Ben,

In the scenario you outlined below, it seems the third party has significant 
control over the communications of the clients (e.g. national border firewall). 
In addition, based on your description, it seems they are intent on ensuring 
that not communications occur unless they can view the communications. In 
addition, they must be able to coerce the server owner into providing the key 
(because the proposed method requires opt-in by both the client and the 
server). This is a significant amount of control that the third party wields. 

In this scenario, wouldn't the state firewall simply require all clients to 
trust their CA so that they can reverse proxy all communications--since they 
will likely not only be interested in one server's communications but many? It 
seems important to keep in mind that each server that a third party wants to 
listen in on must agree to enable it (opt-in). It would seem that a state run 
firewall is unlikely to get that agreement from a broad number of servers of 
interest. And, as you point out, each client will know they're being forced to 
agree that the third party can listen in on communications (if they choose to 
continue to communicate with the server). In countries where it is possible to 
challenge such coercion in a court of law, the client will know they are being 
forced and can challenge that (or more likely the industry can provide 
pressure). This method seems to protect against someone like the NSA secretly 
coercing a server owner into opting in without the knowledge of the cl
 ient (and the broader community). 

I guess the basic question I'm asking is that if a third party is so powerful 
that they can do what you describe, aren't they going to force an even more 
effective method (trusting their CA so that they can terminate the connection 
as a middle man) on clients so that they don't have to coerce every server?

Thanks,

Paul


-----Original Message-----
From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Benjamin Kaduk
Sent: Wednesday, October 18, 2017 13:42
To: tls@ietf.org
Subject: Re: [TLS] Publication of draft-rhrd-tls-tls13-visibility-00

On 10/02/2017 03:31 PM, Ralph Droms wrote:
> We are about to publish draft-rhrd-tls-tls13-visibility-00.  The TLS 
> extension defined in this I-D takes into account what we heard from the 
> discussion regarding TLS visibility and draft-green-tls-static-dh-in-tls13-00 
> in Prague. Specifically, it provides an opt-in capability for both the TLS 
> client and server and makes it clear on the wire that visibility will be 
> enabled for the session.  The new mechanism does not depend on static 
> handshake or session keys.  
>

This draft does not seem to have anything to address the concern that, once a 
visible ClientHello extension is needed to enable wiretapping, certain parties 
(e.g., national border firewalls) would reject/drop
*all* ClientHellos not containing that extension, thereby extorting all clients 
into "opting in" to the wiretapping and effectively rendering the "opt-in" 
requirement useless for those clients.

As a more general comment, I think that this concern is so squarely at odds 
with the concern that the client must be able to opt-in to the wiretapping 
[and, optionally, be guaranteed by the key schedule to know when wiretapping is 
happening] that I do not see any potential for a workable solution.

-Ben

P.S. I agree with Rich; can we try to defer these conversations until after 1.3 
is actually published?

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to