF Secretariat


This message is intended only for the designated recipient(s). It may contain 
confidential or proprietary information. If you are not the designated 
recipient, you may not review, copy or distribute this message. If you have 
mistakenly received this message, please notify the sender by a reply e-mail 
and delete this message. Thank you.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org