-----Original Message-----
From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Tom Ritter
Sent: Thursday, July 20, 2017 10:44
To: Yoav Nir <ynir.i...@gmail.com>
Cc: IETF TLS <tls@ietf.org>
Subject: Re: [TLS] Is there a way forward after today's hum?

 

On 20 July 2017 at 01:53, Yoav Nir < <mailto:ynir.i...@gmail.com> 
ynir.i...@gmail.com> wrote:

> 

> On 20 Jul 2017, at 8:01, Russ Housley < <mailto:hous...@vigilsec.com> 
> hous...@vigilsec.com> wrote:

> 

> Ted, if we use a new extension, then the server cannot include it 

> unless the client offered it first.  I am thinking of an approach 

> where the server would include information needed by the decryptor in 

> the response.  So, if the client did not offer the extension, it would 

> be a TLS protocol violation for the server to include it.

> 

> 

> So we also add an alert called “key-export-needed” in case the client 

> does not include it.

> 

> That way a browser (as an example) can show the user why the 

> connection was broken (“server requires wiretapping to be enabled. Go 

> to about:config if that is OK and change the allow-wiretap setting to 

> True”)

 

 

I previously expressed that I could support the extension mechanism - I'm 
sympathetic to regulatory requirements and unhappy with, although understanding 
of, what has become the 'standard mechanism' (breaking

crypto) to achieve them. I've looked at more than one 'end to end'

encrypted messenger that tosses in the 'third end' of key escrow.

 

But to suggest such a mechanism might ever be implemented in a web browser 
throws my hackles up. The discussion has always been about datacenter - the 
people concerned say "We don't want your datacenter stuff in our protocol and 
the proponents say "No really, we only care about the datacenter."

 

The concerns around some future government-mandated key escrow is very real and 
very concerning.

 

It seems like that problem exists today with TLS 1.3. If a government is 
powerful enough to mandate key escrow, wouldn’t they also be power enough to 
mandate implementing static DH with TLS 1.3 (so that they key escrow is 
possible). In addition, based on this level of influence, couldn’t they 
alternatively require TLS server owners to provide them unencrypted data. 

 

-tom

 

_______________________________________________

TLS mailing list

 <mailto:TLS@ietf.org> TLS@ietf.org

 <https://www.ietf.org/mailman/listinfo/tls> 
https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to