Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity
2011-03-12 12:49:10
On Mar 11, 2011, at 7:13 PM, Mark Nottingham wrote:
You mean some third-world (or soon to be) junta-dictator might officially
and deliberately cut their economy off from the world's communication
networks, thereby insuring economic failure, rather than suffer the risk
that their citizens might be exposed to external influence or use the
Internet to complain about or conspire against their "lawful leaders",
rather as North Korea has done?
I'm OK with that. It helps bring about their failure due to economic
collapse rather than requiring outside force to stop their depredations,
although it might take a few generations to work.
... compared to the much faster social changes that have been witnessed in
places where there's been even partial exposure to external information, that
seems like a poor outcome. Collapse is messy and very dangerous for the
people you want to help.
How likely are people in even the most restrictive regime to not have even
partial exposure to outside information, no matter whether IETF protocol
specifications have richer security considerations than we currently practice?
I'm also okay with air-dropping satellite terminals and television receivers
to their victims, and with beaming high-power wireless signals across their
borders in order to speed things up.
And how likely are those things to actually happen and have a measurable
effect? Seriously.
Ever heard of the Voice of America program? Most developed nations have
something similar. Did you see all the satellite dishes on the walls of houses
in Cairo?
Now, this does raise an entirely different question more related to parallel
efforts to make self-organizing ad-hoc networks useful. This is a really good
effort, useful in everything from economic growth efforts like OLPC to
recovering from a Japan-earthquake-style major disaster. We should probably be
working on this sort of thing harder than we presently are.
I have severe doubts about whether this is an appropriate and capable forum
for making such weighty judgements. YMMV.
Well, we certainly shouldn't be trying to decide which nations thrive and
which collapse. But we ARE responsible for the security characteristics of our
own protocols. We're quite willing to talk about security, and make protocol
specifiers jump through intricate and mostly useless hoops in their spec
writing, but we don't seem to be willing to put our "money where our mouth is."
For example, why are we still running our web sites on HTTP instead of HTTPS?
If we only had the latter, it becomes much more difficult for MITMs to know
whether a person communicating with the IETF web site is participating in the
IETF process or just using us as a web proxy to talk to Facebook about The
Revolution. If all traffic is encrypted, and if the apparent endpoint might or
might not be a relay instead of the actual endpoint, then it's a whole lot
harder for the MITM to separate wheat from chaff. Many of our protocols support
this sort of obscuring, but our practice has been to disable the functionality
through implementation choices.
On a related note, we've developed what we think is a secured mail protocol
suite. Yet we don't use it, instead subjecting our list members (and more so
the administrators) to having to deal with an endless barrage of spam. We
probably don't use our secured mail protocol because it is too cumbersome.
Maybe that should be a wake-up call for us to develop a better way to secure
mail.
But instead of doing practical things that actually impact security, we
endlessly debate things like the distribution-reuse flags for geolocation
objects (which will be generally ignored by implementors) and write
specifications like the Consent Framework for SIP that will most likely never
be implemented.
Most critically, we've recognized that Internet users may have needs for
privacy (which until recently has meant just encryption of data) and integrity
(minimally, signing of data). It's time we recognize another fundamental
principle: obscurity (hidden purpose of data). And having recognized these
principles, we need to start taking much more aggressive steps in protocol
design to assure that they are actually being met in a useful way.
We can start by:
1) deprecating the non-secured variant of every core protocol that has both
secure and non-secure variants
2) not writing any more protocols with secured and non-secured variants
3) analyzing existing protocols that are fundamentally non-secured and
determine which, if any, security enhancements should be made normative
4) Doing a much better job of really analyzing the security considerations of
new work, taking fully into account the principles of privacy, integrity, and
obscurity. Keep in mind that every protocol has the "good citizenship"
responsibility not just of addressing these principles itself, but of also
helping its fellow citizens meet them.
5) Incorporating the principles of Privacy, Integrity, and Obscurity directly
into our core mission statement, into the very fabric of our belief system,
just as "Liberté, égalité, fraternité" became the driving motto of the Third
Republic of France, ending much of the abuse of Privilege that preceded the
revolution.
--
Dean Willis
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity,, (continued)
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity,, Phillip Hallam-Baker
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity,, Martin Rex
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity,, Dean Willis
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity,, Phillip Hallam-Baker
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity,, Stephen Kent
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Phillip Hallam-Baker
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, SM
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Mark Nottingham
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Dean Willis
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Mark Nottingham
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity,
Dean Willis <=
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Alessandro Vesely
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Joel Jaeggli
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Hannes Tschofenig
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Dean Willis
- Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Alessandro Vesely
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, SM
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Hannes Tschofenig
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, todd glassey
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Dean Willis
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Iljitsch van Beijnum
|
Previous by Date: |
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Mark Nottingham |
Next by Date: |
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Dean Willis |
Previous by Thread: |
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Mark Nottingham |
Next by Thread: |
Re: Call for a Jasmine Revolution in the IETF: Privacy, Integrity, Obscurity, Alessandro Vesely |
Indexes: |
[Date]
[Thread]
[Top]
[All Lists] |
|
|