Rich,

I think you're mixing things up a bit. There is no false comparison. I am
not comparing draft-rhrd to the Wireshark option, they are fundamentally
different. I'm comparing draft-rhrd to draft-green. The wireshark option
requires storage of n keys to inspect n connections, both draft-rhrd and
draft-green only require a single master key to inspect n connections.

The Wireshark option is always possible with TLS, it just has scaling
issues. You export the session keys on a connection-by-connection basis
from one of the endpoints and can then use them to decrypt the transcript
after the fact. This is possible with TLS 1.2, TLS 1.3 and every version of
TLS that uses symmetric keys for encryption. This keeps TLS a two-party
protocol, and is my preferred solution to datacenter visibility, and I
assume Stephen's as well. There have been arguments here that this is not a
tenable solution in some environments, but I haven't found them convincing
for the datacenter visibility case.

The other two options, the master key options draft-rhrd and draft-green,
turn TLS into a quasi three-party protocol. Server operators can just
implement draft-green (or a variant thereof that doesn't repeat DH keys,
but instead generates them deterministically) no matter what the IETF says.
It's not prohibited by TLS 1.3 either structurally or by policy. If
datacenter operators want a master key option and there is no standard to
use, they can just implement draft-green and the client will have no idea
this is happening.

Your rejection of the cleartext signal expresses implies a preference for
draft-green over draft-rhrd, not a preference for the wireshark option
over draft-rhrd. Without draft-rhrd, it's likely that draft-green gets
implemented whether it's standardized or not and no client will be able to
opt out or even know that it's happening.

In the situation where draft-green become the de facto standard for key
escrow in TLS, the public debates around national firewalls trying to force
clients to opt into wiretapping will become moot, firewalls won't have to
block users who have the cleartext signal, they'll just force servers to
implement draft-green unbeknownst to users. Users won't have any option, or
any knowledge that servers are using a master key to protect the
confidentiality of their connection and that their security may be lessened
because of it (compared to a Wireshark-type system which is more difficult
to implement at nation-scale due to how many keys you need to manage).
Furthermore, researchers won't be able to measure the prevalence of this
type of technology. With draft-green, civil society goes dark, with
draft-rhrd, there will be public data to inform a public debate.

Nick

On Wed, Nov 1, 2017 at 7:19 AM Salz, Rich <rs...@akamai.com> wrote:

> In https://www.ietf.org/mail-archive/web/tls/current/msg24789.html, Nick
> Sullivan concluded:
>
>
>
> >- on the other hand using draft-rhrd is safer than allowing organizations
> to hack single-key escrow into TLS 1.3 or continue to use TLS 1.2 with
> non-forward-secret cipher suites
>
>
>
> I think this sets up a false comparison.  Existing TLS 1.3 debugging
> systems – Wireshark – can debug individual TLS sessions with the session
> key information being made available.  This is what the RHRD draft would
> require an organization to do, but it adds the additional signaling that
> the client is willing to allow it. The Wireshark example shows that the
> signaling is not needed.  Servers can unilaterally do it now.
>
>
>
> I maintain that the cleartext signal servers no useful purpose, except to
> provide a mechanism for entities to segregate traffic.
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to