Everything I have stated is my personal opinion.

Note that I never suggested that I like or am espousing a certain approach, I was simply stating a fact. In many cases today, a TLS connect that appears to a client to be terminating a one place (Company X) is actually terminating somewhere else (Hosting Provider Y) without any clear indication to the client that the connection is terminating at Hosting Provider Y. Nobody has suggested that this is unacceptable or that TLS is broken if it can't prevent that.

TLS is not an end-to-end protocol, it is a point-to-point protocol, and as noted in hosting company example, which you claim to find so troubling, it isn't always clear to either party what's at the other end of the connection. It might be the entity the client thinks its connecting to (Company X), it might be a hosting provider acting on behalf of Company X, or it might be something else. The best the client can hope for with things like TLS, PKIX, TRANS, etc., is that the server end of the connection is either Company X or some entity authorized by Company X to act as Company X for the purpose of being the connection endpoint (and, yes, Company X may have been coerced into authorizing some other entity to covertly act as the server endpoint). I am not saying that I like this or am "espousing" it, I am simply pointing out a fact.

Similarly, the best that TLS can offer in terms of privacy is that the contents of the communication between the two endpoints is not seen by anyone else *unless* at least one of the two endpoints (client or server) chooses to provide the contents of the communication to some other entity. draft-rhrd-tls-tls13-visibility doesn't change that.

It is also a fact that once a client provides data to a server, there are no technical mechanisms that would allow the client to limit what the server does with that data. As has been show over and over again, including by you, it is very frequently the case that the server that initially receives the data passes it on to others. The others may be back-end database servers or anti-virus scanners, but the client has no control over what happens to the data once the server receives it.

I have not tried to argue that draft-rhrd-tls-tls13-visibility is the best solution for addressing the need for visibility within the data center. Perhaps it is, perhaps it isn't. But, I'm tired of the abusive and false suggestions that draft-rhrd-tls-tls13-visibility is a "wiretapping" draft or that it is defining a "please-screw-me extension." These suggestions have been repeated over and over again, even though they have already been countered effectively - "repeating points already countered is just disruptive noise."

On 10/24/2017 10:13 PM, Stephen Farrell wrote:
David,

I'll go back over your mails tomorrow but was struck by this...

On 24/10/17 23:39, David A. Cooper wrote:
I haven't even gotten into the question of what does it mean for a connection to
be MiTM'd. If Company X decides to have its web site operated by Hosting
Provider Y is the connection between the client and Company X being MiTM'd? The
client might think it has a secure end-to-end connection with Company X, but in
reality its data is being intercepted and read by Hosting Provider Y, without
the client's permission (and most likely without the client's knowledge). How
does TLS, currently, prevent this? Why isn't anyone demanding that TLS cannot be
standardized until it can be proven that such a scenario is impossible?
That strikes me as an incredibly nihilist approach you
(or NIST?) appear to be espousing, which is surprising.

As a question back to you: would it be ok if NIST were
to reinstate Dual-EC? If not why not? After all, (based
on the above), all that'd happen is someone could do
stuff that everyone knows (since 2008) can happen. (And
no, with the current draft, the client does NOT know who
the snooper is - it could be the NSA or the FSB and the
client can't tell - and all that was already discussed
on the list.)

I suspect you'll say that it's better that NIST do not
add Dual-EC back, (and I agree) because we're better off
with honest crypto. And the same is true of TLS - it's
a 2 party protocol and adding additional parties breaks
all the trust models based on TLS. So it'd be equally
good if NIST didn't espouse breaking TLS, at least IMO.

If you can show me where you (or NIST or anyone) analysed
all of the uses of TLS to check that there are no bad side
effects, I'll be interested in reading that analysis. In
the meantime, your personal evaluation of your risk is not
something that I find convincing, sorry.

S.


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to