Stephen:

>>> You didn't refer to 2804 and the standards track. As an author do
>>> you really think this can be on the standards track and yet not
>>> obsolete 2804?
>> 
>> Yes. 
> 
> We disagree.
> 
>> Section 3 of RFC 2804 offers pretty clear definition of
>> wiretapping, and that is not what is going on here.  In this
>> situation, all of the parties are part of the same organization,
>> under common key management.  
> 
> That is one possible deployment. There is nothing in this
> proposal that limits it's use to that.
> 
>> The server must explicitly accept and
>> use the centrally managed (EC)DH key, so that party is completely
>> aware and, in fact, enabling the other parties to decrypt the
>> traffic.
> 
> Yes, and the server could equally be compelled to do that,
> in which case this technology would clearly be a standard
> form of wiretapping.
> 
> Claiming that is not the case would be incredible so I have
> no idea how you maintain that this isn't in conflict with
> 2804.

That does not follow the definition in Section 3 of RFC 2804.  If one of the 
parties is "compelled" to install the centrally managed (EC)DH key, then the 
server is aware.  If you consider the server to be the sending party, then this 
situation does not meet number 1 in the definition.  If you consider the server 
to be the receiving party, then this situation does not meet number 2 in the 
definition.

To save everyone from looking it up, RFC 2804 says:

   Wiretapping is what occurs when information passed across the
   Internet from one party to one or more other parties is delivered to
   a third party:

   1. Without the sending party knowing about the third party

   2. Without any of the recipient parties knowing about the delivery to
      the third party

   3. When the normal expectation of the sender is that the transmitted
      information will only be seen by the recipient parties or parties
      obliged to keep the information in confidence

   4. When the third party acts deliberately to target the transmission
      of the first party, either because he is of interest, or because
      the second party's reception is of interest.

   The term "party", as used here, can refer to one person, a group of
   persons, or equipment acting on behalf of persons; the term "party"
   is used for brevity.

   Of course, many wiretaps will be bidirectional, monitoring traffic
   sent by two or more parties to each other.

   Thus, for instance, monitoring public newsgroups is not wiretapping
   (condition 3 violated), random monitoring of a large population is
   not wiretapping (condition 4 violated), a recipient passing on
   private email is not wiretapping (condition 2 violated).

Russ
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to