08:16:56 RRSAgent has joined #strint 08:16:56 logging to http://www.w3.org/2014/03/01-strint-irc 08:17:12 rrsagent, set logs public 08:26:21 jphillips has joined #strint 08:31:07 Ted_ has joined #strint 08:31:10 wjontof has joined #strint 08:55:33 JoeHallCDT has joined #strint 08:55:54 scribenick: JoeHallCDT 09:00:52 for remotes: the room is still quite unsettled 09:02:21 sftcd has joined #strint 09:04:02 Zakim has joined #strint 09:04:34 woo! 09:05:08 wish we could "skin" Zakim… e.g., for old-school U.S. hip-hop fans it could be "Rakim" 09:05:40 scribenick: JoeHallCDT 09:07:13 jphillips has joined #strint 09:08:00 JoeHallCDT has joined #strint 09:10:00 we're starting 09:10:23 Farrell: we'll discuss breakouts at the end of this session 09:10:45 mnot: I've been asked to intro opportunistic encryption (OE) 09:11:02 … 7 papers submitted on OE or OA 09:11:28 … (summarizes 07, 12, 27, 32, 40, 66, 46) 09:11:42 arobach has joined #strint 09:11:47 … mnot's is 12, won't discuss much 09:12:03 … 40 deep-dive on OE… not as relevant for a high-level discussion 09:12:24 … 66 good survey of how OE is already used (IPSec, VOIP, NAT, TLS) 09:12:37 … starts to collect relevant terminology… very important to know what we mean clearly when we say OE 09:12:54 … mnot was saying "optimistic" originally [laughs] 09:13:05 … 07, 27 discuss what "most people" seem to mean by OE 09:13:10 mcmanus has joined #strint 09:13:21 … tries to understand the risks and benefits of OE 09:13:46 … 07, 27 are good places to start in mnot's opinion 09:14:08 … 32 proposes tcpcrypt as a low-cost way of getting OE in the stack 09:14:13 Jiangshan has joined #strint 09:14:17 … first paper that separates encryption from auth 09:14:22 PhilippeDeRyck has joined #strint 09:14:33 DThaler has joined #strint 09:14:44 … 46 very similar. proposes a secure password store that does not allow the passwords to go out, but used for auth… combined with PAKE 09:14:54 … related things besides these papers 09:15:05 … mnot is about to get all HTTPBis on us all 09:15:33 … TLS for HTTP URIs… not sure if it will be authenticated or not just yet 09:15:45 … lots of concerns about what happens when we allow OE 09:16:01 ldaigle has joined #strint 09:16:01 kodonog has joined #strint 09:16:35 … opportunity cost: what would we miss out by focusing on OE 09:16:49 … folks in the WG submitted a draft talking about an "explicity proxy" 09:17:00 fluffy has joined #strint 09:17:02 s/explicity/explicit/ 09:17:04 … allows a HTTP proxy that can view content 09:17:19 hildjj has joined #strint 09:17:57 dka has joined #strint 09:18:09 grothoff has joined #strint 09:18:12 … Brad Hill from ebay pointed out this goes from two states of security (HTTP/S) to three (Auth or not) 09:18:26 … lot of dependence on unauth connections 09:18:44 … captive portals, virus scanning, policy enforcement, optimization 09:18:46 did Mark actually say pervasive monitoring at all yet? 09:18:59 … TLS MITM is becoming more common 09:19:31 … some suggested discussion points 09:19:46 … terminology. lets' not use "OE" because it causes confusion 09:19:58 … auth vs. anonymous 09:20:10 … fail-safe vs. fail-silent 09:20:20 … (argument ensues about terminology point) 09:20:54 … 2. ratholes to avoid 09:21:03 … specific tech/solns 09:21:13 … speculation on UI/UX 09:21:27 … (it's very important but not for us to talk meaningfully) 09:21:34 … not the right people in the room 09:21:38 … 3. Questions 09:21:39 but we have a breakout session on it 09:21:52 … is protecting against PM worth the risks? 09:22:07 … confusing users, encouraging relatively trivial attacks 09:22:19 … is the use of encryption without auth appropriate? 09:22:23 [the breakout could be about recoginizing the importance of UX/UI, not designing the interfaces right here] 09:22:30 … is failing encryption silently appropriate? 09:22:42 … are either appropriate for new protocols 09:23:00 … are there alternate ways to overcome deploument issues of "full" encryption? 09:23:19 … finally, what other work is impliated by ubiq-encrypt? 09:23:40 SMB: let the games begin! 09:24:22 Dave Crocker: would like to challenge a premise that was put forward twice 09:24:29 … about getting confused for having more states for security 09:24:42 … the assumption is with HTTPS that we don't already have a lot of confusion 09:24:48 … users don't undersand HTTPS 09:24:58 donnelly has joined #strint 09:25:03 … we should stop using the word security… means too much and too little 09:25:33 Larry Masinter: there's a gap b/w protecting against PM... 09:25:46 … does OE help at all? 09:25:56 Farrell: enc does help! 09:26:01 Larry: not clear to me. 09:26:16 … not clear to the vulnerable populations… mainly concerned about phishing or use of private info. 09:26:45 … since this doesn't protect against active attacks 09:26:47 [even so, that doesn't mean we shouldn't protect the other parts of the population] 09:26:54 … interferes with anonymizers 09:27:12 @@: start with terminology 09:27:15 dacheng has joined #strint 09:27:19 dacheng has left #strint 09:27:22 ldaigle has joined #strint 09:27:22 … when we talk about fail-safe, that's not right… 09:27:33 … it's about do we succeed at all in getting encryption 09:27:47 Ted_ has joined #strint 09:27:55 cabo has joined #strint 09:28:00 @@@: there are more states in the world than auth/unauth 09:28:10 s/@@@/Danezis/ 09:28:10 s/@@/Max Pritkin/ 09:28:25 … having after-the-fact evidence of MITM is very valuable 09:28:26 dacheng has joined #strint 09:28:48 … we should rephrase this whole auth/noauth debate into what kind of evidence do you have that you're speaking to the right person? 09:28:56 … not just a binary thing… much more nuanced 09:29:13 Coop: cute setup! 09:29:25 … user confusion is an issue but we can't talk about it? 09:29:40 … very important as this problem is conceptualized too much about what will be exposed to users 09:29:51 … no reason that OE can't be hidden entirely from users 09:29:54 W3C has joined #strint 09:29:59 (lots of hear hears!) 09:30:15 DKG: was going to say that as one point... 09:30:29 … confusion is not possible to talk about without some UI discussion 09:30:42 Ted_1 has joined #strint 09:30:42 … there are existing mechanisms that expose things like this… OTR is an example 09:30:57 +1 to usability being a vital topic here. 09:31:01 … also, the other axis… auth/anonymous… should be auth/no auth 09:31:31 mnot: to be clear: not suggesting terminology that should exist past 10:30a GMT today 09:32:00 Peter Resnick: want to reenforce that we really want to have no user exposing of the details at all 09:32:05 … if they are seeing it, it's a mistake 09:32:22 … to Larry's point, does not believe for a minute that this is not helpful in some way 09:32:33 … claim is that this doesn't allow anonymizers to work is rubbish 09:32:41 … now you fail in cleartext 09:32:55 … would much rather have underlying encryption that helps users not be in the clar 09:33:02 s/clar/clear/ 09:33:29 Kenny Patterson: speaking on behalf of cryptography community (apologizes for that)... 09:33:37 … OE has a very specific meaning in crypto community 09:33:44 … very different from what we're talking about here 09:33:50 … have no idea what to call it 09:34:08 PHB: thinks that the term fail-silent may be confusing... 09:34:16 … wants "succeed-silent" 09:34:37 … wants there to be an IETF rule that there can be no "Do not talk about the UI" from henceforth 09:34:55 … we already have OE… it's called Domain-validated certs without checking OCSP 09:35:08 … all browsers do this for the sake of shaving ms off of latency 09:35:20 PHB is so right about succeed-silent 09:35:22 … some folks are determined to make us secure only with low latency 09:35:41 hildjj has joined #strint 09:35:44 Steve Kent: with regard to use of pseudonymous creds, we do need to be careful 09:36:07 … given the confusion with UI, we shouldn't assume [something] 09:36:29 … things that encryption by default is not always a good thing, in net 09:36:49 … the use of battery on mobile devices should be part of the discussino 09:37:03 SMB: half of people have spoken that UI is iimportant 09:37:22 (asks for a show of hands… rules that the overwhelming sense of the room is that it is important) 09:37:38 Russ: many years ago, SMB and Russ wrote a draft about automated key mgmt 09:37:45 alfredo has joined #strint 09:37:55 … need a similar statement where if you have an environment that supports encryption, it should be on by default 09:38:15 Rigo: want to insist that we should decouple encryption and auth 09:38:40 … rigo's paper talks about how [something] is totally broken in auth across all protocols 09:38:48 … wants a cognitive scientist to weigh in 09:39:03 EKR: finds this discussion unmoored from reality 09:39:15 … at the HTTP interim in Zurich we talked about this 09:39:38 … encryption tied to an auth cred, although not authenticated encryption 09:39:54 One question that seems to be missed here: if the goal is to raise the cost to the attacker, does the inclusion of authentication increase those costs? The answer seems to me be yes, since it makes the cost of active attack much higher. 09:39:57 … when it came down to what we really wanted to do… we foundered 09:40:05 … some problems: 09:40:24 … 1. on side there was concern that network environments are important 09:40:39 … on the other side there were people that do not want encryption not tied to identity 09:40:58 … when we provisionally agreed to do this, trying to do it in HTTP was very difficult 09:41:06 … due to the interaction model and what servers can assume 09:41:17 … huge gap between "that'd be nice" and how to get there 09:41:17 Ted_1: this is true, but its not always an available option 09:41:26 mnot: doesn't think the discussion foundered 09:41:35 … ruled out the absolutish perspectives 09:41:40 … and are doing some testing 09:41:47 … it's TBD 09:42:11 smb: We haven't foundered, we're becalmed 09:42:25 Orit Levin: encryption helps with not only PM but a lot of other things 09:42:33 BenL: I agree, but if you are persuaded by the idea, then the question may be how to narrow the number of cases where it is not an available option and be transparent on the cases where it still is not. 09:42:46 … while we're talking about OE and auth/noauth… how can we talk about it when we don't know what auth or noauth is? 09:43:03 … there is a zoo of things in there 09:43:17 … what do we mean by auth vs. noauth? 09:43:35 Dan Appelquist: about usability 09:43:50 kenny has joined #STRINT 09:43:58 … when engineers talk about users, they mix usability, UI, UX, etc. 09:44:04 … they mix them all up 09:44:13 … what we're talking about here is "user considerations" maybe 09:44:33 … said well yesterday with "making it safe for users to buy stuff online" 09:44:43 … it's about what we want them to understand about security and auth 09:44:53 Ted_1: right, so that's why PAKEs and OS-level password stores are important: often I already have a password-authenticated relationship with the other end - we can leverage that up to authenticated channels 09:45:18 Dan again: dangerous to say that x protocol doesn't have a user 09:45:29 … for email, the user is the person reading the email 09:45:30 BenL: agreed 09:45:32 btw, "authenticated channel" vs "authenticated encryption" might fix the cryptographer confusion problem 09:45:38 … in IoT there are users connected by IoT 09:46:24 Pete Resnick: with psuedonymous the assumption is that there is no encryption at the auth level 09:46:46 … it's for the later step when you know what the connection is that you can name it something 09:47:06 ldaigle has joined #strint 09:47:14 Wendy Seltzer: speaks in favor of incremental improvements 09:47:15 wseltzer: wants incremental improvements 09:47:36 … can we recognize that encryption in the middle doesn't solve all problems but raises costs for the attacker 09:47:49 … don't want this incremental to block further ones that might do an even better job 09:48:14 … but because it doesn't solve all our problems, that's not a good excuse to not do it 09:48:26 Pat McManus: spent the past 6 months deep in this for HTTP 09:48:47 … unauth for HTTP URIs has a few very attractive properties and a few unattractive ones 09:49:02 … the biggest pro is that it's a drop-in replacement 09:49:24 … incentives have to be nontrivial to do things that are not so easy 09:49:39 … making this plug-and-play is crucial 09:49:48 … distinction between auth/unauth is not a binary one 09:50:00 … pinning is an example of a stepping stone 09:50:16 … has a FF build that does OE and alternate services 09:50:27 … will tweet out a link if you'd like to play 09:50:49 … neither Chrome nor Firefox will ship HTTP2 in an unencrypted fashion 09:51:01 … may be forced to compete on cleartext HTTP2 protocol 09:51:27 @@@@: with encrypting in the core... 09:51:39 s/@@@@/Melinda Shore/ 09:51:39 s/@@@@/Melinda/ 09:51:41 … on problem with UI, is that applications don't always know their security state 09:52:01 … middlebox issues are getting short shrift 09:52:22 … IETF/W3C are a bit disavantaged by not having network operators in the hizzy 09:52:28 dcrocker has joined #strint 09:52:31 … they're a big deal. 09:53:03 Eliot Lear: need to refine our threat model for middleboxes and OE 09:53:13 … if there are specific actions that we should take, please state them. 09:53:30 SMB: need to talk about the "trust model" of a middlebox environment 09:54:06 Ted Robie: what's the user expectation when a TLS setup is interrupted... 09:54:15 … one of the parties that doesn't know that is happening is the server 09:54:39 … there can be parties that are not aware that they may not be talking to who they want to be talking to 09:54:57 … one other point: for this threat model, what is it that accomplishes raising costs to attackers? 09:55:08 … agrees with Wendy that we want to think incremental 09:55:28 … there are a whole series of steps (e.g., TOFU) that go even further than just turning on enc 09:55:43 … not getting caught is a bit part of the attacker considerations here 09:55:53 … want to rais the attacker's costs as much as possible 09:56:05 … will force more targeted surveillance/attacks 09:56:05 s/Robie/Hardie/ 09:56:16 Ted_ has joined #strint 09:56:26 Leslie Daigle: wants to come back to Dan A.'s point about how users feel... 09:56:36 rrsagent, please draft minutes 09:56:36 I have made the request to generate http://www.w3.org/2014/03/01-strint-minutes.html rigo 09:56:37 … worked for Verisign when it did certs and cared about auth email 09:56:44 GregWood has joined #strint 09:57:03 … how the user feels is not something we can do about with network/software engineering 09:57:31 … we look at this unauth enc from what we can achieve and can we win with it 09:57:48 … if we do anything that changes the user's state of mind… rathole. 09:58:17 Steve Kent: it's not anon or pseudon enc, but keying... 09:58:26 … it's the key mgmt that gets us into this situation 09:58:36 … anonymous should be viewed in an accurate fashion… 09:58:46 we're not asserting an identity so that you can't infer one 09:59:15 … the problem with CAs/certs is that a pseudonymous auth and attack are not clearly distinguishable 09:59:39 Ted_1 has joined #strint 09:59:53 DKG: of the folks taling about UI, everyone is talking about end user 10:00:01 … there are other users… e.g., sysadmins 10:00:15 … however we do this, the sysadmin will feel like they've done enough 10:00:43 @@@@@: would like to raise a point for integrity... 10:00:58 … he cares much more about integrity than surveillance 10:01:06 s/@@@@@:/Alfredo:/ 10:01:14 … blocking an active attacker is very important for integrity 10:01:26 … the OE schemes proposed are not enough to get strong integrity protections 10:01:36 Kay Engert: doesn't like OE 10:01:53 … thinks it should be called "blurring" 10:01:57 … any encryption should use some sort of auth 10:02:06 … we focus largely on the CA model 10:02:08 s/Kay/Kai/ 10:02:17 … we should start to intro alternative forms of auth 10:02:40 … what about submitting a key to a public block 10:02:55 I think he means "locker", not block 10:03:01 But I may misunderstand 10:03:10 … email-validates self-signed certs are not a bad idea 10:03:19 s/validates/validated/ 10:03:21 he said public log 10:03:32 like in CT 10:03:33 BenL: thanks for the clarification 10:03:34 Melinda has joined #strint 10:03:34 … encryption is only encryption if you've coupled it with some sort of auth 10:03:36 ah 10:04:00 … user feedback that is really secure needs 2FA 10:04:31 Hannes T: in IETF there are folks that hope that some types of encryption aren't deployed... 10:04:33 s/???/Kai Engert/ 10:04:41 kaie has joined #strint 10:05:06 … some companies are selling boxes and wouldn't be happy with [encrypt everywhere] 10:05:42 Pete has joined #strint 10:05:46 PHB: if we assume the adversary is disclosur-adverse… we don't need to validate creds before we complete transaction 10:06:01 … if we can detect active attack subsequently, that's an important attacker consideration 10:06:27 … what about checking only in, e.g., 1% of cases, we can likely deter an adversary from an active attack 10:06:41 … as they wouldn't know if they're going to be detected 10:07:24 Max Pritkin: we need to think more about the sysadmin experience 10:07:36 rrsagent, make minutes 10:07:36 I have made the request to generate http://www.w3.org/2014/03/01-strint-minutes.html wseltzer 10:07:53 … these are ways of offloading security from the end user to the sysadmin, that might help 10:08:11 Linus tomberg: I think the auth/enc separation is very valuable for us 10:08:38 SMB closes layering discussion for a bit later 10:08:40 s/tomberg/Nordberg/ 10:08:53 RLB: notion of TOFU has been raised... 10:09:01 … wants to inject operational reality 10:09:23 … everyone has run into an SSH server where the keys have changed 10:09:35 … need some way of managing changes in keys for key continuity 10:09:43 … we have a pinning draft that has matured in websec 10:09:51 … not a lot of interest in deployment 10:10:09 … there are risks in mismanaging pins and accidentally shut yourself off the internet 10:10:17 … there are reall deployment concerns here 10:10:27 s/reall/real/ 10:10:54 SMB wants to focus discussion in a few areas: 10:11:06 … layering, separating auth from enc 10:11:16 … can't separate them cleanly 10:11:34 ldaigle has joined #strint 10:11:36 Hannes: are we talking about handshake? or what? 10:11:46 arobach has joined #strint 10:12:02 SMB: is hearing a lot of people saying let's separate how we do encryption with who is at the other end 10:12:15 … do people think this is the right way to go? show of hands. 10:12:47 (large but not overwhelming consensus… dispute on numbers) 10:13:10 Farrell: Russ and Cullen disagreed 10:13:37 Hannes says we do this now… people say that TLS doesn't do this 10:13:51 mnot: this has implications for UI 10:13:55 (room groans) 10:14:34 Farrell: maybe "we should not be tightly binding methods for end point authentication with how we do encryption" 10:14:39 (show of hands) 10:14:56 Eliot lear: I'd like to see a discussion written down about it 10:15:11 (hands had a lot of agreement with Farrell's statement" 10:15:33 EKR: someone give me an example! 10:15:44 SMB: unauth DHE to start the crypto and then you sign it later 10:16:07 SMB: on to comprehension issue 10:16:19 … what will people understand and how will this affect their behavior? 10:16:23 … does it matter? 10:16:24 sftcd: CMS requires a serial number before you can encrypt 10:16:24 other example was CMS requires issuer and serial number 10:16:49 … SMB doesn't know if his email server is using STARTTLS with any given recipient 10:17:13 PDE: one thing from Crome team… can't do this, won't do this because people won't do real HTTPS 10:17:25 SMB: we don't tell the users, we just do it 10:17:29 (rabble rabble rabble) 10:17:43 alfredo has joined #strint 10:17:46 mnot: this is the admin experience 10:18:27 Orit: it's not about the end-user or the sysadmin 10:18:39 … we need to make clear among ourselves what we're talking about 10:18:39 rrsagent, please draft minutes 10:18:39 I have made the request to generate http://www.w3.org/2014/03/01-strint-minutes.html rigo 10:19:07 Farrell: folks clearly will write a terminology RFC 10:19:21 SMB: another point that came up: who are the trusted parties/devices? 10:19:35 … who is going to assert/vouch for identities 10:19:45 Lear: this is an important question… session later 10:20:00 SMB: finally, the cost of these issues is important 10:20:08 … CPU, battery, comprehension costs 10:20:32 Dave Crocker: the list you have of things we need to work on is great. 10:20:49 … like that when we talk about actors involved, need to include users, sysadmins and us. 10:21:00 … what about goals? What is the "this" that we're trying to accomplish 10:21:15 SMB: talked yesterday about that, didn't want to raise it 10:21:23 Aaron Kaplan: layering and costs are very important points 10:21:45 … think about DNSSEC… good stuff, but big amplication factor in terms of DoS potential 10:22:02 jari: voluntary adoption works best in this case 10:22:10 … not forcing anyone to do anything 10:22:33 Jon Peterson: interested in what happens if nobody knows if encryption happens… will this spread to other places 10:22:43 … and what are the costs of that "slippery slope" 10:22:52 … you will have huge sizes and latencies eventually 10:23:14 already happens with ECC, right? Ethernet has a checksum, so does IP, so does TLS... 10:23:25 Steve Rogers: this can be difficult on a mobile network 10:23:33 … especially with satellite backhaul 10:23:50 BenL: you forgot TCP... 10:23:59 Linus Nordberg: layres should deal with that 10:24:14 Rogers: just want to acknowledge that these problems exist 10:24:32 … solutions now do things like remove encryption to improve things in restricted environments 10:25:04 PHB: we have a lot of companies with certs... 10:25:16 In an internetworking context, the presence of encryption on a particular path is not a guarantee that the encryption will continue to be present. Using at a layer that is not path dependent is required to retain confidence. 10:25:17 … and they don't turn on SSL except for auth and check-out 10:25:29 … in 1995 encryption was $$$ 10:25:34 dougm has joined #strint 10:25:49 … it's now cheap but we have remanants of these effects 10:26:40 @@@@@@: are we saying that there are cases when authentication is not desirable? 10:26:46 SMB: yes, that is in scope 10:27:11 @@@@@@: what about making auth more ubiquituous? 10:27:18 SMB: because it's particularly hard 10:27:39 Dana: if the point is to protect against PM... 10:27:54 … then we clearly want to encrypt as much as possible to avoid examination 10:27:55 hhalpin has joined #strint 10:28:20 @@1: an encrypted web is a less-cacheable web 10:28:34 … planes with satellite backhaul, the interplanetary web 10:28:56 Lear: there are entire countries that rely on caching... 10:29:11 s/@@1/Dan Appelquist/ 10:29:11 … can't ignore it. Let's not dismiss it. 10:29:21 Lear: Madagascar is one 10:29:33 (talking about break-outs) 10:30:43 Wendy: want an IRC channel for each of these 10:31:17 thanks, JoeHallCDT! 10:38:54 [breakouts in irc, subject to change: #research, #browser, #onbydefault, #measure, #opportunistic] 11:05:06 JMC has joined #strint 11:05:28 npd has joined #strint 11:05:50 jschlyter has joined #strint 11:05:58 dka has joined #strint 11:06:02 hildjj has joined #strint 11:06:37 cabo has joined #strint 11:06:41 [discussion of breakouts] 11:06:57 DThaler has joined #strint 11:07:07 Pete has joined #strint 11:07:26 Satoshi has joined #Strint 11:07:49 mcmanus has joined #strint 11:08:04 Thinking laterally, Why don't we just get the intel services to quiet down by giving them a copy of the Internet backup? 11:08:05 PhilippeDeRyck has joined #strint 11:08:55 Zakim has left #strint 11:10:02 scribenick: wseltzer 11:10:13 Topic: Metadata 11:10:15 JoeHallCDT has joined #strint 11:10:22 wseltzer: you missed #client from the list of breakouts 11:10:22 Alfredo: What is metadata? 11:10:56 kodonog has joined #strint 11:11:03 wendyg has joined #strint 11:11:04 dougm has joined #strint 11:11:16 metadata is the interesting data which is used to justify and execute drone strikes 11:11:25 ... "everything that is not encrypted is metadata"? 11:11:45 ... let's start there and get more precise 11:12:01 hhalpin has joined #strint 11:12:05 ... additional data added to the encrypted payload, e.g., addressing information 11:12:18 ... does identity need to be coupled with recipient address? 11:12:33 ... side-channels, info disclosed by nature of the communication 11:12:38 yeah can we please not use #browser (point yesterday was stuart's discussion is not limited to browser). #client is better. 11:12:45 ... e.g. time, size, pattern 11:12:50 Metadata is now a propaganda term used to change the discourse, adopting the language of the national security agencies means playing according to their rules. 11:13:08 DThaler, sure, amendment accepted. #client instead of #browser 11:13:42 barryleiba has joined #strint 11:14:05 Alfredo: metadata is widely available; encrypted variants are not widely deployed 11:14:16 isn't that incorrect? 11:14:32 aren't all consumer OSs not doing MAC-based IPv6 11:14:42 ... Can we have transparent metadata protection? 11:14:52 ... challening for efficient routing. 11:15:03 ... With application cooperation? 11:15:24 ... i.e., if application indicates sensitive or linkable information 11:15:31 @joe: I don't know about "all" but certainly Windows isn't. And there's work in the IETF trying to either deprecate it or at least not use it by default, to match implementations 11:15:53 Alfredo: exploiting metadata 11:16:10 ... browsed content, document flow 11:16:27 thanks, Alissa has a blog from last year that points to other OSs too: https://www.cdt.org/blogs/alissa-cooper/0706privacy-future-forever 11:16:37 -> http://down.dsg.cs.tcd.ie/strint-slides/s5-1metadata-pironti.pdf Slides 11:16:47 see http://tools.ietf.org/wg/6man/draft-ietf-6man-default-iids 11:16:51 s/Slides/Alfredo's slides/ 11:16:53 thanks! 11:16:55 dacheng has joined #strint 11:17:39 drogersuk has joined #strint 11:17:44 Alfredo: Federated communication 11:19:03 Ted_Hardie: Mitigations, a bit less hopeful than solutions 11:19:18 -> http://down.dsg.cs.tcd.ie/strint-slides/s5-2metadata-hardie.pdf Ted's slides 11:19:38 Ted: Metadata in a flow, from the simple fact two parties are communicating 11:19:39 pde has joined #STRINT 11:19:43 @Joe: I checked the blog you pointed to and Alissa is talking about enabling privacy addresses. That doesn't mean nodes don't ALSO have mac-derived addresses. 11:19:53 ... mitigations require a confidential channel 11:20:14 ... not much use protecting the metadata on plaintext content 11:20:35 ... Possible mitigations: aggregation, contraflow, multi-path 11:20:58 ... raise the cost of pervasive surveillance 11:21:39 ... If you have a tap on aggregate data, you know flow originates from pooling point, but not individual behind it without more expense 11:22:31 ah, thank you, sir 11:23:34 ... Contraflow. tunneling forces attacker to do more correlation 11:24:27 ... Multipath. e.g. split tunnel VPN 11:24:50 ldaigle has joined #strint 11:26:15 ... Design considerations. Make sure your protocol works inthe face of these mitigations 11:26:51 s/inthe/in the/ 11:27:56 ... combinaing mitigations may be better; consider how to avoid mitigation itself triggering scrutiny 11:28:01 ... nothing is perfect 11:28:47 bht has joined #strint 11:28:58 Alissa: Questions. Are there any low-hanging fruits? 11:29:16 ... Distinction between hidiing identity attributes, other information 11:29:33 rrsagent, please draft minutes 11:29:33 I have made the request to generate http://www.w3.org/2014/03/01-strint-minutes.html rigo 11:29:54 askan has joined #strint 11:29:55 Achim: Terminology point 11:30:13 ... metadata is technically data about data, but we're talking about first-class data 11:30:29 ... it's unfortunate that we're confounding the terms 11:30:42 ... In Europe, the legal system talks about traffic and location data 11:30:58 ... I's data about people, of course it's worth protecting. 11:31:05 s/I's/It's/ 11:32:23 SpencerDawkins: It's not always obvious when we've achieved multicast. False diversity if all paths connect over the same fiber 11:32:30 JCZuniga has joined #strint 11:32:41 ... difficult to know whom you can ask, whom you can trust 11:33:04 alfredo has joined #strint 11:33:22 GeorgeDanezis: I've spent 15 years studying traffic analysis, and recommend that we not re-invent the work of that research community 11:33:34 I think s/multicast/multipath/ in spencer's point 11:33:49 ... Useful here to discuss the different threats against which we can protect users 11:33:52 akatlas has joined #strint 11:34:01 dacheng has joined #strint 11:34:21 Dp has joined #Strint 11:34:22 ... Design protocols not to have fixed bit strings that are unencrypted, that allow easy packet selection for analysis 11:34:47 lear has joined #strint 11:35:24 CullenJennings: VPNs are expensive to run, so either you need to pay, or it's incredibly slow 11:35:52 ... worried that there's a systematic attack in some places on for-pay VPN service 11:36:05 ... so can we tie them to other services that are more painful to turn off 11:36:28 EliotLear: Who's the "you" in "if you have the data, you have the metadata"? 11:36:46 ... different between a trusted aggregator and an attacker 11:36:58 crypt has joined #strint 11:37:28 LarryMasinter: Useful to distinguish explicit data from observed data 11:37:52 donnelly has joined #strint 11:38:15 GregWood has joined #strint 11:38:18 NickDoty: Low-hanging fruit, data-minimization isn't easy 11:38:40 ... we might need to do the slow haul through protocols, to ask about each what data we can hide 11:39:12 ... which attackers can we foil? e.g. in fingerprinting 11:39:28 BrianTrammell: Agree with both Nick and George 11:39:55 bjoern has joined #strint 11:40:05 ... much harder to fix timing observation than constant bit-strings 11:40:16 vonlynX has joined #strint 11:40:28 ... timing is result of good engineering, for bandwidth and latency minimization 11:40:44 ... if you want to change timing, you'll need to increase bandwidth and latentcy 11:40:53 ... Split the two kinds of metadata 11:41:02 s/latentcy/latency/ 11:41:02 that's why i couldnt join this irc for an entire day... it DISALLOWS TLS! 11:41:52 vonlynX, sorry, we've raised the question with W3C systems 11:42:09 George: envelope information vs side-channels, perhaps 11:42:45 PeterEckersley: Can we get a write-up of the worst offenders, e.g. worst bit-strings, so we have a target for fixes 11:42:53 George: Happy to try 11:43:40 HarryHalpin: Traffic analysis is scary. Not everything has the latency constraints of HTTP. 11:44:07 ... e.g. work on email 11:44:17 SteveKent: Avoid the term metadata 11:44:41 ... traffic analysis: externally visible characteristics of communication once you've applied encryption 11:44:44 right, strong anonymity _requires_ high latency 11:44:50 or at least, not low latency 11:44:54 ... what's visible is a function of at what layer you've applied the encryption 11:45:21 btw, nice how naturally w3c/ietf uses irc today... i remember the pains it took to convince ietf to publish "informational" rfcs on irc at a time when it was considered child play stuff 11:45:30 ... Distinction makes threat-model consideration clearer 11:46:02 EricRescorla: There are opportunities for stripping some fat, explicit strings 11:46:16 ... I'm skeptical that we can reduce traffic analysis 11:46:40 ... and that we can avoid identifying the seekers of greater protection from traffic analyssis 11:47:39 Ted: It's true we've spent a lot of time on performance engineering, but where we've wanted confidential channels, we've been willing to spend bandwidth and latency on it 11:47:54 ... so we should consider that tradeoff here 11:48:14 ... We should be worried about impacting users in a way that makes them want to turn confidentiality off 11:48:36 ... But consider that confidentiality requires both payload and traffic obfuscation 11:48:47 ... That's a first-order engineering problem. 11:49:46 LinusNordberg: Security. @@ [scribe missed] 11:50:03 ... Anonymity loves company. Sometimes we'll need to force people to opt in. 11:50:38 Eliot has joined #strint 11:51:07 HarryHalpin: There are large communities who would want to opt-in to greater security/confidentiality. 11:51:38 Alissa: It's one question to say, "can we do something better for everyone," and another to ask "can we make solutions for those who want them." 11:52:13 Spencer: People who think PM matters may not be the same people who have to pay, right now. 11:52:32 ... we're usually opt-in 11:53:02 DanielKahnGilmor: Crypto community has consensus that all crypto operations need to be constant-time 11:53:02 In particular, there are protocols where resistance to traffic analysis will be virtually impossible (HTTP/Web browsing due to its bursty nature), but there's *lots* of protocols (particularly server-side) in e-mail, chat, and even VOIP where this is likely possible but parameters and options for sysadmins are unknown/do not exist. 11:53:10 ... there, we're willing to incur overheads 11:53:34 SteveKent: Concern/objection to all incurring expense to protect some users. 11:53:35 We should allow people who want to take on the overhead an ability to take that overhead on. 11:53:43 Right now with current protocols that is hard. 11:53:57 Part of it is a lack of research, which is beyond standardization. 11:54:14 However, there are some protocols (SMTP comes to mind) where this is low-hanging fruit. 11:55:02 KathleenMoriarty: Previously, split tunneling for performance, VPN for security; Interesting now to bring them together 11:55:21 ... Leverage the expertise of the diverse set of experts we have here 11:56:06 HannesTschofening: Action items, I've heard from George that we should look for what identifying strings can be stripped. 11:56:39 Alissa: It would be good to have that journey informed by experience. 11:57:06 ... When someone wants to add an identifier, they argue "so much else is exposed, I should be able to add this user-identifier." 11:57:23 ... If you want to strip other strings, you'll need counter-argument to that. 11:57:37 ... maybe PM-thinking helps, but it's an uphill battle. 11:57:44 triangulation of data might be answer to arugment needed - tiny bits that match up and toegether expose a great deal. every time remove a bit makes it a little harder/ 11:58:16 Farrell: Engage people with expertise, but if they come up with solutions the implementers don't care about... 11:58:55 LeslieDaigle: Not ready to be a strong proponent of aggregation or obfuscation, but also not ready to call them non-starters 11:59:16 ... You never know when you'll need protection, so don't assume it's limited to helping a few 12:00:01 MarkDonnely: Re overhead, perhaps we can leverage existing privacy modes of Web browsers 12:00:23 ... standardize the metadata-hiding functions and encourage browsers to implement in their protected-mode 12:01:30 NickDoty: Tragedy of the commons re: "I'm just adding one more identifier"; that's why it's useful to have coordinating bodies 12:02:00 ... so W3C's Privacy Interest Group is trying to look across new protocols, entire ecosystem, to develop minimization that works 12:02:21 ... So IETF, W3C, talk to us about systemic privacy and security reviewing. 12:02:42 Alissa: we're having a meeting Monday 12:03:04 PhilZimmerman: For a performance burden that's a small penalty, it's worth doing for everyone 12:03:16 ... that argument was once made against TLS, now we're pushing it everywhere 12:03:26 ... AES is now part of Intel's instruction-set 12:03:27 ldaigle has joined #strint 12:03:43 ... We can justify some incremental penalty in the interest of protecting everyone 12:04:05 ... even if only a small fraction regards it as critical to staying alive in an oppressive regime 12:04:41 DKG: We need to fix all the leaks, not point elsewhere to explain why we're not fixing our protocols. 12:04:50 ... SNI, fix both TLS AND DNS leaks 12:05:01 dacheng has joined #strint 12:05:16 in general, I hate the argument that we should not fix X because Y is also broken 12:05:26 Eliot: To PZ and Leslie, saying we can pay a penalty, who's "we"? 12:05:56 ... @@missed 12:06:13 BTW, making sure "protected mode" actually makes sense and is an intersting possibility of future standardization if browser vendors have interest. 12:06:48 Alissa: We have anaction item for George, 12:07:06 ... I like the idea of looking for an easy minimization opportunity. 12:07:23 Farrell: It would be even more interesting if implementers and deployers were interested 12:07:35 Ted: Corner StPeter and the XMPP community 12:08:29 RFC 1149 is suitable for reducing traffic analysis. Perhaps by using anti-radar paint… 12:08:36 JoeHildebrand: XMPP has yet another series of addresses and metadata 12:08:50 ... might be a good playground 12:08:59 ... analogy to layer 3 issues, not perfect 12:09:01 ldaigle has joined #strint 12:09:16 hhalpin: Email communities 12:09:24 1149 has good multipath properties. aggregation gets really difficult though. 12:09:31 ... subsets thereof 12:09:51 ... activist communities, providing email, specifically 12:09:53 arobach has joined #strint 12:10:44 [scribe misses some argumentation] 12:11:05 @@: start from scratch, rather than back-filling existing protocols 12:11:47 Alfredo: XMPP is interesting, because it has a live stream of information 12:12:02 In a competitive (price, performance, services, security) un-regulated market - these new security capabilities must win the competition with market sectors that matter. 12:12:29 Alissa: Some disagreement whether techniques are worth the cost. Ongoing discussion 12:12:39 [Lunch] 12:12:45 rrsagent, make minutes 12:12:45 I have made the request to generate http://www.w3.org/2014/03/01-strint-minutes.html wseltzer 12:13:01 Meeting: STRINT, Day 2 12:13:59 i/we're starting/Topic: Opportunistic Encryption 12:14:13 rrsagent, make minutes 12:14:13 I have made the request to generate http://www.w3.org/2014/03/01-strint-minutes.html wseltzer 12:14:32 my intervention was, end-to-end/onion routed encryption is essential in the fight against visible transaction data and text-based syntaxes are quite unsuitable for simple band-aid fixes.. also the federation architecture isn't really useful to that aim.. we had discussions on the xmpp standards list and agreed that meta data protection is outside a reasonable scope for xmpp. 12:15:38 rrsagent, make minutes 12:15:38 I have made the request to generate http://www.w3.org/2014/03/01-strint-minutes.html wseltzer 12:16:23 new communication technologies are propping up that achieve this goal already, people just have to use other software. it is low hanging fruit to improve those programs and protocols used in them. we keep a list of such technologies at secushare.org/comparison 12:16:42 jphillips has joined #strint 12:20:54 ldaigle has joined #strint 12:50:42 mcmanus has joined #strint 12:53:30 jphillips has joined #strint 12:56:33 AndChat|372521 has joined #strint 12:58:38 Ted_ has joined #strint 13:01:18 Ted_1 has joined #strint 13:01:19 bht has joined #strint 13:03:26 ldaigle has joined #strint 13:05:35 grothoff has joined #strint 13:05:51 cabo has joined #strint 13:06:34 bht1 has joined #strint 13:06:45 pde has joined #STRINT 13:08:07 npdoty has joined #strint 13:08:15 alfredo has joined #strint 13:08:16 dka has joined #strint 13:08:19 PhilippeDeRyck has joined #strint 13:08:42 kodonog has joined #strint 13:09:01 I will 13:09:15 Pete has joined #strint 13:09:20 Topic: Deployment 13:09:35 vonlynX has joined #strint 13:09:41 -> http://down.dsg.cs.tcd.ie/strint-slides/s6-deploy.pdf Deployment slides 13:09:44 drogersuk has joined #strint 13:09:59 donnelly has joined #strint 13:10:00 Eliot: (a few minutes missed...) 13:10:17 ... the snoopometer... a view of the attacker 13:11:09 ... sneakometer - using intermediaries as a defense mechanism 13:12:28 Ted_ has joined #strint 13:12:55 ... aggregation examples 13:14:03 ... concentration versus distribution 13:14:34 ... spectrum of which service is more secure and more likely to be attacked 13:14:38 alfredo_ has joined #strint 13:14:48 alfredo_ has left #strint 13:15:24 ... stretch .. who is paying for the the extra paths, how are you paying in terms of quality of service 13:15:27 Ted_1 has joined #strint 13:15:31 cheshire has joined #strint 13:16:54 xm has joined #strint 13:16:57 JoeHallCDT has joined #strint 13:17:07 ... key points - 13:17:16 has someone the streaming URI? 13:17:50 @@@ One way forward, "interferable secure communications"? 13:18:02 Jan Seedorf 13:18:20 ... s/@@@/Jan Seedorf 13:18:44 ... need to look into new technologies the crypto community is developing 13:18:48 sftcd_ has joined #strint 13:18:57 Rigo http://nagasaki.bogus.com:8000/stream10 13:19:01 ... makes good guys technically distinguishable from the bad guys 13:19:29 thanks AndChat|372521 13:20:16 Joe Hildebrand: my paper talked about costs associated with middle boxes breaking services 13:20:29 ... middlebox folks don't get the support calls 13:20:38 Eliot: Questions for the room 13:20:45 hildjj has joined #strint 13:22:04 ... what knobs, what user interface issues, when is PS a good use of resources, can aggregation/concentration actually harm 13:22:19 PHB: this is the deployment session and we aren't worrying about deployment 13:22:38 ldaigle has joined #strint 13:22:58 ... set of profiles that say this is how you lock down the network 13:23:05 ... enables auditing 13:23:18 askan has joined #strint 13:23:36 alfredo has joined #strint 13:24:12 @@@ Gilmore: push back on the snoopometer slide... it is actually cheaper to collect everything 13:24:20 ... you have the pricing backwards 13:24:42 hhalpin has joined #strint 13:25:08 Dave Thaler: economics today means this slide (snoopometer) is not true, it is more about what we would want it to be. 13:27:02 Christian: PRISM program also shows that it is very cheap to get everything 13:27:33 DThaler has joined #strint 13:27:53 Cullen Jennings: differentiate between proxies that are ackowledged/approved of by one end or the other or both 13:27:58 ... generally don't cause issues 13:29:00 ... another category of ones that are not approved by either end and generally cause alot of problems 13:29:11 Stephen: xmpp flag day in may 13:29:30 ... are there other communities doing something similar? 13:30:25 http://technet.microsoft.com/en-us/security/advisory/2880823 13:30:31 Spencer Dawkins: do people think that back to back user agents are enough of a special case ]] 13:30:50 Just to point out to Christian on the Prism revelations about Google: http://googleblog.blogspot.nl/2013/06/what.html 13:30:50 "The new policy will no longer allow root certificate authorities to issue X.509 certificates using the SHA-1 hashing algorithm for the purposes of SSL and code signing after January 1, 2016. " 13:31:11 steve Bellovin: don't much like middleboxes while acknowledging they are sometimes needed 13:31:29 dougm has joined #strint 13:31:51 .... design the middlebox friendly version of this... that won't work with 13:33:20 Ted_1: not giving "direct access" just means that there is a proxy involved. So what? 13:33:20 Max Pritikin: that model that says in some situations middleboxes are ok only works when the server end knows its there 13:33:28 ... server needs to authenticate the client 13:33:49 George: (missed comment) 13:34:02 +1 to Max's point; if *both* parties to a communication aren't aware of the middlebox, the party which is unaware may send traffic it would not if it weren't aware. So the server may have a policy not to send bank details to middleboxen (an entirely rational choice, if you don't know who is running the MiTM) 13:35:05 JoeHallCDT has joined #strint 13:35:34 EKR: browsers are implicit in this problem, 13:35:41 vonlynX has joined #strint 13:35:43 The Hotspot problem gets better with hotspot 2.0 13:35:55 ... until someone tells me how to make, i have no interest 13:36:14 s/implicit/complicit/ in EKR's comment 13:36:16 I think middle boxes use cases can be solved differently: Enterprise policy can be implemented on the end devices. If you own the PC, you can bug it. Caching and optimizing mobile data can be solved by migrating users to a push model: With anonymous encrypted distribution trees 13:36:23 we bring information to each subscriber in an efficient and privacy-preserving way. It also makes it easier to route information around censoring nation state firewalls. Advertising: Whoops, wrong business model. Yet, homomorphic TLS is also an interesting approach. 13:37:06 Resnick: third party that is giving the data and doesn't want to to share, that is the one I don't get 13:38:20 Rigo: service concentration, need to be smarter by distributing more control in addition to the data 13:38:48 Rigo: service concentration: legal access to everything you control and gag order 13:39:09 Jan Seedorf: web traffic acceleration is an example of a use case of interest 13:39:12 ... distribution of data not sufficient, also distribution of control 13:40:15 arobach has joined #strint 13:40:36 Peter Eckersley: agree with EKR that doing something about corporate MITM attacks against employees 13:40:57 ... we should try to do more about hotel networks and such 13:41:23 ... need to get rid of captive portal models 13:41:54 pde, do we really want to encourage an arms race of captchas on captive portals? 13:42:06 For those not aware of 802.11u, the Hotspot 2.0 effort changes how a WiFi connectivity event will occur. 13:42:18 Max Pritikin: client authentication lets the server make decisions 13:43:00 ... if there is going to be a MITM then we need to design for it 13:43:10 Eliot: what I mean by aggregation 13:44:05 ... small service versus large service, # of users 13:44:55 PHB: before we try to disable parts of the network we need to understand what these hotel portals are using 13:45:39 PHB: web content impact on cacheing 13:46:16 alfredo has joined #strint 13:46:21 Patrick: horrible architecture that we want to implement 13:47:05 ... from the points in Joe Hildebrand's paper 13:49:12 Jon Peterson: (scribe was distracted) 13:49:19 Then again, I am being told homomorphic crypto is computationally expensive and from my understanding none of the middle box use cases are compatible to how it operates, unless we reduce privacy (allow middle boxes to detect a request for a certain jpeg etc, which obviously means that the middle box knows which website you are going to). NSFP (not safe for pr0n). 13:49:34 dacheng has joined #strint 13:50:03 drogersuk has joined #strint 13:50:28 oh, we are going back to PICS :) W3C had made POWDER to solve this middlebox problem for the Web 13:50:35 s/(scribe was distracted)/there wasn't any subset of actions and configurations that middleboxes are willing to be limited to, and they don't mind having CALEA compliance as a result/ 13:50:35 Kathleen: can we eliminate malware, the root of the firewall problem, then we can flip this on its head 13:50:55 DAve Crocker: as we make suggestions we should consider the risk of the suggestion 13:51:18 ... changing hotel portals is high risk 13:51:35 ... wrt knobs/levers, haveing an impact here is high risk 13:52:34 Stephen: I really don;t want a knob that says I don't want to route via country A because it won't be effective 13:53:26 Peter Eckersly: need to revisit the captive portal topic 13:53:57 ... dhcp is what it is and we need to build around it 13:54:30 I think captive portals might be more amount branding / advertising / sending traffic than just boilerplate legal agreements 13:55:29 Jan Seedorf: crypto could provide finer grains of control 13:55:58 ldaigle has joined #strint 13:56:08 Barry: how do you know you are connected to the right captive portal 13:56:23 npdoty has joined #strint 13:56:33 rrsagent, pointer? 13:56:33 See http://www.w3.org/2014/03/01-strint-irc#T13-56-33 13:56:54 rrsagent, please draft minutes 13:56:54 I have made the request to generate http://www.w3.org/2014/03/01-strint-minutes.html rigo 13:57:27 EKR: every time we try to wall things off from the middle boxes they find a way around it 13:58:14 http 511 code is defined here: http://tools.ietf.org/html/rfc6585 13:58:48 David Thaler: maybe we can do something to solve the captive portal 13:59:57 doesn't the 511 status code help us with this problem? the status code tells you that this is a redirect because of captive portal authentication required 14:00:15 pde has joined #STRINT 14:00:48 (another scribe failure) 14:01:05 hildjj has joined #strint 14:01:18 alfredo has joined #strint 14:01:42 Hannes: standards that have a little bit more system nature 14:02:27 [break] 14:02:33 Topic: Breakouts 14:04:05 Sounds like Phil brought a rotary telephone while waiting for his Darkphone. 14:11:39 CB has joined #strint 14:22:30 cabo has joined #strint 14:23:10 cheshire has joined #strint 14:26:26 jphillips has joined #strint 14:29:22 jphillips2 has joined #strint 14:32:42 cabo has joined #strint 14:32:58 hildjj has joined #strint 14:33:26 wendyg has joined #strint 14:35:57 alfredo has joined #strint 14:36:16 bht has joined #strint 14:36:37 [breakouts in irc: #research, #client, #onbydefault, #measure, #opportunistic] 14:36:46 JoeHallCDT has joined #strint 14:36:52 npdoty has joined #strint 14:38:35 drogersuk has joined #strint 14:38:43 arobach has joined #strint 14:39:06 dougm has joined #strint 14:39:40 donnelly has joined #strint 14:44:14 Eliot has joined #strint 14:45:02 oleg has joined #strint 14:45:55 dka has joined #strint 14:47:19 ldaigle has joined #strint 14:54:12 dougm has joined #strint 14:56:29 hhalpin has joined #strint 15:01:01 mcmanus has joined #strint 15:02:40 freewill has joined #strint 15:02:45 hildjj has joined #strint 15:03:06 hi everyone 15:03:24 (in break-out sessions, so not a lot of action here) 15:04:10 unfortunately I could not join earlier today 15:04:32 back on in this one at 16:00 GMT 15:04:52 yes just checked the agenda 15:07:14 might be 15:30, actually 15:07:18 (we're a bit early) 15:21:32 Ted_ has joined #strint 15:24:12 Ted_1 has joined #strint 15:24:37 arobach has joined #strint 15:29:32 dka has joined #strint 15:32:34 alfredo has joined #strint 15:34:29 hildjj has joined #strint 15:34:51 pde has joined #STRINT 15:36:42 Ted_ has joined #strint 15:39:32 Ted_1 has joined #strint 15:47:27 alfredo has joined #strint 15:52:56 hildjj has joined #strint 15:55:02 pde has joined #STRINT 15:55:19 cabo has joined #strint 16:00:21 mcmanus has joined #strint 16:01:59 audio down also for you? 16:04:03 mcmanus has joined #strint 16:04:52 bht has joined #strint 16:08:00 freewill, we're still on breakouts/break 16:10:23 wseltzer: okay another break 16:10:28 drogersuk has joined #strint 16:10:36 thx 16:10:52 There is a lot of cake. We need all the breaks. 16:11:05 hehe enjoy 16:12:24 beam me up jphillips 16:13:05 Negative, Heisenberg compensator is still not operational. 16:14:30 hildjj has joined #strint 16:15:07 Ted_ has joined #strint 16:16:14 npdoty has joined #strint 16:16:23 [returning] 16:16:28 PhilippeDeRyck has joined #strint 16:16:31 thanks to npdoty and JoeHallCDT for scribing breakouts! 16:16:39 Topic: Report back from breakouts 16:16:57 scribenick: wseltzer 16:17:09 Cheshire: Good discussion, a few highlights 16:17:27 ... Separate cases: Captive portals, Misconfigurations 16:17:38 ... Third case, self-signed certs. Browser can tell the difference 16:17:57 ldaigle has joined #strint 16:18:09 ... Loose consensus, already a W3C mailing list public-hardfail@w3.org 16:18:34 ... Can implementors do something like World IPv6 Day, 16:18:47 pde has joined #STRINT 16:18:48 Ted_1 has joined #strint 16:19:03 ... where it's clear that no one browser is "broken," but rather the security of websites is being improved 16:19:10 Ak has joined #strint 16:19:17 -> http://www.w3.org/2014/03/01-client-minutes.html Client breakout notes 16:19:22 alfredo has joined #strint 16:19:50 Was it client-hardfail@w3.org? 16:19:59 for the mailing list at w3c? 16:20:02 about encrypted network, is anyone mentioned today that the use of mixing techniques and multi-hop transmission of data must be the norm nowadays for the end user? 16:20:09 Kaplan: Aggregation/measurement 16:20:16 Ted_1: public-hardfail@w3.org 16:20:29 s/Ted_1:/Ted_1,/ 16:20:42 Kaplan: look at the problem at layer 7 and above 16:20:59 ... Testing and measurement; we tried to identify existing groups and interesting tests 16:21:27 vonlynX has joined #strint 16:21:28 mcmanus has joined #strint 16:21:40 ... SSLlabs 16:21:48 ... how to protect testing data? 16:22:06 ... gamification as an approach to spur improvement 16:22:51 Paterson: We talked about research, not about clean-slate 16:23:17 ... Meta challenge in relationship between academics and standards bodies 16:23:43 ... Specific action to bring research on linakbility to attention of IETF, on Linus 16:24:00 ... Specific problems in need of research, non-exhaustive 16:24:12 ... CRIME-inspired; interaction of compression and encryption 16:24:22 ... Pro-active algorithm deprecation 16:24:53 ... Return-oriented crypto; make existence and traffic stealthy 16:25:05 ... Continued guidance on algo selection 16:25:42 ... Efficient PIR 16:25:56 .... Metrics for obfuscation of code and data 16:26:11 ... Specific research in search of applications: 16:26:15 s/PIR/Private Information Retrieval (PIR)/ 16:26:29 ... Limited-interference secure communications 16:26:35 .... Format-transforming ncryption 16:26:43 ... clean-slate designs using DHTs 16:26:53 ... insider threat models 16:27:28 DThaler has joined #strint 16:27:51 SteveKent: Opportunistic 16:28:02 cheshire has joined #strint 16:28:05 ... Preferred term "opportunistic keying" 16:28:12 ... focus on passive attack model 16:28:27 ... Start with DH/ECH for PFS (perfect forward secrecy) 16:28:55 ... fall back to plain text, or escalate to authenticated (in parallel?) 16:29:14 ... Invisible to users, so they don't think it's replacement for HTTPS 16:29:45 ... report to server? "I tried to contact you using opportunistic keying but couldn't reach you" 16:29:51 hhalpin has joined #strint 16:30:02 ... Threat model: pervasive monitoring, passive attack 16:30:27 ... understand middleboxes, which layers they're operating 16:31:00 Jiangshan has joined #strint 16:31:15 ... this is not a replacement for HTTPS TLS paradigm, explicitly note that in Security Considerations 16:32:00 Resnick: How does escalate-to-authenticated interact with no UI? 16:32:08 Kent: possibly lock icon 16:33:30 EKR: @@ middleboxes 16:33:50 s/@@/policy-enforcing/ 16:34:17 ... user-experience, if fall-back is slow, how does the experience suffer? 16:34:47 Kent: Possible parallel start for plaintext 16:35:30 @@: Discussed in the client session too; need something below the application to provide a uniform interface 16:35:50 ... Might be something to raise in transport-services BOF 16:36:10 Turner: #onbydefault 16:36:22 -> http://www.w3.org/2014/03/01-onbydefault-minutes.html #onbydefault minutes 16:36:44 Turner: More than MTI/on by default = MTU 16:36:53 ... Legacy: On by default but off is available 16:37:15 ... New protocols: put your best foot forward, if you can't, fall back 16:37:34 ... need WG guidance 16:37:47 EKR: what would you expect HTTP2 to do? 16:38:23 Turner: New protocols: 1/ where you can do auth encryption, do it 16:38:30 ... 2/ if not, do unaut encryption / OE 16:38:41 ... 3/ need to indicate up the stack which level was negotiated 16:39:01 ... 4/ Need WG guidance! 16:39:41 Turner: Past Security ADs should write such guidance 16:40:28 @@: Also people who understand applications 16:41:06 Ted: WG guidance is a lovely thing, but WGs are a tiny fraction of those needed for deployment 16:41:14 ... We need marketing. 16:41:45 ... call upon the IETF chair, who just put his hand up. 16:41:55 Jari: I wasn't actually volunteering... 16:42:22 ... IETF will discuss, through normal process 16:42:49 Turner: Russ volunteered, I volunteered 16:43:14 Farrell: Thanks! 16:43:17 Eliot volunteering to write; Jari volunteering to blog 16:43:38 ... Thanks to DKA and Telefonica for hosting! [applause] 16:43:46 ... Summary: 16:44:08 ... Crypto works, do more, raise the bar; not free but worthwhile 16:44:23 ... Data minimization is worthwhile but hard 16:44:33 ... Threat model-> RFC 16:44:48 barryleiba has left #strint 16:44:54 ... Opportunistic keying definition and mechanism cookbook -> RFC 16:45:35 ... Policy: tech community could do better to explain PM 16:45:47 ... UI issues not out of scope 16:45:57 ... gamification, bettercrypto.org 16:46:22 ... easier security configuration 16:46:29 ... can we improve captive portals? 16:46:46 ... add a new RFC to BCP 72 re pervasive monitoring; we're not there yet 16:46:57 ... but should be working toward it 16:47:26 Juan-Carlos Zuniga: IEEE, this was useful to other communities as well 16:47:45 ldaigle has joined #strint 16:47:55 ... we're willing to communicate 802, link-layer, SSIDs 16:48:30 For discussion of hard fail and browser cert problems, see public-cert-hardfail@w3.org 16:48:36 mcmanus has joined #strint 16:48:38 Cheshire: Thanks Stephen, Hannes, Rigo, and all PC [Applause] 16:48:54 [adjourned] 16:48:56 just email "subscribe" to public-cert-hardfail-request@w3.org 16:48:59 rrsagent, make minutes 16:48:59 I have made the request to generate http://www.w3.org/2014/03/01-strint-minutes.html wseltzer 16:49:12 ldaigle has left #strint 17:07:00 freewill has left #strint 17:10:06 pde has joined #STRINT 17:13:44 azet has left #strint 17:20:46 npdoty has joined #strint 17:36:47 dka has joined #strint 18:27:06 cabo has joined #strint 19:19:16 pde has joined #STRINT 19:22:40 cabo has joined #strint 20:36:21 mcmanus has joined #strint 21:42:16 Ted_ has joined #strint 22:02:48 Ted_ has joined #strint 22:05:23 npdoty has joined #strint 22:21:58 dcrocker has joined #strint 22:22:42 Ted_ has joined #strint 22:23:09 dcrocker has left #strint 22:47:54 cabo has joined #strint 23:34:47 hildjj has joined #strint