Re: [TLS] Breaking into TLS to protect customers

2018-03-15 Thread Ion Larranaga Azcue
I fail to see how the current draft can be used to provide visibility to an IPS system in order to detect bots that are inside the bank… On the one hand, the bot would never opt-in for visibility if it’s trying to exfiltrate data, so this capability would never get activated. And even if the bo

Re: [TLS] Breaking into TLS to protect customers

2018-03-15 Thread Ion Larranaga Azcue
> -Mensaje original- > De: Kathleen Moriarty [mailto:kathleen.moriarty.i...@gmail.com] > Enviado el: jueves, 15 de marzo de 2018 18:42 > Para: Carl Mehner > CC: Ion Larranaga Azcue ; tls@ietf.org > Asunto: Re: [TLS] Breaking into TLS to protect customers > > The e

Re: [TLS] TLS interception technologies that can be used with TLS 1.3

2018-03-15 Thread Ion Larranaga Azcue
Unless I'm wrong, with the visibility draft the client side is also unable to identify who the key material is being transferred to. Only the server-side can know it, so I think it's a similar case. Imagine a malicious user is able to subvert the communication between the server and the middleb

Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-24 Thread Ion Larranaga Azcue
I recognize I may lack context, because I have only seen Steve Fenter's slides, but apart from it not reaching consensus, the scenario it presents (user connecting to online banking service) seems to be visibility of connections from the internet to internal servers. I think that not even visi

Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-26 Thread Ion Larranaga Azcue
For the monitoring part, I have never felt the need to monitor anything outside the end points of the connections. If I need to decrypt packets online in order to troubleshoot it, it’s because my application is currently not providing enough information in the debug logs. And in order to consoli

Re: [TLS] Expanded alert codes. [Was Re: Genart last call review of draft-ietf-tls-tls13-24]

2018-04-01 Thread Ion Larranaga Azcue
> Note that temporarily enabling debug on a live endpoint isn't a big issue, > everything will continue to operate as before except for the one client that > requests debug-level alerts, and that knows what it's up for because it > explicitly asked for it. And for the malicious user that, knowing

Re: [TLS] Expanded alert codes. [Was Re: Genart last call review of draft-ietf-tls-tls13-24]

2018-04-01 Thread Ion Larranaga Azcue
Of course not. I mean an attacker who is specially interested in this server and knows that someone has requested a debug window on it. De: Peter Gutmann Enviado: domingo, 1 de abril de 2018 10:14 Para: Ion Larranaga Azcue; Eric Rescorla Cc: IETF

Re: [TLS] Expanded alert codes. [Was Re: Genart last call review of draft-ietf-tls-tls13-24]

2018-04-01 Thread Ion Larranaga Azcue
Anyway, I don't mean I'm against the idea of the extended errors extensions... Only that let's not take it lightly. It can be a good debugging tool but also a risky one. De: TLS en nombre de Ion Larranaga Azcue Enviado: domingo, 1 de a

Re: [TLS] Genart last call review of draft-ietf-tls-tls13-24

2018-04-06 Thread Ion Larranaga Azcue
Hi, My opinion is that if we are going to have extended error codes, it's better to use numeric ones and not text based errors. Imagine a chinese client trying to troubleshoot a connection to a server using a TLS stack that reports its errors in russian. That would be crazy! I'm not saying t

Re: [TLS] Genart last call review of draft-ietf-tls-tls13-24

2018-04-09 Thread Ion Larranaga Azcue
ginal- De: Peter Gutmann [mailto:pgut...@cs.auckland.ac.nz] Enviado el: domingo, 8 de abril de 2018 2:41 Para: Ion Larranaga Azcue CC: tls@ietf.org Asunto: Re: [TLS] Genart last call review of draft-ietf-tls-tls13-24 Stan Kalisch writes: >On Fri, Apr 6, 2018, at 3:54 PM, Ion Larranaga Azcue

Re: [TLS] Genart last call review of draft-ietf-tls-tls13-24

2018-04-09 Thread Ion Larranaga Azcue
o do damage control and suggest limiting the amount of information that can (will) be leaked. -Mensaje original- De: Peter Gutmann [mailto:pgut...@cs.auckland.ac.nz] Enviado el: lunes, 9 de abril de 2018 11:50 Para: Ion Larranaga Azcue CC: tls@ietf.org Asunto: Re: [TLS] Genart last cal

Re: [TLS] Expanded alert codes

2018-05-21 Thread Ion Larranaga Azcue
I would say it's unfair to expect other people to diagnose the problem by claiming "that information was all that was available" because you had access to: - traffic dumps of the failing handshakes - traffic dumps of working handshakes - the possibility to try any number of modifications of the

Re: [TLS] Publication of draft-rhrd-tls-tls13-visibility-00

2017-10-11 Thread Ion Larranaga Azcue
I'm a newcomer here, so I may be wrong in some aspects (I apologize in advance for that) but at least I'd like to give my opinion... I really don't feel confortable with the approach taken in this draft. Most of the proponents of these kind of "tapping" limit their scope to datacenters, but I

Re: [TLS] Publication of draft-rhrd-tls-tls13-visibility-00

2017-10-17 Thread Ion Larranaga Azcue
> I don't understand why this complicated approach is needed. Why can't the > server provide an OOB > interface to look up sessions keys, or maybe export them proactively? The > proposed draft needs a > protocol like this anyway because SSWrapDH1 keys need to be distributed, and > periodic k

Re: [TLS] Publication of draft-rhrd-tls-tls13-visibility-00

2017-10-17 Thread Ion Larranaga Azcue
> IIUC, with the draft-rehired proposal, the client > can in any case not be told - the TLS protocol > extensions are mere politeness and the client does > not get to know what snooper(s) are involved, nor > can the client influence the snooping keys. Once, > any infrastructure for this was deploye

Re: [TLS] Publication of draft-rhrd-tls-tls13-visibility-00

2017-10-17 Thread Ion Larranaga Azcue
> I agree. > > My point is that if this draft were accepted, then the > infrastructure for the above scenario would all be in > place (the DH value for the snooper and the code to expose > session information to that snooper) and the above > scenario would be more likely to happen, more often. > I

Re: [TLS] Publication of draft-rhrd-tls-tls13-visibility-00

2017-10-24 Thread Ion Larranaga Azcue
Even if YOUR objective is to passively observe, you have to admit that this mechanism allows OTHER PEOPLE using it to modify the encrypted data, and we should always consider the worst-case scenario. In fact, my opinion a couple of weeks ago was that we had to find some way to provide visibilit