Ted
Your first sentence illustrates the disconnect between the Enterprise 
perspective and what many at IETF are saying.
That being the unencrypted stream is available to the endpoints.   IT IS NOT.   
  When you run a packet trace at the endpoint,  you will see encrypted payloads 
and will need the keys to decrypt.
So you can collect packet trace information at thousands or nodes,  or you can 
collect packet traces from network taps.   You still need the keys to derive 
meaningful diagnostic and monitoring information.

People than run and manage networks are PAINFULLY aware of this fact.     This 
is why we need what this draft proposes.

From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Ted Lemon
Sent: Saturday, July 15, 2017 4:06 AM
To: Dobbins, Roland <rdobb...@arbor.net>
Cc: IETF TLS <tls@ietf.org>; Matthew Green <matthewdgr...@gmail.com>
Subject: Re: [TLS] draft-green-tls-static-dh-in-tls13-01

I think that your first and third points are actually non-sequiturs: the 
unencrypted stream is available to the entities controlling either endpoint, 
not just the log.   There is no technical reason that in-flight capture is 
required to address those two points.

Regarding your second point, this seems to be the real key that is motivating 
you to make the first and third points.   If I may paraphrase, the problem you 
are attempting to address is that in some situations two sub-organizations both 
of which are in principle responsible to a larger organization nonetheless are 
unable to cooperate due essentially to a failure by one sub-organization to 
take seriously the responsibilities of the other sub-organization, and the 
failure of the organization to which they are both subordinate to successfully 
encourage cooperation on the part of the intransigent sub-organization.   Did I 
paraphrase that correctly?

On Sat, Jul 15, 2017 at 9:54 AM, Dobbins, Roland 
<rdobb...@arbor.net<mailto:rdobb...@arbor.net>> wrote:


> On Jul 15, 2017, at 14:48, Ted Lemon 
> <mel...@fugue.com<mailto:mel...@fugue.com>> wrote:
>
> In the event that it is not feasible for an operator to obtain the plaintext 
> of a message without the key, isn't that because they don't control either 
> endpoint?

First of all, what goes on the wire is often contextually different  (and 
probatively so) from what's recorded in abstract log files.

Secondly, administrative divisions within a single organization often impede 
cooperation between those tasked with securing & troubleshooting communications 
and those who 'own' the assets in question.

Thirdly, for both security & troubleshooting applications, the hard requirement 
is for real-time visibility & possible intercession, not ex post facto analysis.

-----------------------------------
Roland Dobbins <rdobb...@arbor.net<mailto:rdobb...@arbor.net>>



The information contained in this communication is highly confidential and is 
intended solely for the use of the individual(s) to whom this communication is 
directed. If you are not the intended recipient, you are hereby notified that 
any viewing, copying, disclosure or distribution of this information is 
prohibited. Please notify the sender, by electronic mail or telephone, of any 
unintended receipt and delete the original message without making any copies.
 
 Blue Cross Blue Shield of Michigan and Blue Care Network of Michigan are 
nonprofit corporations and independent licensees of the Blue Cross and Blue 
Shield Association.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to