
From nobody Mon Mar  9 08:55:41 2015
Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47B111A8AA5 for <perpass@ietfa.amsl.com>; Mon,  9 Mar 2015 08:55:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QUoaMz_xnJKF for <perpass@ietfa.amsl.com>; Mon,  9 Mar 2015 08:55:30 -0700 (PDT)
Received: from mail-qc0-x234.google.com (mail-qc0-x234.google.com [IPv6:2607:f8b0:400d:c01::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC37D1A8A6C for <perpass@ietf.org>; Mon,  9 Mar 2015 08:55:25 -0700 (PDT)
Received: by qcyl6 with SMTP id l6so9551208qcy.13 for <perpass@ietf.org>; Mon, 09 Mar 2015 08:55:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=from:content-transfer-encoding:content-type:mime-version:subject :message-id:date:references:cc:to; bh=DJChYltn2jVh2cGW91Lws7YeAjKgBfQELaDhTtAltrA=; b=GZRM0M/cdvixrBd49PqxwUOj1B/vML/F3NsqkKNCwe0SSuaATibKiKbgbAlQwXzNTK Ab3A69Qxur9+JeyxSSyHRIAqiLExS+vYR/ZPQ55yZ+ZeyDuTx8SonvfdvfVr7gVfunI5 hVC6mSsqUyZKZzsuAtmFkt8cVJNrPFs/cB/iIGZR7RsgWuNGBlysyx2XXfGPqGLGk52N y4yfvpLcdUYbPUbfTABc/xkhenxf+BjGeUods3Z9liM4U07B5uWDvlRcwFXOB9LjIbSn B0Vyy+ucTgHS2mq1ZtVK/4fKGr8zpgKg6kFOMR5WgkRS1q7WsmZRHyJsUzS3Smc3BWxe L0jg==
X-Received: by 10.55.27.42 with SMTP id b42mr56092292qkb.73.1425916525230; Mon, 09 Mar 2015 08:55:25 -0700 (PDT)
Received: from [192.168.1.3] (209-6-114-252.c3-0.arl-ubr1.sbo-arl.ma.cable.rcn.com. [209.6.114.252]) by mx.google.com with ESMTPSA id 80sm11772348qhb.26.2015.03.09.08.55.23 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 09 Mar 2015 08:55:23 -0700 (PDT)
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
X-Google-Original-From: Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>
Content-Transfer-Encoding: 7bit
Content-Type: multipart/alternative; boundary=Apple-Mail-79B66364-E81F-4DE4-848C-F16517ED7278
Mime-Version: 1.0 (1.0)
Message-Id: <D7A57F52-9C4F-4569-B2AA-D7F07754562D@gmail.com>
Date: Mon, 9 Mar 2015 11:55:23 -0400
References: <20150309151433.10503.17077.idtracker@ietfa.amsl.com>
To: perpass@ietf.org
X-Mailer: iPhone Mail (11D257)
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/4XfH-BHjzxE2myd34d_kwO0TBWo>
Cc: "ALFRED C MORTON \(AL\)" <acmorton@att.com>
Subject: [perpass] Fwd: New Version Notification for draft-mm-wg-effect-encrypt-01.txt
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Mar 2015 15:55:33 -0000

--Apple-Mail-79B66364-E81F-4DE4-848C-F16517ED7278
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Hello,

If you are interested in sending comments on this draft, please do so in SAA=
G for now.  I sent an intro to that list (hasn't posted yet).  It will also g=
o out to OPSAWG for operator input and collaboration as well later today.

Thank you,
Kathleen=20

Sent from my iPhone

Begin forwarded message:

> From: <internet-drafts@ietf.org>
> Date: March 9, 2015 at 11:14:33 AM EDT
> To: Kathleen Moriarty <kathleen.moriarty@emc.com>, Al Morton <acmorton@att=
.com>, Kathleen Moriarty <Kathleen.Moriarty@emc.com>, "Al C. Morton" <acmort=
on@att.com>
> Subject: New Version Notification for draft-mm-wg-effect-encrypt-01.txt
>=20
>=20
> A new version of I-D, draft-mm-wg-effect-encrypt-01.txt
> has been successfully submitted by Kathleen Moriarty and posted to the
> IETF repository.
>=20
> Name:        draft-mm-wg-effect-encrypt
> Revision:    01
> Title:        Effect of Ubiquitous Encryption
> Document date:    2015-03-07
> Group:        Individual Submission
> Pages:        24
> URL:            http://www.ietf.org/internet-drafts/draft-mm-wg-effect-enc=
rypt-01.txt
> Status:         https://datatracker.ietf.org/doc/draft-mm-wg-effect-encryp=
t/
> Htmlized:       http://tools.ietf.org/html/draft-mm-wg-effect-encrypt-01
> Diff:           http://www.ietf.org/rfcdiff?url2=3Ddraft-mm-wg-effect-encr=
ypt-01
>=20
> Abstract:
>   Increased use of encryption will impact operations for security and
>   network management causing a shift in how these functions are
>   performed.  In some cases, new methods to both monitor and protect
>   data will evolve.  In more drastic circumstances, the ability to
>   monitor may be eliminated.  This draft includes a collection of
>   current security and network management functions that may be
>   impacted by the shift to increased use of encryption.  This draft
>   does not attempt to solve these problems, but rather document the
>   current state to assist in the development of alternate options to
>   achieve the intended purpose of the documented practices.
>=20
>=20
>=20
>=20
> Please note that it may take a couple of minutes from the time of submissi=
on
> until the htmlized version and diff are available at tools.ietf.org.
>=20
> The IETF Secretariat
>=20

--Apple-Mail-79B66364-E81F-4DE4-848C-F16517ED7278
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Hello,</div><div><br></div><div>If you=
 are interested in sending comments on this draft, please do so in SAAG for n=
ow. &nbsp;I sent an intro to that list (hasn't posted yet). &nbsp;It will al=
so go out to OPSAWG for operator input and collaboration as well later today=
.</div><div><br></div><div>Thank you,</div><div>Kathleen&nbsp;<br><br>Sent f=
rom my iPhone</div><div><br>Begin forwarded message:<br><br></div><blockquot=
e type=3D"cite"><div><b>From:</b> &lt;<a href=3D"mailto:internet-drafts@ietf=
.org">internet-drafts@ietf.org</a>&gt;<br><b>Date:</b> March 9, 2015 at 11:1=
4:33 AM EDT<br><b>To:</b> Kathleen Moriarty &lt;<a href=3D"mailto:kathleen.m=
oriarty@emc.com">kathleen.moriarty@emc.com</a>&gt;, Al Morton &lt;<a href=3D=
"mailto:acmorton@att.com">acmorton@att.com</a>&gt;, Kathleen Moriarty &lt;<a=
 href=3D"mailto:Kathleen.Moriarty@emc.com">Kathleen.Moriarty@emc.com</a>&gt;=
, "Al C. Morton" &lt;<a href=3D"mailto:acmorton@att.com">acmorton@att.com</a=
>&gt;<br><b>Subject:</b> <b>New Version Notification for draft-mm-wg-effect-=
encrypt-01.txt</b><br><br></div></blockquote><blockquote type=3D"cite"><div>=
<span></span><br><span>A new version of I-D, draft-mm-wg-effect-encrypt-01.t=
xt</span><br><span>has been successfully submitted by Kathleen Moriarty and p=
osted to the</span><br><span>IETF repository.</span><br><span></span><br><sp=
an>Name: &nbsp; &nbsp; &nbsp; &nbsp;draft-mm-wg-effect-encrypt</span><br><sp=
an>Revision: &nbsp; &nbsp;01</span><br><span>Title: &nbsp; &nbsp; &nbsp; &nb=
sp;Effect of Ubiquitous Encryption</span><br><span>Document date: &nbsp; &nb=
sp;2015-03-07</span><br><span>Group: &nbsp; &nbsp; &nbsp; &nbsp;Individual S=
ubmission</span><br><span>Pages: &nbsp; &nbsp; &nbsp; &nbsp;24</span><br><sp=
an>URL: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a=
 href=3D"http://www.ietf.org/internet-drafts/draft-mm-wg-effect-encrypt-01.t=
xt">http://www.ietf.org/internet-drafts/draft-mm-wg-effect-encrypt-01.txt</a=
></span><br><span>Status: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a=
 href=3D"https://datatracker.ietf.org/doc/draft-mm-wg-effect-encrypt/">https=
://datatracker.ietf.org/doc/draft-mm-wg-effect-encrypt/</a></span><br><span>=
Htmlized: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a href=3D"http://tools.ietf.o=
rg/html/draft-mm-wg-effect-encrypt-01">http://tools.ietf.org/html/draft-mm-w=
g-effect-encrypt-01</a></span><br><span>Diff: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a href=3D"http://www.ietf.org/rfcdiff?url2=3D=
draft-mm-wg-effect-encrypt-01">http://www.ietf.org/rfcdiff?url2=3Ddraft-mm-w=
g-effect-encrypt-01</a></span><br><span></span><br><span>Abstract:</span><br=
><span> &nbsp;&nbsp;Increased use of encryption will impact operations for s=
ecurity and</span><br><span> &nbsp;&nbsp;network management causing a shift i=
n how these functions are</span><br><span> &nbsp;&nbsp;performed. &nbsp;In s=
ome cases, new methods to both monitor and protect</span><br><span> &nbsp;&n=
bsp;data will evolve. &nbsp;In more drastic circumstances, the ability to</s=
pan><br><span> &nbsp;&nbsp;monitor may be eliminated. &nbsp;This draft inclu=
des a collection of</span><br><span> &nbsp;&nbsp;current security and networ=
k management functions that may be</span><br><span> &nbsp;&nbsp;impacted by t=
he shift to increased use of encryption. &nbsp;This draft</span><br><span> &=
nbsp;&nbsp;does not attempt to solve these problems, but rather document the=
</span><br><span> &nbsp;&nbsp;current state to assist in the development of a=
lternate options to</span><br><span> &nbsp;&nbsp;achieve the intended purpos=
e of the documented practices.</span><br><span></span><br><span></span><br><=
span></span><br><span></span><br><span>Please note that it may take a couple=
 of minutes from the time of submission</span><br><span>until the htmlized v=
ersion and diff are available at <a href=3D"http://tools.ietf.org">tools.iet=
f.org</a>.</span><br><span></span><br><span>The IETF Secretariat</span><br><=
span></span><br></div></blockquote></body></html>=

--Apple-Mail-79B66364-E81F-4DE4-848C-F16517ED7278--


From nobody Fri Mar 13 13:53:19 2015
Return-Path: <tbray@textuality.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F9541A711A for <perpass@ietfa.amsl.com>; Fri, 13 Mar 2015 13:53:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.577
X-Spam-Level: 
X-Spam-Status: No, score=-0.577 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qZ8v1FF-l3Sd for <perpass@ietfa.amsl.com>; Fri, 13 Mar 2015 13:53:15 -0700 (PDT)
Received: from mail-la0-f46.google.com (mail-la0-f46.google.com [209.85.215.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 618A21A7032 for <perpass@ietf.org>; Fri, 13 Mar 2015 13:53:15 -0700 (PDT)
Received: by labgm9 with SMTP id gm9so25124251lab.13 for <perpass@ietf.org>; Fri, 13 Mar 2015 13:53:14 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:from:date:message-id:subject:to :content-type; bh=H3MIxHdg4qPfZlUnG26Xkwwobh+B3lYLfp0bsh8VJjw=; b=CSlHj5/K1oxuisk9G1R3lRQ+UNJrRjTWR6BrCPAEaSAhAL49HsEpl+oBbkWRlnhmOP 7HR+LpGb8QPbJStT0XEoAeBf5ge2VBfbMyWe53FDXwyc70FF0EthA+UWNIJ6ayU7VkBL tPTIfS1Quy81PYgHMy17E3+iaDBEgUnOoIn/ve4YBFssZ9ucf1LEGWfcSRuxY9+tPgKW JLe6ARSNweIsiJHf/l7q9J0isyvTLGWHer/3o3RvinGJTVQKUOKSrfZA5Gq4v3QXp03d PS5O8pjieOt/DNowt1sfssMRg/hVU6RhMyteKWNvL1DE5uRoFwoQHX1uZSHV3vSm4+rm zKzA==
X-Gm-Message-State: ALoCoQlv6ZmG4IxRfe3alvpb3S2/ZJx0R68M/+W5F8Iozj6NPuXCeQxBKNXWduio4uSVyP06By7w
X-Received: by 10.152.20.232 with SMTP id q8mr5587980lae.102.1426279993913; Fri, 13 Mar 2015 13:53:13 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.114.3.242 with HTTP; Fri, 13 Mar 2015 13:52:52 -0700 (PDT)
X-Originating-IP: [122.56.202.140]
From: Tim Bray <tbray@textuality.com>
Date: Sat, 14 Mar 2015 09:52:52 +1300
Message-ID: <CAHBU6itCVapYX5PRDqte6t_M9Ja0byoMHkTwSircEoZJiHoM0g@mail.gmail.com>
To: perpass <perpass@ietf.org>
Content-Type: multipart/alternative; boundary=089e01493f5a634a85051131b08f
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/mMyhPDqolH60NZPX0UCfn4EseS0>
Subject: [perpass] draft-bray-privacy-choices-00.html
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Mar 2015 20:53:18 -0000

--089e01493f5a634a85051131b08f
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

This was about to expire so I was going to refresh it but uploader is
closed of course.  See
https://www.tbray.org/tmp/draft-bray-privacy-choices-01.html

Just a reminder that if this group wants to do anything in this space, my
editorial services are available.

--=20
- Tim Bray (If you=E2=80=99d like to send me a private message, see
https://keybase.io/timbray)

--089e01493f5a634a85051131b08f
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-size:small">Thi=
s was about to expire so I was going to refresh it but uploader is closed o=
f course.=C2=A0 See=C2=A0<a href=3D"https://www.tbray.org/tmp/draft-bray-pr=
ivacy-choices-01.html">https://www.tbray.org/tmp/draft-bray-privacy-choices=
-01.html</a></div><div class=3D"gmail_default" style=3D"font-size:small"><b=
r></div><div class=3D"gmail_default" style=3D"font-size:small">Just a remin=
der that if this group wants to do anything in this space, my editorial ser=
vices are available.=C2=A0</div><div><br></div>-- <br><div class=3D"gmail_s=
ignature"><div dir=3D"ltr"><div>- Tim Bray (If you=E2=80=99d like to send m=
e a private message, see <a href=3D"https://keybase.io/timbray" target=3D"_=
blank">https://keybase.io/timbray</a>)</div></div></div>
</div>

--089e01493f5a634a85051131b08f--


From nobody Fri Mar 13 14:28:10 2015
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 302341A0092 for <perpass@ietfa.amsl.com>; Fri, 13 Mar 2015 14:28:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dIkjkQuuE-F2 for <perpass@ietfa.amsl.com>; Fri, 13 Mar 2015 14:28:05 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 932331A0404 for <perpass@ietf.org>; Fri, 13 Mar 2015 14:28:05 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 1F37FBE87; Fri, 13 Mar 2015 21:28:04 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qF35KtC2rtz7; Fri, 13 Mar 2015 21:28:02 +0000 (GMT)
Received: from [10.87.48.73] (unknown [86.46.19.44]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id C37B7BE79; Fri, 13 Mar 2015 21:28:02 +0000 (GMT)
Message-ID: <55035662.1070307@cs.tcd.ie>
Date: Fri, 13 Mar 2015 21:28:02 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: Tim Bray <tbray@textuality.com>, perpass <perpass@ietf.org>
References: <CAHBU6itCVapYX5PRDqte6t_M9Ja0byoMHkTwSircEoZJiHoM0g@mail.gmail.com>
In-Reply-To: <CAHBU6itCVapYX5PRDqte6t_M9Ja0byoMHkTwSircEoZJiHoM0g@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/lkUBv4orv8xq3FccdHzCKrwJcM8>
Subject: Re: [perpass] draft-bray-privacy-choices-00.html
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Mar 2015 21:28:07 -0000

Folks,

On 13/03/15 20:52, Tim Bray wrote:
> This was about to expire so I was going to refresh it but uploader is
> closed of course.  See
> https://www.tbray.org/tmp/draft-bray-privacy-choices-01.html
> 
> Just a reminder that if this group wants to do anything in this space, my
> editorial services are available.

I'd be interested in opinions as to how/whether we ought process
this.

Ta,
S.


> 
> 
> 
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
> 


From nobody Fri Mar 13 14:51:54 2015
Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81AFA1A895A for <perpass@ietfa.amsl.com>; Fri, 13 Mar 2015 14:51:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G7KYQrZbk1Ks for <perpass@ietfa.amsl.com>; Fri, 13 Mar 2015 14:51:51 -0700 (PDT)
Received: from mail-qg0-x236.google.com (mail-qg0-x236.google.com [IPv6:2607:f8b0:400d:c04::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B70561A004B for <perpass@ietf.org>; Fri, 13 Mar 2015 14:51:51 -0700 (PDT)
Received: by qgfi50 with SMTP id i50so29338701qgf.9 for <perpass@ietf.org>; Fri, 13 Mar 2015 14:51:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=from:content-type:content-transfer-encoding:mime-version:subject :message-id:date:references:in-reply-to:to; bh=/CLyrzMdgGbkZ9f1PeKM6qu8axtn/q9fx7+tqILaHPQ=; b=c2+XN5R21NOkJAc0ZNeACB5pEyM4+3y9kT1LOeEsokKuveeVb0YwZe305aiFZd2MyC WuAvuBgb7CHsb2i2bcomaX8CSI/MuVJqPyP5FQtQqEAAeXhQWrzOVaDOKLg5QYjeCKkc 8us5K9l4HHMkqNbFBsxR6uOgKD26crAVYm9bI1aWNRglIi+uyHIYwM1S97DasE339vuH 064Mab8OVgHC56oegl6zXsZLdKG4gTPTS5cddoqiW/sb6G7ZVu8YFrLKil+ml4G4ikgH 1TjEIXu+VJCLJkOTmDVvOmZEX0PgoAdkoOrkbZBUh97xKOe+ETLHQdQhk2+W2ukVqxQJ gJHQ==
X-Received: by 10.55.55.12 with SMTP id e12mr49634439qka.50.1426283511047; Fri, 13 Mar 2015 14:51:51 -0700 (PDT)
Received: from [192.168.1.3] (209-6-114-252.c3-0.arl-ubr1.sbo-arl.ma.cable.rcn.com. [209.6.114.252]) by mx.google.com with ESMTPSA id o17sm2244644qko.49.2015.03.13.14.51.49 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 13 Mar 2015 14:51:50 -0700 (PDT)
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
X-Google-Original-From: Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (1.0)
Message-Id: <2AFA00D7-D9BB-478E-BF89-6F68CD58066F@gmail.com>
Date: Fri, 13 Mar 2015 17:51:50 -0400
References: <CAHBU6itCVapYX5PRDqte6t_M9Ja0byoMHkTwSircEoZJiHoM0g@mail.gmail.com> <55035662.1070307@cs.tcd.ie>
In-Reply-To: <55035662.1070307@cs.tcd.ie>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Tim Bray <tbray@textuality.com>, perpass@ietf.org
X-Mailer: iPhone Mail (11D257)
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/iHr6nNS37mYoUs7z8j7S1-6SZxg>
Subject: Re: [perpass] draft-bray-privacy-choices-00.html
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Mar 2015 21:51:53 -0000

Hey,

As the draft stands now, it needs more detail and contributions to be helpfu=
l.  If folks are interested, please contribute.

IMO, It would have to be broken down further in terms of the types of encryp=
tion and cost/benefits. =20

For instance, KMIP (yes, I know this is not an IETF standard) is on an upswi=
ng.  So is the general statement on cost of PKI specific to transport encryp=
tion?  How does OS factor into this and help with the cost/benefit?  We shou=
ld know more soon through efforts like Let's Encrypt and Fedora having IPsec=
 unauthenticated tunnel mode on by default (I think in version 23).

What requests are SPs getting in regard to encryption (transport, applicatio=
n data or data at rest) and what are the hurdles? =20

Operators may not be hanging out on this list, so maybe a post with the type=
s if info you are looking for to build this out should go to opsawg with a p=
ointer to the list you think this should be discussed on.

Thanks,
Kathleen=20

Sent from my iPhone

> On Mar 13, 2015, at 5:28 PM, Stephen Farrell <stephen.farrell@cs.tcd.ie> w=
rote:
>=20
>=20
> Folks,
>=20
>> On 13/03/15 20:52, Tim Bray wrote:
>> This was about to expire so I was going to refresh it but uploader is
>> closed of course.  See
>> https://www.tbray.org/tmp/draft-bray-privacy-choices-01.html
>>=20
>> Just a reminder that if this group wants to do anything in this space, my=

>> editorial services are available.
>=20
> I'd be interested in opinions as to how/whether we ought process
> this.
>=20
> Ta,
> S.
>=20
>=20
>>=20
>>=20
>>=20
>> _______________________________________________
>> perpass mailing list
>> perpass@ietf.org
>> https://www.ietf.org/mailman/listinfo/perpass
>=20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass


From nobody Sat Mar 14 02:27:50 2015
Return-Path: <tbray@textuality.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7A761A1A11 for <perpass@ietfa.amsl.com>; Sat, 14 Mar 2015 02:27:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level: 
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WJB3C3Ts655W for <perpass@ietfa.amsl.com>; Sat, 14 Mar 2015 02:27:46 -0700 (PDT)
Received: from mail-la0-f42.google.com (mail-la0-f42.google.com [209.85.215.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 121701A1A12 for <perpass@ietf.org>; Sat, 14 Mar 2015 02:27:46 -0700 (PDT)
Received: by ladw1 with SMTP id w1so6657463lad.0 for <perpass@ietf.org>; Sat, 14 Mar 2015 02:27:44 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=Tv82uHVs5SCgb8UHXTJ2LId7fXabUXIBmre77jQsuLc=; b=SQyoyy82N/sRp0u+uWk49eenJ0Rm7jzvfp+vdPGsYuAwCD8IkAbuiAFGdzcLNDaako wHDsDCGQLAoUd4MG++958qSogx8zSpjry9recRkm2j4GgnTrScOHidcgLnUHbhoTbqkU 1mxtHqixJnVv//22ua3VZN0zfxvZ75JAQPhZU95G2+hx67b2lowI2Cr3brGwGtYD9234 WaKLHP9S0/I6bv/u4exQc6wE8Ofr30QTIu0Cl8UAadgaZdv1A7Y7hM8K3SFntmdkq1rl 0ZcZHtFSPSaiUPKjxvHyl280ap0iVX77tKzK7Nwl53O9DneW/BQ7v9dF/t60eOFHhRLT Cu7w==
X-Gm-Message-State: ALoCoQmq3DRcIWIp/4LXyOJ2/5MNKJ48Nxb33XqiAA74Cq2C+HHrxQAtpmhNb7qztpR+ghL2rBKb
X-Received: by 10.152.43.67 with SMTP id u3mr47419199lal.10.1426325264338; Sat, 14 Mar 2015 02:27:44 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.114.3.242 with HTTP; Sat, 14 Mar 2015 02:27:24 -0700 (PDT)
X-Originating-IP: [122.60.18.124]
In-Reply-To: <2AFA00D7-D9BB-478E-BF89-6F68CD58066F@gmail.com>
References: <CAHBU6itCVapYX5PRDqte6t_M9Ja0byoMHkTwSircEoZJiHoM0g@mail.gmail.com> <55035662.1070307@cs.tcd.ie> <2AFA00D7-D9BB-478E-BF89-6F68CD58066F@gmail.com>
From: Tim Bray <tbray@textuality.com>
Date: Sat, 14 Mar 2015 22:27:24 +1300
Message-ID: <CAHBU6iu=pXFd5AQ286Q=4ut_aJ=nDjZUkN3LyDEqX6xOpUW7mA@mail.gmail.com>
To: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Content-Type: multipart/alternative; boundary=001a11c242deb7262805113c3af1
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/bB3tynsJSIUrgLTx4yxiUJjARQk>
Cc: perpass <perpass@ietf.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [perpass] draft-bray-privacy-choices-00.html
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Mar 2015 09:27:48 -0000

--001a11c242deb7262805113c3af1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

I certainly agree that any draft-*-00 almost certainly needs heavy doses of
IETF input.  But I=E2=80=99m actually failing to understand where Kathleen=
=E2=80=99s
suggestions are trying to go.  This draft is trying to make general points
that are orthogonal to any particular technology, including:

- Positive & negative privacy failures are asymmetrically harmful
- the right choices are hard to make, so just don't ask inexpert uses to
make them,
- the cost of privacy technologies is monotonically falling

I think this draft is most useful if it can restrict itself to saying
things that are widely true across the tech-trade-off spectrum.  So, while
transport encryption is one of the most widely-used privacy technologies,
the points above are also true (I think) when applied to entirely different
things like message signing and server-side encryption-at-rest.

Sorry, I=E2=80=99m entirely failing to think of what this draft might say a=
bout OS.
The admirable Let=E2=80=99s Encrypt work is I guess evidence of the
monotonically-decreasing-cost premise.

SPs are being asked to deploy a variety of privacy technologies,and I=E2=80=
=99ve
observed recurring patterns of muddy thinking in their pushbacks; this
draft is an attempt to curate the arguments that are useful in these
discussions, independent of any particular flavor of privacy technology.

On Sat, Mar 14, 2015 at 10:51 AM, Kathleen Moriarty <
kathleen.moriarty.ietf@gmail.com> wrote:

> Hey,
>
> As the draft stands now, it needs more detail and contributions to be
> helpful.  If folks are interested, please contribute.
>
> IMO, It would have to be broken down further in terms of the types of
> encryption and cost/benefits.
>
> For instance, KMIP (yes, I know this is not an IETF standard) is on an
> upswing.  So is the general statement on cost of PKI specific to transpor=
t
> encryption?  How does OS factor into this and help with the cost/benefit?
> We should know more soon through efforts like Let's Encrypt and Fedora
> having IPsec unauthenticated tunnel mode on by default (I think in versio=
n
> 23).
>
> What requests are SPs getting in regard to encryption (transport,
> application data or data at rest) and what are the hurdles?
>
> Operators may not be hanging out on this list, so maybe a post with the
> types if info you are looking for to build this out should go to opsawg
> with a pointer to the list you think this should be discussed on.
>
> Thanks,
> Kathleen
>
> Sent from my iPhone
>
> > On Mar 13, 2015, at 5:28 PM, Stephen Farrell <stephen.farrell@cs.tcd.ie=
>
> wrote:
> >
> >
> > Folks,
> >
> >> On 13/03/15 20:52, Tim Bray wrote:
> >> This was about to expire so I was going to refresh it but uploader is
> >> closed of course.  See
> >> https://www.tbray.org/tmp/draft-bray-privacy-choices-01.html
> >>
> >> Just a reminder that if this group wants to do anything in this space,
> my
> >> editorial services are available.
> >
> > I'd be interested in opinions as to how/whether we ought process
> > this.
> >
> > Ta,
> > S.
> >
> >
> >>
> >>
> >>
> >> _______________________________________________
> >> perpass mailing list
> >> perpass@ietf.org
> >> https://www.ietf.org/mailman/listinfo/perpass
> >
> > _______________________________________________
> > perpass mailing list
> > perpass@ietf.org
> > https://www.ietf.org/mailman/listinfo/perpass
>



--=20
- Tim Bray (If you=E2=80=99d like to send me a private message, see
https://keybase.io/timbray)

--001a11c242deb7262805113c3af1
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-size:small">I c=
ertainly agree that any draft-*-00 almost certainly needs heavy doses of IE=
TF input.=C2=A0 But I=E2=80=99m actually failing to understand where Kathle=
en=E2=80=99s suggestions are trying to go.=C2=A0 This draft is trying to ma=
ke general points that are orthogonal to any particular technology, includi=
ng:=C2=A0</div><div class=3D"gmail_default" style=3D"font-size:small"><br><=
/div><div class=3D"gmail_default" style=3D"font-size:small">- Positive &amp=
; negative privacy failures are asymmetrically harmful</div><div class=3D"g=
mail_default" style=3D"font-size:small">- the right choices are hard to mak=
e, so just don&#39;t ask inexpert uses to make them,</div><div class=3D"gma=
il_default" style=3D"font-size:small">- the cost of privacy technologies is=
 monotonically falling</div><div class=3D"gmail_default" style=3D"font-size=
:small"><br></div><div class=3D"gmail_default" style=3D"font-size:small">I =
think this draft is most useful if it can restrict itself to saying things =
that are widely true across the tech-trade-off spectrum.=C2=A0 So, while tr=
ansport encryption is one of the most widely-used privacy technologies, the=
 points above are also true (I think) when applied to entirely different th=
ings like message signing and server-side encryption-at-rest. =C2=A0</div><=
div class=3D"gmail_default" style=3D"font-size:small"><br></div><div class=
=3D"gmail_default" style=3D"font-size:small">Sorry, I=E2=80=99m entirely fa=
iling to think of what this draft might say about OS. The admirable Let=E2=
=80=99s Encrypt work is I guess evidence of the monotonically-decreasing-co=
st premise.</div><div class=3D"gmail_default" style=3D"font-size:small"><br=
></div><div class=3D"gmail_default" style=3D"font-size:small">SPs are being=
 asked to deploy a variety of privacy technologies,and I=E2=80=99ve observe=
d recurring patterns of muddy thinking in their pushbacks; this draft is an=
 attempt to curate the arguments that are useful in these discussions, inde=
pendent of any particular flavor of privacy technology.</div></div><div cla=
ss=3D"gmail_extra"><br><div class=3D"gmail_quote">On Sat, Mar 14, 2015 at 1=
0:51 AM, Kathleen Moriarty <span dir=3D"ltr">&lt;<a href=3D"mailto:kathleen=
.moriarty.ietf@gmail.com" target=3D"_blank">kathleen.moriarty.ietf@gmail.co=
m</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margi=
n:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hey,<br>
<br>
As the draft stands now, it needs more detail and contributions to be helpf=
ul.=C2=A0 If folks are interested, please contribute.<br>
<br>
IMO, It would have to be broken down further in terms of the types of encry=
ption and cost/benefits.<br>
<br>
For instance, KMIP (yes, I know this is not an IETF standard) is on an upsw=
ing.=C2=A0 So is the general statement on cost of PKI specific to transport=
 encryption?=C2=A0 How does OS factor into this and help with the cost/bene=
fit?=C2=A0 We should know more soon through efforts like Let&#39;s Encrypt =
and Fedora having IPsec unauthenticated tunnel mode on by default (I think =
in version 23).<br>
<br>
What requests are SPs getting in regard to encryption (transport, applicati=
on data or data at rest) and what are the hurdles?<br>
<br>
Operators may not be hanging out on this list, so maybe a post with the typ=
es if info you are looking for to build this out should go to opsawg with a=
 pointer to the list you think this should be discussed on.<br>
<br>
Thanks,<br>
Kathleen<br>
<br>
Sent from my iPhone<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
&gt; On Mar 13, 2015, at 5:28 PM, Stephen Farrell &lt;<a href=3D"mailto:ste=
phen.farrell@cs.tcd.ie">stephen.farrell@cs.tcd.ie</a>&gt; wrote:<br>
&gt;<br>
&gt;<br>
&gt; Folks,<br>
&gt;<br>
&gt;&gt; On 13/03/15 20:52, Tim Bray wrote:<br>
&gt;&gt; This was about to expire so I was going to refresh it but uploader=
 is<br>
&gt;&gt; closed of course.=C2=A0 See<br>
&gt;&gt; <a href=3D"https://www.tbray.org/tmp/draft-bray-privacy-choices-01=
.html" target=3D"_blank">https://www.tbray.org/tmp/draft-bray-privacy-choic=
es-01.html</a><br>
&gt;&gt;<br>
&gt;&gt; Just a reminder that if this group wants to do anything in this sp=
ace, my<br>
&gt;&gt; editorial services are available.<br>
&gt;<br>
&gt; I&#39;d be interested in opinions as to how/whether we ought process<b=
r>
&gt; this.<br>
&gt;<br>
&gt; Ta,<br>
&gt; S.<br>
&gt;<br>
&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; perpass mailing list<br>
&gt;&gt; <a href=3D"mailto:perpass@ietf.org">perpass@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/perpass" target=
=3D"_blank">https://www.ietf.org/mailman/listinfo/perpass</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; perpass mailing list<br>
&gt; <a href=3D"mailto:perpass@ietf.org">perpass@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/perpass" target=3D"_b=
lank">https://www.ietf.org/mailman/listinfo/perpass</a><br>
</div></div></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>=
<div class=3D"gmail_signature"><div dir=3D"ltr"><div>- Tim Bray (If you=E2=
=80=99d like to send me a private message, see <a href=3D"https://keybase.i=
o/timbray" target=3D"_blank">https://keybase.io/timbray</a>)</div></div></d=
iv>
</div>

--001a11c242deb7262805113c3af1--


From nobody Sat Mar 14 04:27:35 2015
Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D15F1A00A8 for <perpass@ietfa.amsl.com>; Sat, 14 Mar 2015 04:27:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0eNIFKNCI4Ju for <perpass@ietfa.amsl.com>; Sat, 14 Mar 2015 04:27:31 -0700 (PDT)
Received: from mail-qg0-x22f.google.com (mail-qg0-x22f.google.com [IPv6:2607:f8b0:400d:c04::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9376A1A0084 for <perpass@ietf.org>; Sat, 14 Mar 2015 04:27:31 -0700 (PDT)
Received: by qgg60 with SMTP id 60so6337597qgg.3 for <perpass@ietf.org>; Sat, 14 Mar 2015 04:27:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=from:content-type:mime-version:subject:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=RQL3wTUngEWADlVmiUpUkbqnaoG03PcPjoEn9OC4JwY=; b=G6UGzkK6CyN2mqX4ZbyPx3so+0dGoUpEocwPnOsZjfIwnzZuP6yKYY723kVamxKmFx V3aWQ8lWddwZUD24yKWKyrT1bQ4Lo9D4x+k0PRg99fSavMS6VqnQI1qcsfT/nRprJvOj WKM21E2HUmPa0suwiRHSEPD7/qnQW18LqNPh07eHmrchn3A5WnjI4ut3wE+wiLqkVSBf elcPOIXIYFYrUg076NAF+cUto+zvNobvGm1cPXaUeE2DBFh4VceDmRQ4Z38wuj+5znxS zCvWVIhaXKqMge4Jj5mDiZCxpsllRLqDvtEgx8U2fNMscOa8lWF8cqLb0Y419UQv32Ra 8pfg==
X-Received: by 10.140.236.211 with SMTP id h202mr67788411qhc.88.1426332450893;  Sat, 14 Mar 2015 04:27:30 -0700 (PDT)
Received: from [192.168.1.3] (209-6-114-252.c3-0.arl-ubr1.sbo-arl.ma.cable.rcn.com. [209.6.114.252]) by mx.google.com with ESMTPSA id d85sm3283820qkh.45.2015.03.14.04.27.28 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sat, 14 Mar 2015 04:27:29 -0700 (PDT)
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
X-Google-Original-From: Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-DFEA32B2-62AA-43D4-A1F9-CB8D537DA101
Mime-Version: 1.0 (1.0)
X-Mailer: iPhone Mail (11D257)
In-Reply-To: <CAHBU6iu=pXFd5AQ286Q=4ut_aJ=nDjZUkN3LyDEqX6xOpUW7mA@mail.gmail.com>
Date: Sat, 14 Mar 2015 07:27:29 -0400
Content-Transfer-Encoding: 7bit
Message-Id: <BF8E389D-D04A-4219-8F07-2303CE0DC0DA@gmail.com>
References: <CAHBU6itCVapYX5PRDqte6t_M9Ja0byoMHkTwSircEoZJiHoM0g@mail.gmail.com> <55035662.1070307@cs.tcd.ie> <2AFA00D7-D9BB-478E-BF89-6F68CD58066F@gmail.com> <CAHBU6iu=pXFd5AQ286Q=4ut_aJ=nDjZUkN3LyDEqX6xOpUW7mA@mail.gmail.com>
To: Tim Bray <tbray@textuality.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/_VVLDSnFSONCdOgYCPTi5LiJjYA>
Cc: perpass <perpass@ietf.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [perpass] draft-bray-privacy-choices-00.html
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Mar 2015 11:27:34 -0000

--Apple-Mail-DFEA32B2-62AA-43D4-A1F9-CB8D537DA101
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Tim,

Sent from my iPhone

> On Mar 14, 2015, at 5:27 AM, Tim Bray <tbray@textuality.com> wrote:
>=20
> I certainly agree that any draft-*-00 almost certainly needs heavy doses o=
f IETF input.  But I=E2=80=99m actually failing to understand where Kathleen=
=E2=80=99s suggestions are trying to go.  This draft is trying to make gener=
al points that are orthogonal to any particular technology, including:=20
>=20
> - Positive & negative privacy failures are asymmetrically harmful
> - the right choices are hard to make, so just don't ask inexpert uses to m=
ake them,
> - the cost of privacy technologies is monotonically falling
>=20
> I think this draft is most useful if it can restrict itself to saying thin=
gs that are widely true across the tech-trade-off spectrum.  So, while trans=
port encryption is one of the most widely-used privacy technologies, the poi=
nts above are also true (I think) when applied to entirely different things l=
ike message signing and server-side encryption-at-rest. =20
>=20
> Sorry, I=E2=80=99m entirely failing to think of what this draft might say a=
bout OS. The admirable Let=E2=80=99s Encrypt work is I guess evidence of the=
 monotonically-decreasing-cost premise.
>=20
> SPs are being asked to deploy a variety of privacy technologies,and I=E2=80=
=99ve observed recurring patterns of muddy thinking in their pushbacks; this=
 draft is an attempt to curate the arguments that are useful in these discus=
sions, independent of any particular flavor of privacy technology.

Ok, fair enough.  I think some more text is needed to make your points clear=
 as it wasn't enough for me to see the direction you were heading.

Thanks,
Kathleen=20
>=20
>> On Sat, Mar 14, 2015 at 10:51 AM, Kathleen Moriarty <kathleen.moriarty.ie=
tf@gmail.com> wrote:
>> Hey,
>>=20
>> As the draft stands now, it needs more detail and contributions to be hel=
pful.  If folks are interested, please contribute.
>>=20
>> IMO, It would have to be broken down further in terms of the types of enc=
ryption and cost/benefits.
>>=20
>> For instance, KMIP (yes, I know this is not an IETF standard) is on an up=
swing.  So is the general statement on cost of PKI specific to transport enc=
ryption?  How does OS factor into this and help with the cost/benefit?  We s=
hould know more soon through efforts like Let's Encrypt and Fedora having IP=
sec unauthenticated tunnel mode on by default (I think in version 23).
>>=20
>> What requests are SPs getting in regard to encryption (transport, applica=
tion data or data at rest) and what are the hurdles?
>>=20
>> Operators may not be hanging out on this list, so maybe a post with the t=
ypes if info you are looking for to build this out should go to opsawg with a=
 pointer to the list you think this should be discussed on.
>>=20
>> Thanks,
>> Kathleen
>>=20
>> Sent from my iPhone
>>=20
>> > On Mar 13, 2015, at 5:28 PM, Stephen Farrell <stephen.farrell@cs.tcd.ie=
> wrote:
>> >
>> >
>> > Folks,
>> >
>> >> On 13/03/15 20:52, Tim Bray wrote:
>> >> This was about to expire so I was going to refresh it but uploader is
>> >> closed of course.  See
>> >> https://www.tbray.org/tmp/draft-bray-privacy-choices-01.html
>> >>
>> >> Just a reminder that if this group wants to do anything in this space,=
 my
>> >> editorial services are available.
>> >
>> > I'd be interested in opinions as to how/whether we ought process
>> > this.
>> >
>> > Ta,
>> > S.
>> >
>> >
>> >>
>> >>
>> >>
>> >> _______________________________________________
>> >> perpass mailing list
>> >> perpass@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/perpass
>> >
>> > _______________________________________________
>> > perpass mailing list
>> > perpass@ietf.org
>> > https://www.ietf.org/mailman/listinfo/perpass
>=20
>=20
>=20
> --=20
> - Tim Bray (If you=E2=80=99d like to send me a private message, see https:=
//keybase.io/timbray)

--Apple-Mail-DFEA32B2-62AA-43D4-A1F9-CB8D537DA101
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Hi Tim,<br><br>Sent from my iPhone</di=
v><div><br>On Mar 14, 2015, at 5:27 AM, Tim Bray &lt;<a href=3D"mailto:tbray=
@textuality.com">tbray@textuality.com</a>&gt; wrote:<br><br></div><blockquot=
e type=3D"cite"><div><div dir=3D"ltr"><div class=3D"gmail_default" style=3D"=
font-size:small">I certainly agree that any draft-*-00 almost certainly need=
s heavy doses of IETF input.&nbsp; But I=E2=80=99m actually failing to under=
stand where Kathleen=E2=80=99s suggestions are trying to go.&nbsp; This draf=
t is trying to make general points that are orthogonal to any particular tec=
hnology, including:&nbsp;</div><div class=3D"gmail_default" style=3D"font-si=
ze:small"><br></div><div class=3D"gmail_default" style=3D"font-size:small">-=
 Positive &amp; negative privacy failures are asymmetrically harmful</div><d=
iv class=3D"gmail_default" style=3D"font-size:small">- the right choices are=
 hard to make, so just don't ask inexpert uses to make them,</div><div class=
=3D"gmail_default" style=3D"font-size:small">- the cost of privacy technolog=
ies is monotonically falling</div><div class=3D"gmail_default" style=3D"font=
-size:small"><br></div><div class=3D"gmail_default" style=3D"font-size:small=
">I think this draft is most useful if it can restrict itself to saying thin=
gs that are widely true across the tech-trade-off spectrum.&nbsp; So, while t=
ransport encryption is one of the most widely-used privacy technologies, the=
 points above are also true (I think) when applied to entirely different thi=
ngs like message signing and server-side encryption-at-rest. &nbsp;</div><di=
v class=3D"gmail_default" style=3D"font-size:small"><br></div><div class=3D"=
gmail_default" style=3D"font-size:small">Sorry, I=E2=80=99m entirely failing=
 to think of what this draft might say about OS. The admirable Let=E2=80=99s=
 Encrypt work is I guess evidence of the monotonically-decreasing-cost premi=
se.</div><div class=3D"gmail_default" style=3D"font-size:small"><br></div><d=
iv class=3D"gmail_default" style=3D"font-size:small">SPs are being asked to d=
eploy a variety of privacy technologies,and I=E2=80=99ve observed recurring p=
atterns of muddy thinking in their pushbacks; this draft is an attempt to cu=
rate the arguments that are useful in these discussions, independent of any p=
articular flavor of privacy technology.</div></div></div></blockquote><div><=
br></div>Ok, fair enough. &nbsp;I think some more text is needed to make you=
r points clear as it wasn't enough for me to see the direction you were head=
ing.<div><br></div><div>Thanks,</div><div>Kathleen&nbsp;<br><blockquote type=
=3D"cite"><div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On S=
at, Mar 14, 2015 at 10:51 AM, Kathleen Moriarty <span dir=3D"ltr">&lt;<a hre=
f=3D"mailto:kathleen.moriarty.ietf@gmail.com" target=3D"_blank">kathleen.mor=
iarty.ietf@gmail.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quo=
te" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">=
Hey,<br>
<br>
As the draft stands now, it needs more detail and contributions to be helpfu=
l.&nbsp; If folks are interested, please contribute.<br>
<br>
IMO, It would have to be broken down further in terms of the types of encryp=
tion and cost/benefits.<br>
<br>
For instance, KMIP (yes, I know this is not an IETF standard) is on an upswi=
ng.&nbsp; So is the general statement on cost of PKI specific to transport e=
ncryption?&nbsp; How does OS factor into this and help with the cost/benefit=
?&nbsp; We should know more soon through efforts like Let's Encrypt and Fedo=
ra having IPsec unauthenticated tunnel mode on by default (I think in versio=
n 23).<br>
<br>
What requests are SPs getting in regard to encryption (transport, applicatio=
n data or data at rest) and what are the hurdles?<br>
<br>
Operators may not be hanging out on this list, so maybe a post with the type=
s if info you are looking for to build this out should go to opsawg with a p=
ointer to the list you think this should be discussed on.<br>
<br>
Thanks,<br>
Kathleen<br>
<br>
Sent from my iPhone<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
&gt; On Mar 13, 2015, at 5:28 PM, Stephen Farrell &lt;<a href=3D"mailto:step=
hen.farrell@cs.tcd.ie">stephen.farrell@cs.tcd.ie</a>&gt; wrote:<br>
&gt;<br>
&gt;<br>
&gt; Folks,<br>
&gt;<br>
&gt;&gt; On 13/03/15 20:52, Tim Bray wrote:<br>
&gt;&gt; This was about to expire so I was going to refresh it but uploader i=
s<br>
&gt;&gt; closed of course.&nbsp; See<br>
&gt;&gt; <a href=3D"https://www.tbray.org/tmp/draft-bray-privacy-choices-01.=
html" target=3D"_blank">https://www.tbray.org/tmp/draft-bray-privacy-choices=
-01.html</a><br>
&gt;&gt;<br>
&gt;&gt; Just a reminder that if this group wants to do anything in this spa=
ce, my<br>
&gt;&gt; editorial services are available.<br>
&gt;<br>
&gt; I'd be interested in opinions as to how/whether we ought process<br>
&gt; this.<br>
&gt;<br>
&gt; Ta,<br>
&gt; S.<br>
&gt;<br>
&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; perpass mailing list<br>
&gt;&gt; <a href=3D"mailto:perpass@ietf.org">perpass@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/perpass" target=3D=
"_blank">https://www.ietf.org/mailman/listinfo/perpass</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; perpass mailing list<br>
&gt; <a href=3D"mailto:perpass@ietf.org">perpass@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/perpass" target=3D"_bl=
ank">https://www.ietf.org/mailman/listinfo/perpass</a><br>
</div></div></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br><=
div class=3D"gmail_signature"><div dir=3D"ltr"><div>- Tim Bray (If you=E2=80=
=99d like to send me a private message, see <a href=3D"https://keybase.io/ti=
mbray" target=3D"_blank">https://keybase.io/timbray</a>)</div></div></div>
</div>
</div></blockquote></div></body></html>=

--Apple-Mail-DFEA32B2-62AA-43D4-A1F9-CB8D537DA101--


From nobody Sat Mar 14 06:36:04 2015
Return-Path: <wilton@isoc.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FF1D1A0393 for <perpass@ietfa.amsl.com>; Sat, 14 Mar 2015 06:36:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O-axpHsJRXz0 for <perpass@ietfa.amsl.com>; Sat, 14 Mar 2015 06:35:59 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1on0624.outbound.protection.outlook.com [IPv6:2a01:111:f400:fc10::624]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 868821A038E for <perpass@ietf.org>; Sat, 14 Mar 2015 06:35:59 -0700 (PDT)
Received: from CO2PR0601MB0983.namprd06.prod.outlook.com (25.160.7.28) by CO2PR0601MB0982.namprd06.prod.outlook.com (25.160.7.27) with Microsoft SMTP Server (TLS) id 15.1.99.14; Sat, 14 Mar 2015 13:35:42 +0000
Received: from CO2PR0601MB0983.namprd06.prod.outlook.com ([25.160.7.28]) by CO2PR0601MB0983.namprd06.prod.outlook.com ([25.160.7.28]) with mapi id 15.01.0099.004; Sat, 14 Mar 2015 13:35:42 +0000
From: Robin Wilton <wilton@isoc.org>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Thread-Topic: [perpass] draft-bray-privacy-choices-00.html
Thread-Index: AQHQXc/AhfdvI7OZZUKCc7g7lWuc4Z0a7YsAgAEOXro=
Date: Sat, 14 Mar 2015 13:35:42 +0000
Message-ID: <8CB555C3-1681-46AC-A161-218199AF1AED@isoc.org>
References: <CAHBU6itCVapYX5PRDqte6t_M9Ja0byoMHkTwSircEoZJiHoM0g@mail.gmail.com>,  <55035662.1070307@cs.tcd.ie>
In-Reply-To: <55035662.1070307@cs.tcd.ie>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [94.174.34.240]
authentication-results: cs.tcd.ie; dkim=none (message not signed) header.d=none;
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CO2PR0601MB0982;
x-forefront-antispam-report: BMV:0; SFV:NSPM; SFS:(10009020)(6009001)(51704005)(129404003)(24454002)(53434003)(479174004)(2900100001)(2950100001)(87936001)(82746002)(19580405001)(19580395003)(122556002)(40100003)(551544002)(86362001)(50986999)(54356999)(15975445007)(2656002)(102836002)(83716003)(76176999)(230783001)(33656002)(36756003)(46102003)(92566002)(99286002)(62966003)(77156002)(66066001)(106116001)(110136001)(104396002); DIR:OUT; SFP:1101; SCL:1; SRVR:CO2PR0601MB0982; H:CO2PR0601MB0983.namprd06.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
x-microsoft-antispam-prvs: <CO2PR0601MB098210DF4793252B59A52517A6040@CO2PR0601MB0982.namprd06.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(5001010)(5005006); SRVR:CO2PR0601MB0982; BCL:0; PCL:0; RULEID:; SRVR:CO2PR0601MB0982; 
x-forefront-prvs: 0515208626
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2015 13:35:42.2636 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 89f84dfb-7285-4810-bc4d-8b9b5794554f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR0601MB0982
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/lPVFgo_tR9okLMQ5kd7qtnAgpQE>
Cc: perpass <perpass@ietf.org>, Tim Bray <tbray@textuality.com>
Subject: Re: [perpass] draft-bray-privacy-choices-00.html
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Mar 2015 13:36:02 -0000

I think this is an important and useful topic. And as Tim notes, I think it=
's worth getting to a very clear statement of the problem and associated fa=
ctors, before getting to the level of technology-specific detail suggested =
by Kathleen (though I agree that that level of technical detail should be o=
ne of the destinations towards which this document moves us).

My main gripe is with the label "privacy protection" as applied to the issu=
es Tim raises. I think the problem statements are good, but I think they ar=
e problems of confidentiality, not privacy.

To try to illustrate why, I suggest the following scenario:=20

Primrose goes to InsureMe.com, where she will be asked for a lot of persona=
l data. InsureMe.com invites her to register and create a new account, with=
 an ID and password; all this is done over https, so InsureMe.com is confid=
ent it has taken suitable steps to protect the data from being visible to t=
hird parties. Thereafter. Whenever Primrose returns to the site, she is ask=
ed to log in before she can access any of her personal data.

So far, this is all consistent with the requirements in Tim's paper. Howeve=
r, InsureMe.com also has a B2B relationship with Gotcher.com, a targeted ad=
vertising service. InsureMe.com shares Primrose's data (and that of all its=
 other account holders) with Gotcher.com, but when doing so it always makes=
 the Gotcher folks log in to a data server, and the data passes over an enc=
rypted session.=20

I Primrose hasn't consented to this, her privacy has been violated - but I'=
m not sure we've broken any of the principles Tim sets out. I think InsureM=
e.com has put some confidentiality measures in place, between itself and Pr=
imrose, and itself and Gotcher.com, but those have not protected Primrose's=
 privacy.

I think there are two options:

1 - re-label the problem as one of confidentiality, not privacy, in which c=
ase the document is already a good basis for further discussion;

2 - keep the "privacy protection" label, in which case the document needs t=
o build on the existing confidentiality topic, but set it in the context of=
 the broader privacy problem, and explain what confidentiality services con=
tribute towards solving it.

I think both options would take us somewhere useful, because users' confide=
ntiality and privacy are *both* affected by the asymmetries and market dyna=
mics Tim describes.

Hope this helps,
Robin

Robin Wilton

Technical Outreach Director - Identity and Privacy

On 13 Mar 2015, at 21:28, "Stephen Farrell" <stephen.farrell@cs.tcd.ie> wro=
te:

>=20
> Folks,
>=20
> On 13/03/15 20:52, Tim Bray wrote:
>> This was about to expire so I was going to refresh it but uploader is
>> closed of course.  See
>> https://www.tbray.org/tmp/draft-bray-privacy-choices-01.html
>>=20
>> Just a reminder that if this group wants to do anything in this space, m=
y
>> editorial services are available.
>=20
> I'd be interested in opinions as to how/whether we ought process
> this.
>=20
> Ta,
> S.
>=20
>=20
>>=20
>>=20
>>=20
>> _______________________________________________
>> perpass mailing list
>> perpass@ietf.org
>> https://www.ietf.org/mailman/listinfo/perpass
>>=20
>=20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass


From nobody Sat Mar 14 08:00:25 2015
Return-Path: <dhc@dcrocker.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA04C1A03AA for <perpass@ietfa.amsl.com>; Sat, 14 Mar 2015 08:00:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bhJru4YBeZ0j for <perpass@ietfa.amsl.com>; Sat, 14 Mar 2015 08:00:22 -0700 (PDT)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9CBAB1A044D for <perpass@ietf.org>; Sat, 14 Mar 2015 08:00:21 -0700 (PDT)
Received: from [192.168.1.87] (76-218-8-156.lightspeed.sntcca.sbcglobal.net [76.218.8.156]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id t2EF0BT9031195 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Sat, 14 Mar 2015 08:00:17 -0700
Message-ID: <55044CF9.2060306@dcrocker.net>
Date: Sat, 14 Mar 2015 08:00:09 -0700
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: Tim Bray <tbray@textuality.com>
References: <CAHBU6itCVapYX5PRDqte6t_M9Ja0byoMHkTwSircEoZJiHoM0g@mail.gmail.com> <55035662.1070307@cs.tcd.ie> <2AFA00D7-D9BB-478E-BF89-6F68CD58066F@gmail.com> <CAHBU6iu=pXFd5AQ286Q=4ut_aJ=nDjZUkN3LyDEqX6xOpUW7mA@mail.gmail.com>
In-Reply-To: <CAHBU6iu=pXFd5AQ286Q=4ut_aJ=nDjZUkN3LyDEqX6xOpUW7mA@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Sat, 14 Mar 2015 08:00:17 -0700 (PDT)
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/-KNUAngPVrjTR_tA9ZFXHG4rONs>
Cc: perpass <perpass@ietf.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [perpass] draft-bray-privacy-choices-00.html
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Mar 2015 15:00:25 -0000

On 3/14/2015 2:27 AM, Tim Bray wrote:
> This draft is trying to make general points that are orthogonal to any
> particular technology, including: 
> 
> - Positive & negative privacy failures are asymmetrically harmful
> - the right choices are hard to make, so just don't ask inexpert uses to
> make them,
> - the cost of privacy technologies is monotonically falling


+1 to the nature and direction of this document.

Especially for topics that are complex, poorly understood and/or are
controversial, it can greatly help to discuss issues and tradeoffs in
higher-level, non-technical terms.  I usually cast this as needing
statement about functional benefits and detriments for users (end-users,
operators, etc.)

The summary bullets Tim provided, above, are worth adding to the
document early, with the rest of document providing substance to them.

If there is enough community difficulty in readily seeing the nature and
benefit of this exercise -- I usually assume that when any one
reasonable reader has that sort of problem, others will too -- we should
probably find an example to add that distinguishes between this level of
discussion and the lower-level type that IETF work typical deals with --
and that ought to derive from these higher-level points.

There might be an line of discussion to add to the document, namely
tradeoffs and limitations of various technical approaches, especially
popular ones.  For example, transport-level encryption has notable
benefits, but the deficiencies seem to be absent from most IETF
discussions, leaving very large holes in the creator/consumer path.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Sat Mar 14 14:14:55 2015
Return-Path: <tbray@textuality.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A68F1A01F0 for <perpass@ietfa.amsl.com>; Sat, 14 Mar 2015 14:14:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level: 
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KmYaY74bij0u for <perpass@ietfa.amsl.com>; Sat, 14 Mar 2015 14:14:52 -0700 (PDT)
Received: from mail-la0-f41.google.com (mail-la0-f41.google.com [209.85.215.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 704911A0107 for <perpass@ietf.org>; Sat, 14 Mar 2015 14:14:52 -0700 (PDT)
Received: by lagg8 with SMTP id g8so13563515lag.1 for <perpass@ietf.org>; Sat, 14 Mar 2015 14:14:50 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=eRFxDkdp24ATyvbroDm7mT/mQNkkiV1uKgru6b+1IF0=; b=f56ssW2EsUiKfCF3plxcOBLL8M4a5ciQRzu+t1/WQas95w53TE7jDyqaG54O4B4WFJ 1+Gz2jZthAbeVGadLzLx0hLjybN12r7YJpRRWdHSqwCw26T9TJMzpPcMHUs0DtLPgfYC 3LQy3u1TeZIdy25uoekddXbqZglkAKwwWJrcpoPpGcpus58TworwfwNBNF/v8y0n4Hpi E/HZEW2ZTfy/tA6/aVqY3pQzyqEeL0MwXumB5qNp46/at4YPV4TRPUFCT5VNIeowsIJd QSA/YnznbAtPfzHs9X29hy8GOiGga7xHkihkljDwrkHvfsTdivtqgG1DO8GKYTLPxRn0 Fylw==
X-Gm-Message-State: ALoCoQlbbRbgA5eaeUOqrT9ursjHPvaEA/kCYOKR9CKMqlRMIjrsBm20NggBm7cl0QikoWLmzn/F
X-Received: by 10.113.11.12 with SMTP id ee12mr48228447lbd.5.1426367690813; Sat, 14 Mar 2015 14:14:50 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.114.3.242 with HTTP; Sat, 14 Mar 2015 14:14:29 -0700 (PDT)
X-Originating-IP: [122.60.18.124]
In-Reply-To: <55044CF9.2060306@dcrocker.net>
References: <CAHBU6itCVapYX5PRDqte6t_M9Ja0byoMHkTwSircEoZJiHoM0g@mail.gmail.com> <55035662.1070307@cs.tcd.ie> <2AFA00D7-D9BB-478E-BF89-6F68CD58066F@gmail.com> <CAHBU6iu=pXFd5AQ286Q=4ut_aJ=nDjZUkN3LyDEqX6xOpUW7mA@mail.gmail.com> <55044CF9.2060306@dcrocker.net>
From: Tim Bray <tbray@textuality.com>
Date: Sun, 15 Mar 2015 10:14:29 +1300
Message-ID: <CAHBU6iuTpq8g=sPns=NbPrnGKg8OJ+__JEwTwX=pZx7b-7iq2Q@mail.gmail.com>
To: Dave CROCKER <dcrocker@bbiw.net>
Content-Type: multipart/alternative; boundary=001a1133a5b487cee40511461b64
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/icQm44od7ETOqJpM5CjHYXR5-m8>
Cc: perpass <perpass@ietf.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [perpass] draft-bray-privacy-choices-00.html
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Mar 2015 21:14:54 -0000

--001a1133a5b487cee40511461b64
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

OK, I=E2=80=99ll go ahead and do an -01 with a better introduction, which i=
s
clearly needed.    Interested to hear what others think of Robin=E2=80=99s
privacy/confidentiality distinction.



On Sun, Mar 15, 2015 at 4:00 AM, Dave Crocker <dhc@dcrocker.net> wrote:

> On 3/14/2015 2:27 AM, Tim Bray wrote:
> > This draft is trying to make general points that are orthogonal to any
> > particular technology, including:
> >
> > - Positive & negative privacy failures are asymmetrically harmful
> > - the right choices are hard to make, so just don't ask inexpert uses t=
o
> > make them,
> > - the cost of privacy technologies is monotonically falling
>
>
> +1 to the nature and direction of this document.
>
> Especially for topics that are complex, poorly understood and/or are
> controversial, it can greatly help to discuss issues and tradeoffs in
> higher-level, non-technical terms.  I usually cast this as needing
> statement about functional benefits and detriments for users (end-users,
> operators, etc.)
>
> The summary bullets Tim provided, above, are worth adding to the
> document early, with the rest of document providing substance to them.
>
> If there is enough community difficulty in readily seeing the nature and
> benefit of this exercise -- I usually assume that when any one
> reasonable reader has that sort of problem, others will too -- we should
> probably find an example to add that distinguishes between this level of
> discussion and the lower-level type that IETF work typical deals with --
> and that ought to derive from these higher-level points.
>
> There might be an line of discussion to add to the document, namely
> tradeoffs and limitations of various technical approaches, especially
> popular ones.  For example, transport-level encryption has notable
> benefits, but the deficiencies seem to be absent from most IETF
> discussions, leaving very large holes in the creator/consumer path.
>
> d/
>
> --
> Dave Crocker
> Brandenburg InternetWorking
> bbiw.net
>



--=20
- Tim Bray (If you=E2=80=99d like to send me a private message, see
https://keybase.io/timbray)

--001a1133a5b487cee40511461b64
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-size:small">OK,=
 I=E2=80=99ll go ahead and do an -01 with a better introduction, which is c=
learly needed. =C2=A0 =C2=A0Interested to hear what others think of Robin=
=E2=80=99s privacy/confidentiality distinction.</div><div class=3D"gmail_de=
fault" style=3D"font-size:small"><br></div><div class=3D"gmail_default" sty=
le=3D"font-size:small"><br></div></div><div class=3D"gmail_extra"><br><div =
class=3D"gmail_quote">On Sun, Mar 15, 2015 at 4:00 AM, Dave Crocker <span d=
ir=3D"ltr">&lt;<a href=3D"mailto:dhc@dcrocker.net" target=3D"_blank">dhc@dc=
rocker.net</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span cl=
ass=3D"">On 3/14/2015 2:27 AM, Tim Bray wrote:<br>
&gt; This draft is trying to make general points that are orthogonal to any=
<br>
&gt; particular technology, including:<br>
&gt;<br>
&gt; - Positive &amp; negative privacy failures are asymmetrically harmful<=
br>
&gt; - the right choices are hard to make, so just don&#39;t ask inexpert u=
ses to<br>
&gt; make them,<br>
&gt; - the cost of privacy technologies is monotonically falling<br>
<br>
<br>
</span>+1 to the nature and direction of this document.<br>
<br>
Especially for topics that are complex, poorly understood and/or are<br>
controversial, it can greatly help to discuss issues and tradeoffs in<br>
higher-level, non-technical terms.=C2=A0 I usually cast this as needing<br>
statement about functional benefits and detriments for users (end-users,<br=
>
operators, etc.)<br>
<br>
The summary bullets Tim provided, above, are worth adding to the<br>
document early, with the rest of document providing substance to them.<br>
<br>
If there is enough community difficulty in readily seeing the nature and<br=
>
benefit of this exercise -- I usually assume that when any one<br>
reasonable reader has that sort of problem, others will too -- we should<br=
>
probably find an example to add that distinguishes between this level of<br=
>
discussion and the lower-level type that IETF work typical deals with --<br=
>
and that ought to derive from these higher-level points.<br>
<br>
There might be an line of discussion to add to the document, namely<br>
tradeoffs and limitations of various technical approaches, especially<br>
popular ones.=C2=A0 For example, transport-level encryption has notable<br>
benefits, but the deficiencies seem to be absent from most IETF<br>
discussions, leaving very large holes in the creator/consumer path.<br>
<span class=3D"HOEnZb"><font color=3D"#888888"><br>
d/<br>
<br>
--<br>
Dave Crocker<br>
Brandenburg InternetWorking<br>
<a href=3D"http://bbiw.net" target=3D"_blank">bbiw.net</a><br>
</font></span></blockquote></div><br><br clear=3D"all"><div><br></div>-- <b=
r><div class=3D"gmail_signature"><div dir=3D"ltr"><div>- Tim Bray (If you=
=E2=80=99d like to send me a private message, see <a href=3D"https://keybas=
e.io/timbray" target=3D"_blank">https://keybase.io/timbray</a>)</div></div>=
</div>
</div>

--001a1133a5b487cee40511461b64--


From nobody Mon Mar 16 07:22:35 2015
Return-Path: <kent@bbn.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 943E61A8758 for <perpass@ietfa.amsl.com>; Mon, 16 Mar 2015 07:22:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.511
X-Spam-Level: 
X-Spam-Status: No, score=-1.511 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zi2k0NGkMfC0 for <perpass@ietfa.amsl.com>; Mon, 16 Mar 2015 07:22:31 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8443D1A877B for <perpass@ietf.org>; Mon, 16 Mar 2015 07:22:30 -0700 (PDT)
Received: from ssh.bbn.com ([192.1.122.15]:43015 helo=COMSEC.home) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1YXVuX-0004RT-BG for perpass@ietf.org; Mon, 16 Mar 2015 10:22:29 -0400
Message-ID: <5506E725.2050003@bbn.com>
Date: Mon, 16 Mar 2015 10:22:29 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: perpass@ietf.org
References: <CAHBU6itCVapYX5PRDqte6t_M9Ja0byoMHkTwSircEoZJiHoM0g@mail.gmail.com>,  <55035662.1070307@cs.tcd.ie> <8CB555C3-1681-46AC-A161-218199AF1AED@isoc.org>
In-Reply-To: <8CB555C3-1681-46AC-A161-218199AF1AED@isoc.org>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/_HU71qwa8URiE5QGTHWwsOpulc4>
Subject: Re: [perpass] draft-bray-privacy-choices-00.html
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Mar 2015 14:22:34 -0000

Robin,
> ...
>
> Primrose goes to InsureMe.com, where she will be asked for a lot of personal data. InsureMe.com invites her to register and create a new account, with an ID and password; all this is done over https, so InsureMe.com is confident it has taken suitable steps to protect the data from being visible to third parties.
Third parties on the wire. Experience shows that Primrose's data is most 
likely to be
disclosed to third parties once it is on the InsureMe.com web site. Your 
example
goes on to cite a privacy violation in the form of Gotcher.com. But, a 
successful attack
against InsureMe.com also would violate the confidentiality of 
Primrose's data.

Bottom line: I agree with your observation that privacy is not the same as
confidentiality, and we often overly simplify these discussions.

Steve


From nobody Mon Mar 16 07:46:10 2015
Return-Path: <wilton@isoc.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ACD741A87E6 for <perpass@ietfa.amsl.com>; Mon, 16 Mar 2015 07:46:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rWNORmam8TFP for <perpass@ietfa.amsl.com>; Mon, 16 Mar 2015 07:46:04 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1bon0696.outbound.protection.outlook.com [IPv6:2a01:111:f400:fc10::1:696]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 084B11A87E0 for <perpass@ietf.org>; Mon, 16 Mar 2015 07:46:04 -0700 (PDT)
Received: from CO2PR0601MB0983.namprd06.prod.outlook.com (25.160.7.28) by CO2PR0601MB0982.namprd06.prod.outlook.com (25.160.7.27) with Microsoft SMTP Server (TLS) id 15.1.99.14; Mon, 16 Mar 2015 14:45:47 +0000
Received: from CO2PR0601MB0983.namprd06.prod.outlook.com ([25.160.7.28]) by CO2PR0601MB0983.namprd06.prod.outlook.com ([25.160.7.28]) with mapi id 15.01.0099.004; Mon, 16 Mar 2015 14:45:47 +0000
From: Robin Wilton <wilton@isoc.org>
To: Stephen Kent <kent@bbn.com>
Thread-Topic: [perpass] draft-bray-privacy-choices-00.html
Thread-Index: AQHQXc/AhfdvI7OZZUKCc7g7lWuc4Z0a7YsAgAEOXrqAAzG7gIAAB08A
Date: Mon, 16 Mar 2015 14:45:47 +0000
Message-ID: <C8473263-CF47-426D-8134-1329F9FBBBD8@isoc.org>
References: <CAHBU6itCVapYX5PRDqte6t_M9Ja0byoMHkTwSircEoZJiHoM0g@mail.gmail.com>,  <55035662.1070307@cs.tcd.ie> <8CB555C3-1681-46AC-A161-218199AF1AED@isoc.org> <5506E725.2050003@bbn.com>
In-Reply-To: <5506E725.2050003@bbn.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [94.174.34.240]
authentication-results: bbn.com; dkim=none (message not signed) header.d=none; 
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CO2PR0601MB0982;
x-forefront-antispam-report: BMV:0; SFV:NSPM; SFS:(10009020)(6009001)(51914003)(24454002)(51704005)(92566002)(33656002)(36756003)(46102003)(106116001)(110136001)(66066001)(77156002)(62966003)(99286002)(82746002)(19580395003)(19580405001)(2950100001)(87936001)(2900100001)(76176999)(15975445007)(93886004)(50986999)(2656002)(230783001)(40100003)(122556002)(102836002)(551544002)(86362001)(99936001)(83716003)(54356999)(104396002); DIR:OUT; SFP:1101; SCL:1; SRVR:CO2PR0601MB0982; H:CO2PR0601MB0983.namprd06.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
x-microsoft-antispam-prvs: <CO2PR0601MB09826534DAEC4FB04C1DDAA088020@CO2PR0601MB0982.namprd06.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(5001010)(5005006); SRVR:CO2PR0601MB0982; BCL:0; PCL:0; RULEID:; SRVR:CO2PR0601MB0982; 
x-forefront-prvs: 05177D47DC
Content-Type: multipart/signed; boundary="Apple-Mail=_9416F531-8848-4E2F-A298-52A2A5F44827"; protocol="application/pgp-signature"; micalg=pgp-sha1
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Mar 2015 14:45:47.2778 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 89f84dfb-7285-4810-bc4d-8b9b5794554f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR0601MB0982
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/ChgUnlM017YdEWJOEmrJ9wCCFNI>
Cc: perpass <perpass@ietf.org>
Subject: Re: [perpass] draft-bray-privacy-choices-00.html
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Mar 2015 14:46:09 -0000

--Apple-Mail=_9416F531-8848-4E2F-A298-52A2A5F44827
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Hi Steve - and thanks for the correction.

I agree with your additional use-cases/threat scenarios, naturally=85 I =
was just trying to keep it to one simple illustration ;^)

R

On 16 Mar 2015, at 14:22, Stephen Kent <kent@bbn.com> wrote:

> Robin,
>> ...
>>=20
>> Primrose goes to InsureMe.com, where she will be asked for a lot of =
personal data. InsureMe.com invites her to register and create a new =
account, with an ID and password; all this is done over https, so =
InsureMe.com is confident it has taken suitable steps to protect the =
data from being visible to third parties.
> Third parties on the wire. Experience shows that Primrose's data is =
most likely to be
> disclosed to third parties once it is on the InsureMe.com web site. =
Your example
> goes on to cite a privacy violation in the form of Gotcher.com. But, a =
successful attack
> against InsureMe.com also would violate the confidentiality of =
Primrose's data.
>=20
> Bottom line: I agree with your observation that privacy is not the =
same as
> confidentiality, and we often overly simplify these discussions.
>=20
> Steve
>=20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass


--Apple-Mail=_9416F531-8848-4E2F-A298-52A2A5F44827
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAlUG7UYACgkQx1kEWLxmyT1gygCggMe3iGX3AMrQ9bzaldekRLP/
QEoAoINzlEeIecs+kDOKJyNsYXUn3j5u
=pShm
-----END PGP SIGNATURE-----

--Apple-Mail=_9416F531-8848-4E2F-A298-52A2A5F44827--


From nobody Wed Mar 18 13:58:55 2015
Return-Path: <ted.ietf@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 705EE1A910A for <perpass@ietfa.amsl.com>; Wed, 18 Mar 2015 13:58:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4SD6M7RDJgZC for <perpass@ietfa.amsl.com>; Wed, 18 Mar 2015 13:58:51 -0700 (PDT)
Received: from mail-ie0-x234.google.com (mail-ie0-x234.google.com [IPv6:2607:f8b0:4001:c03::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D0251A9103 for <perpass@ietf.org>; Wed, 18 Mar 2015 13:58:51 -0700 (PDT)
Received: by ieclw3 with SMTP id lw3so49682908iec.2 for <perpass@ietf.org>; Wed, 18 Mar 2015 13:58:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=W7k7Q8xRcYaNGeJwbQ2al2uXR0hJ33/0SEWoSVOw7Dg=; b=ODmKYbhfuFvYd368jUXAnZ0Se9cIhY747gWe/EtsiukOij0N800bR25695Pm5x2AB8 3fmwNxhHsrUMW+QYajZebgBlOkUDIivgyUIwDEDuHJD6lroGIbpvk0VJFri853mF07bE y1B542fZAkxJ8c+qnR1/WKJSj11jIEaRUACibd3IBsfG9dn6s/KK3/WOUQEFCfw2vNC5 8nRS320wrf1HeqKcrHF15kcGOMmc/HmeWc+W1KYnX9xRB0wFoUpYJjyPPjeu1hNSDhSK Vlu330c7lQCCBWKpIIJzD/owbqncjhE+IcLLO2rCDfV7S1QO81abr5fHHJUHbDesSBAt 7Jrg==
MIME-Version: 1.0
X-Received: by 10.42.82.199 with SMTP id e7mr91488851icl.18.1426712331063; Wed, 18 Mar 2015 13:58:51 -0700 (PDT)
Received: by 10.42.129.17 with HTTP; Wed, 18 Mar 2015 13:58:51 -0700 (PDT)
In-Reply-To: <20150318205225.18860.41113.idtracker@ietfa.amsl.com>
References: <20150318205225.18860.41113.idtracker@ietfa.amsl.com>
Date: Wed, 18 Mar 2015 13:58:51 -0700
Message-ID: <CA+9kkMCJU8mCeHQFUWkOR8uCKgTDecTESx1n3uambCP4N_PK_g@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
To: "<perpass@ietf.org>" <perpass@ietf.org>
Content-Type: multipart/alternative; boundary=20cf30334657b0bade051196595a
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/hM5i0R2OQg-BTPWOkapzuBkpX5M>
Cc: "privsec-program@iab.org" <privsec-program@iab.org>
Subject: [perpass] Fwd: [IAB] I-D ACTION:draft-iab-privsec-confidentiality-threat-04.txt
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Mar 2015 20:58:53 -0000

--20cf30334657b0bade051196595a
Content-Type: text/plain; charset=UTF-8

Howdy,

This version updates the draft to reflect some of the recent feedback, and
we'd appreciate fresh reviews.  It is likely that this version will be the
one the IAB sends for general community review, so an early look at it
would be much appreciated.  If you know of other folks who should review at
this stage, please pass it along.

thanks,

Ted


---------- Forwarded message ----------
From: <Internet-Drafts@ietf.org>
Date: Wed, Mar 18, 2015 at 1:52 PM
Subject: [IAB] I-D ACTION:draft-iab-privsec-confidentiality-threat-04.txt
To: i-d-announce@ietf.org
Cc: iab@iab.org


A new Internet-Draft is available from the on-line Internet-Drafts
directories.


    Title         : Confidentiality in the Face of Pervasive Surveillance:
A Threat Model and Problem Statement
    Author(s)     : R. Barnes, et al
    Filename      : draft-iab-privsec-confidentiality-threat
    Pages         : 23
    Date          : 2015-03-18

   Documents published since initial revelations in 2013 have revealed
   several classes of pervasive surveillance attack on Internet
   communications.  In this document we develop a threat model that
   describes these pervasive attacks.  We start by assuming an attacker
   with an interest in undetected, indiscriminate eavesdropping, then
   expand the threat model with a set of verified attacks that have been
   published.

A URL for this Internet-Draft is:
https://www.ietf.org/internet-drafts/draft-iab-privsec-confidentiality-threat-04.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--20cf30334657b0bade051196595a
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-family:tahoma,s=
ans-serif;font-size:small">Howdy,<br><br></div><div class=3D"gmail_default"=
 style=3D"font-family:tahoma,sans-serif;font-size:small">This version updat=
es the draft to reflect some of the recent feedback, and we&#39;d appreciat=
e fresh reviews.=C2=A0 It is likely that this version will be the one the I=
AB sends for general community review, so an early look at it would be much=
 appreciated.=C2=A0 If you know of other folks who should review at this st=
age, please pass it along.<br><br></div><div class=3D"gmail_default" style=
=3D"font-family:tahoma,sans-serif;font-size:small">thanks,<br><br></div><di=
v class=3D"gmail_default" style=3D"font-family:tahoma,sans-serif;font-size:=
small">Ted <br></div><div class=3D"gmail_default" style=3D"font-family:taho=
ma,sans-serif;font-size:small"><br><br></div><div class=3D"gmail_quote">---=
------- Forwarded message ----------<br>From: <b class=3D"gmail_sendername"=
></b> <span dir=3D"ltr">&lt;<a href=3D"mailto:Internet-Drafts@ietf.org">Int=
ernet-Drafts@ietf.org</a>&gt;</span><br>Date: Wed, Mar 18, 2015 at 1:52 PM<=
br>Subject: [IAB] I-D ACTION:draft-iab-privsec-confidentiality-threat-04.tx=
t<br>To: <a href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>=
<br>Cc: <a href=3D"mailto:iab@iab.org">iab@iab.org</a><br><br><br>A new Int=
ernet-Draft is available from the on-line Internet-Drafts directories.<br>
<br>
<br>
=C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: Confidentiality in t=
he Face of Pervasive Surveillance: A Threat Model and Problem Statement<br>
=C2=A0 =C2=A0 Author(s)=C2=A0 =C2=A0 =C2=A0: R. Barnes, et al<br>
=C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 : draft-iab-privsec-confidential=
ity-threat<br>
=C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 23<br>
=C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 2015-03-18<br>
<br>
=C2=A0 =C2=A0Documents published since initial revelations in 2013 have rev=
ealed<br>
=C2=A0 =C2=A0several classes of pervasive surveillance attack on Internet<b=
r>
=C2=A0 =C2=A0communications.=C2=A0 In this document we develop a threat mod=
el that<br>
=C2=A0 =C2=A0describes these pervasive attacks.=C2=A0 We start by assuming =
an attacker<br>
=C2=A0 =C2=A0with an interest in undetected, indiscriminate eavesdropping, =
then<br>
=C2=A0 =C2=A0expand the threat model with a set of verified attacks that ha=
ve been<br>
=C2=A0 =C2=A0published.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"https://www.ietf.org/internet-drafts/draft-iab-privsec-confident=
iality-threat-04.txt" target=3D"_blank">https://www.ietf.org/internet-draft=
s/draft-iab-privsec-confidentiality-threat-04.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br><br></div><br></div>

--20cf30334657b0bade051196595a--


From nobody Tue Mar 24 21:06:23 2015
Return-Path: <tbray@textuality.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C7CC1ACD8E for <perpass@ietfa.amsl.com>; Tue, 24 Mar 2015 21:06:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level: 
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xCV7Hx5sII8a for <perpass@ietfa.amsl.com>; Tue, 24 Mar 2015 21:06:20 -0700 (PDT)
Received: from mail-lb0-f174.google.com (mail-lb0-f174.google.com [209.85.217.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB30D1ACD82 for <perpass@ietf.org>; Tue, 24 Mar 2015 21:06:19 -0700 (PDT)
Received: by lbbug6 with SMTP id ug6so8812476lbb.3 for <perpass@ietf.org>; Tue, 24 Mar 2015 21:06:18 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:date:message-id:subject:from:to :content-type; bh=l2uC9Dc5aHh5qUbFrF+ctUmKrX3IZjAThWtdUtDDh4E=; b=Tro0i1WRHddQ+Jq82LkvS26xkcjFMU/vJsfQ3J7sHOvc+U7rUwxmNL39yq5r4iQx2f Xl4S+/PACvNNxDDp7mZWZ4Wp2xMIhedqCmAOVUbmO8pQwQV6STmG3GPKpFqvoig6kpBv a7okKKmZUka0Eo64e6lIgRembQi3P9k6cKFKIAYD5W8zSFUDJy7xLkwjoFj3UnHA5HeK +dkIeq9tV0qOqkGPxEDhuNHE932DruYmWTfF5HTNtW1Lrix/2AKVnGNv3ZJIGhfoULY7 5RVZ7NMhfkVkU9S5fReaswiCwAHbM6SKftUY+ch+80NdBrpn+9IqTMQMCO1PMe3XxZSX 2G8w==
X-Gm-Message-State: ALoCoQkLzuuPsxf45AUtkZamvF0m7WpMSB3/NnYTVZ4h6CRMlmudYi4mqIhXfhAG6+mtTWzUZI8K
MIME-Version: 1.0
X-Received: by 10.112.141.106 with SMTP id rn10mr6662009lbb.100.1427256378175;  Tue, 24 Mar 2015 21:06:18 -0700 (PDT)
Received: by 10.114.3.242 with HTTP; Tue, 24 Mar 2015 21:06:18 -0700 (PDT)
X-Originating-IP: [122.56.200.172]
Received: by 10.114.3.242 with HTTP; Tue, 24 Mar 2015 21:06:18 -0700 (PDT)
Date: Wed, 25 Mar 2015 17:06:18 +1300
Message-ID: <CAHBU6it+abd8aO73=42utd9aWUCfy+Jnq9wx9Nd3nPSNMUrdvw@mail.gmail.com>
From: Tim Bray <tbray@textuality.com>
To: perpass <perpass@ietf.org>
Content-Type: multipart/alternative; boundary=001a11c26b386cc6f6051215055b
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/JQ3S7bSVR2ywMBMtm4llb9HoZbg>
Subject: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2015 04:06:21 -0000

--001a11c26b386cc6f6051215055b
Content-Type: text/plain; charset=UTF-8

Check out https://https.cio.gov/ - some good clear thinking there in the
write-up.

--001a11c26b386cc6f6051215055b
Content-Type: text/html; charset=UTF-8

<p dir="ltr">Check out <a href="https://https.cio.gov/">https://https.cio.gov/</a> - some good clear thinking there in the write-up.</p>

--001a11c26b386cc6f6051215055b--


From nobody Wed Mar 25 10:08:39 2015
Return-Path: <mnl@well.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9AEAE1A894A for <perpass@ietfa.amsl.com>; Wed, 25 Mar 2015 10:08:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.209
X-Spam-Level: 
X-Spam-Status: No, score=-4.209 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 70wtkKoEnUr0 for <perpass@ietfa.amsl.com>; Wed, 25 Mar 2015 10:08:37 -0700 (PDT)
Received: from newsmtp.well.com (newsmtp.well.com [107.20.247.102]) by ietfa.amsl.com (Postfix) with ESMTP id 122511A88E2 for <perpass@ietf.org>; Wed, 25 Mar 2015 10:08:36 -0700 (PDT)
Received: from zimbra.well.com (zimbra.well.com [10.69.72.164]) by newsmtp.well.com (8.14.3/8.14.3) with ESMTP id t2PH8ZHV016866; Wed, 25 Mar 2015 10:08:35 -0700
Received: from localhost (localhost.localdomain [127.0.0.1]) by zimbra.well.com (Postfix) with ESMTP id 60D784010D34; Wed, 25 Mar 2015 10:08:36 -0700 (PDT)
Received: from zimbra.well.com ([127.0.0.1]) by localhost (zimbra.well.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WtogjYLhEf5E; Wed, 25 Mar 2015 10:08:35 -0700 (PDT)
Received: from MLiebhold.local (unknown [199.73.113.19]) by zimbra.well.com (Postfix) with ESMTPSA id 3BBCB4010D25; Wed, 25 Mar 2015 10:08:35 -0700 (PDT)
Message-ID: <5512EB91.9060009@well.com>
Date: Wed, 25 Mar 2015 10:08:33 -0700
From: Mike Liebhold <mnl@well.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: Tim Bray <tbray@textuality.com>, perpass <perpass@ietf.org>
References: <CAHBU6it+abd8aO73=42utd9aWUCfy+Jnq9wx9Nd3nPSNMUrdvw@mail.gmail.com>
In-Reply-To: <CAHBU6it+abd8aO73=42utd9aWUCfy+Jnq9wx9Nd3nPSNMUrdvw@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------020901030003040603000707"
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/WHGSsb6LZMOMdSo1O0XyNkwewHA>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2015 17:08:38 -0000

This is a multi-part message in MIME format.
--------------020901030003040603000707
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit

HTTPs everywhere is a critically important goal, but as Peter Eckersley 
at EFF points out, without best practices for keeping certificates 
current, with reliable cert authorities -- the  -assumption-  of a 
secure HTTPs connection  can be undermined..

e.g. When encountering an "unrecognized certificate" warning - most 
people click through....  potentially  connecting to a spoofed site.... 
even though it says HTTPs in the url bar.




On 3/24/15 9:06 PM, Tim Bray wrote:
>
> Check out https://https.cio.gov/ - some good clear thinking there in 
> the write-up.
>
>
>
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass


--------------020901030003040603000707
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">HTTPs everywhere is a critically
      important goal, but as Peter Eckersley at EFF points out, without
      best practices for keeping certificates current, with reliable
      cert authorities -- the  -assumption-  of a secure HTTPs
      connection  can be undermined..<br>
      <br>
      e.g. When encountering an "unrecognized certificate" warning -
      most people click through....  potentially  connecting to a
      spoofed site.... even though it says HTTPs in the url bar.<br>
      <br>
      <br>
      <br>
      <br>
      On 3/24/15 9:06 PM, Tim Bray wrote:<br>
    </div>
    <blockquote
cite="mid:CAHBU6it+abd8aO73=42utd9aWUCfy+Jnq9wx9Nd3nPSNMUrdvw@mail.gmail.com"
      type="cite">
      <p dir="ltr">Check out <a moz-do-not-send="true"
          href="https://https.cio.gov/">https://https.cio.gov/</a> -
        some good clear thinking there in the write-up.</p>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
perpass mailing list
<a class="moz-txt-link-abbreviated" href="mailto:perpass@ietf.org">perpass@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/perpass">https://www.ietf.org/mailman/listinfo/perpass</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------020901030003040603000707--


From nobody Wed Mar 25 10:11:20 2015
Return-Path: <mnl@well.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C7AD1A8989 for <perpass@ietfa.amsl.com>; Wed, 25 Mar 2015 10:11:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.209
X-Spam-Level: 
X-Spam-Status: No, score=-4.209 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9K8Qff17SiGK for <perpass@ietfa.amsl.com>; Wed, 25 Mar 2015 10:11:18 -0700 (PDT)
Received: from newsmtp.well.com (newsmtp.well.com [107.20.247.102]) by ietfa.amsl.com (Postfix) with ESMTP id D86B11A879C for <perpass@ietf.org>; Wed, 25 Mar 2015 10:11:17 -0700 (PDT)
Received: from zimbra.well.com (zimbra.well.com [10.69.72.164]) by newsmtp.well.com (8.14.3/8.14.3) with ESMTP id t2PHBGvw019571; Wed, 25 Mar 2015 10:11:16 -0700
Received: from localhost (localhost.localdomain [127.0.0.1]) by zimbra.well.com (Postfix) with ESMTP id 5DF334010D7E; Wed, 25 Mar 2015 10:11:17 -0700 (PDT)
Received: from zimbra.well.com ([127.0.0.1]) by localhost (zimbra.well.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fcJL-HfRYadt; Wed, 25 Mar 2015 10:11:16 -0700 (PDT)
Received: from MLiebhold.local (unknown [199.73.113.19]) by zimbra.well.com (Postfix) with ESMTPSA id E4DA64010D67; Wed, 25 Mar 2015 10:11:15 -0700 (PDT)
Message-ID: <5512EC32.2030001@well.com>
Date: Wed, 25 Mar 2015 10:11:14 -0700
From: Mike Liebhold <mnl@well.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: Tim Bray <tbray@textuality.com>, perpass <perpass@ietf.org>
References: <CAHBU6it+abd8aO73=42utd9aWUCfy+Jnq9wx9Nd3nPSNMUrdvw@mail.gmail.com> <5512EB91.9060009@well.com>
In-Reply-To: <5512EB91.9060009@well.com>
Content-Type: multipart/alternative; boundary="------------060604000709080105080704"
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/t03FPyUDSqeAbsYo1EQYP1S4N2o>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2015 17:11:19 -0000

This is a multi-part message in MIME format.
--------------060604000709080105080704
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit

I neglected  to include the link to the new  EFF/Mozilla Certificate 
authority initiative.

Launching in 2015: A Certificate Authority to Encrypt the Entire Web
https://www.eff.org/deeplinks/2014/11/certificate-authority-encrypt-entire-web


On 3/25/15 10:08 AM, Mike Liebhold wrote:
> HTTPs everywhere is a critically important goal, but as Peter 
> Eckersley at EFF points out, without best practices for keeping 
> certificates current, with reliable cert authorities -- the  
> -assumption-  of a secure HTTPs connection  can be undermined..
>
> e.g. When encountering an "unrecognized certificate" warning - most 
> people click through....  potentially  connecting to a spoofed 
> site.... even though it says HTTPs in the url bar.
>
>
>
>
> On 3/24/15 9:06 PM, Tim Bray wrote:
>>
>> Check out https://https.cio.gov/ - some good clear thinking there in 
>> the write-up.
>>
>>
>>
>> _______________________________________________
>> perpass mailing list
>> perpass@ietf.org
>> https://www.ietf.org/mailman/listinfo/perpass
>


--------------060604000709080105080704
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">I neglected  to include the link to the
      new  EFF/Mozilla Certificate authority initiative.<br>
      <br>
      Launching in 2015: A Certificate Authority to Encrypt the Entire
      Web<br>
<a class="moz-txt-link-freetext" href="https://www.eff.org/deeplinks/2014/11/certificate-authority-encrypt-entire-web">https://www.eff.org/deeplinks/2014/11/certificate-authority-encrypt-entire-web</a><br>
      <br>
      <br>
      On 3/25/15 10:08 AM, Mike Liebhold wrote:<br>
    </div>
    <blockquote cite="mid:5512EB91.9060009@well.com" type="cite">
      <meta content="text/html; charset=windows-1252"
        http-equiv="Content-Type">
      <div class="moz-cite-prefix">HTTPs everywhere is a critically
        important goal, but as Peter Eckersley at EFF points out,
        without best practices for keeping certificates current, with
        reliable cert authorities -- the  -assumption-  of a secure
        HTTPs connection  can be undermined..<br>
        <br>
        e.g. When encountering an "unrecognized certificate" warning -
        most people click through....  potentially  connecting to a
        spoofed site.... even though it says HTTPs in the url bar.<br>
        <br>
        <br>
        <br>
        <br>
        On 3/24/15 9:06 PM, Tim Bray wrote:<br>
      </div>
      <blockquote
cite="mid:CAHBU6it+abd8aO73=42utd9aWUCfy+Jnq9wx9Nd3nPSNMUrdvw@mail.gmail.com"
        type="cite">
        <p dir="ltr">Check out <a moz-do-not-send="true"
            href="https://https.cio.gov/">https://https.cio.gov/</a> -
          some good clear thinking there in the write-up.</p>
        <br>
        <fieldset class="mimeAttachmentHeader"></fieldset>
        <br>
        <pre wrap="">_______________________________________________
perpass mailing list
<a moz-do-not-send="true" class="moz-txt-link-abbreviated" href="mailto:perpass@ietf.org">perpass@ietf.org</a>
<a moz-do-not-send="true" class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/perpass">https://www.ietf.org/mailman/listinfo/perpass</a>
</pre>
      </blockquote>
      <br>
    </blockquote>
    <br>
  </body>
</html>

--------------060604000709080105080704--


From nobody Wed Mar 25 10:47:20 2015
Return-Path: <mellon@fugue.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 443B71A9164 for <perpass@ietfa.amsl.com>; Wed, 25 Mar 2015 10:47:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U6fL2WFNST2j for <perpass@ietfa.amsl.com>; Wed, 25 Mar 2015 10:47:18 -0700 (PDT)
Received: from toccata.fugue.com (toccata.fugue.com [204.152.186.142]) by ietfa.amsl.com (Postfix) with ESMTP id EDD421A9149 for <perpass@ietf.org>; Wed, 25 Mar 2015 10:47:17 -0700 (PDT)
Received: from [IPv6:2001:67c:1231:998:59fc:1802:aa5c:57ae] (unknown [IPv6:2001:67c:1231:998:59fc:1802:aa5c:57ae]) by toccata.fugue.com (Postfix) with ESMTPSA id 5827D23824E4; Wed, 25 Mar 2015 13:47:17 -0400 (EDT)
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Ted Lemon <mellon@fugue.com>
In-Reply-To: <5512EB91.9060009@well.com>
Date: Wed, 25 Mar 2015 12:47:16 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <8050AF5E-A194-4E2B-88BC-921DB6A0BBC3@fugue.com>
References: <CAHBU6it+abd8aO73=42utd9aWUCfy+Jnq9wx9Nd3nPSNMUrdvw@mail.gmail.com> <5512EB91.9060009@well.com>
To: Mike Liebhold <mnl@well.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/jUUJkW8ROHCv_SAAU11d6s7zgow>
Cc: perpass <perpass@ietf.org>, Tim Bray <tbray@textuality.com>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2015 17:47:19 -0000

On Mar 25, 2015, at 12:08 PM, Mike Liebhold <mnl@well.com> wrote:
> e.g. When encountering an "unrecognized certificate" warning - most =
people click through....  potentially  connecting to a spoofed site.... =
even though it says HTTPs in the url bar.

This is a UI fail.   The browser should never display that alert, any =
more than it should display an alert to click through proposing that you =
might want to try a different web site if the one you were trying to =
reach were simply unreachable.

Of course, I realize that this makes captive portals more difficult, but =
enabling this particular UI fail simply in order to allow captive =
portals to work is a very expensive solution to an easily solved problem =
(see http://datatracker.ietf.org/doc/draft-wkumari-dhc-capport/).


From nobody Thu Mar 26 19:11:54 2015
Return-Path: <dan@geer.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2601C1A8A4C for <perpass@ietfa.amsl.com>; Thu, 26 Mar 2015 19:11:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.8
X-Spam-Level: 
X-Spam-Status: No, score=0.8 tagged_above=-999 required=5 tests=[BAYES_50=0.8] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZfBu3bOrIZ29 for <perpass@ietfa.amsl.com>; Thu, 26 Mar 2015 19:11:51 -0700 (PDT)
Received: from palinka.tinho.net (palinka.tinho.net [166.84.6.13]) by ietfa.amsl.com (Postfix) with ESMTP id DF1401A701E for <perpass@ietf.org>; Thu, 26 Mar 2015 19:11:50 -0700 (PDT)
Received: by palinka.tinho.net (Postfix, from userid 126) id 9EB45228181; Thu, 26 Mar 2015 22:11:40 -0400 (EDT)
Received: from palinka.tinho.net (localhost [127.0.0.1]) by palinka.tinho.net (Postfix) with ESMTP id 984CD228117 for <perpass@ietf.org>; Thu, 26 Mar 2015 22:11:40 -0400 (EDT)
From: dan@geer.org
To: perpass@ietf.org
In-Reply-To: Your message of "Wed, 25 Mar 2015 10:11:14 -0700." <5512EC32.2030001@well.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <97067.1427422300.1@palinka.tinho.net>
Date: Thu, 26 Mar 2015 22:11:40 -0400
Message-Id: <20150327021140.9EB45228181@palinka.tinho.net>
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/T3reP3b_Cc3yx5nHxu3ZQLzylws>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Mar 2015 02:11:52 -0000

Encryption everywhere all the time?  No, thank you.

Better said, and at effective length, by David Golumbia

   Opt-Out Citizenship: End-to-End Encryption and
   Constitutional Governance
   http://www.uncomputing.org/?p=272


--dan


From nobody Thu Mar 26 19:42:51 2015
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D86A1A8F42 for <perpass@ietfa.amsl.com>; Thu, 26 Mar 2015 19:42:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0Z1YyiUmjQ4G for <perpass@ietfa.amsl.com>; Thu, 26 Mar 2015 19:42:48 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F4E31A8F3D for <perpass@ietf.org>; Thu, 26 Mar 2015 19:42:48 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 3FD2BBEE0; Fri, 27 Mar 2015 02:42:47 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gS-ixS6SgQYP; Fri, 27 Mar 2015 02:42:45 +0000 (GMT)
Received: from [31.133.139.135] (unknown [31.133.139.135]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 5F77CBE87; Fri, 27 Mar 2015 02:42:45 +0000 (GMT)
Message-ID: <5514C3A3.4080107@cs.tcd.ie>
Date: Fri, 27 Mar 2015 02:42:43 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: dan@geer.org, perpass@ietf.org
References: <20150327021140.9EB45228181@palinka.tinho.net>
In-Reply-To: <20150327021140.9EB45228181@palinka.tinho.net>
OpenPGP: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/_XzyKO9Uw8ZW9mAXgMRoaBMG16Y>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Mar 2015 02:42:50 -0000

On 27/03/15 02:11, dan@geer.org wrote:
> Encryption everywhere all the time?  No, thank you.

Much more encryption, done well, almost all the time - yes please:-)

> Better said, and at effective length, by David Golumbia
> 
>    Opt-Out Citizenship: End-to-End Encryption and
>    Constitutional Governance
>    http://www.uncomputing.org/?p=272

Had a quick flick. Arguments based on a presumption of "perfect
end-to-end encryption" are utterly useless as they are counterfactual.
Anything one likes can follow from a false assumption like that.

S.


> 
> 
> --dan
> 
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
> 
> 


From nobody Thu Mar 26 21:02:25 2015
Return-Path: <mellon@fugue.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A46641A1EED for <perpass@ietfa.amsl.com>; Thu, 26 Mar 2015 21:02:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gpSr3B_nL6VU for <perpass@ietfa.amsl.com>; Thu, 26 Mar 2015 21:02:22 -0700 (PDT)
Received: from toccata.fugue.com (toccata.fugue.com [204.152.186.142]) by ietfa.amsl.com (Postfix) with ESMTP id 5FA0D1A1B46 for <perpass@ietf.org>; Thu, 26 Mar 2015 21:02:22 -0700 (PDT)
Received: from dhcp-89e7.meeting.ietf.org (dhcp-89e7.meeting.ietf.org [31.133.137.231]) by toccata.fugue.com (Postfix) with ESMTPSA id 0C22023803BE; Fri, 27 Mar 2015 00:02:20 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Ted Lemon <mellon@fugue.com>
In-Reply-To: <5514C3A3.4080107@cs.tcd.ie>
Date: Thu, 26 Mar 2015 23:02:19 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <610E1982-5E08-453D-AD81-6DB26ADD41F0@fugue.com>
References: <20150327021140.9EB45228181@palinka.tinho.net> <5514C3A3.4080107@cs.tcd.ie>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/hKcB9DHRIL-4T-m6xg5VhXSNW6w>
Cc: perpass@ietf.org, dan@geer.org
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Mar 2015 04:02:23 -0000

On Mar 26, 2015, at 9:42 PM, Stephen Farrell <stephen.farrell@cs.tcd.ie> =
wrote:
> Had a quick flick. Arguments based on a presumption of "perfect
> end-to-end encryption" are utterly useless as they are counterfactual.
> Anything one likes can follow from a false assumption like that.

The article also makes the mistake of thinking that the NSA =
eavesdropping on us is really the big failure mode.   Whether or not you =
think the NSA should eavesdrop on us, there are plenty of actors who =
should not, but who can, if we don't have more encryption.   The NSA is =
just the bellwether.

And the argument that we don't _really_ need privacy makes a lot of =
sense until you start asking yourself who you want to have copies of =
your credit card, who you want to know that you are away from your home =
this week, who you want to have photos of you in indiscreet poses, which =
gamergate trolls you want to have access to your private information, =
etc.

Come on, Dan, don't troll us!


From nobody Fri Mar 27 04:26:41 2015
Return-Path: <dhc@dcrocker.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5B4F1ACD5F for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 04:26:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KKd4gYD5Hq3Y for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 04:26:37 -0700 (PDT)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B64621ACD72 for <perpass@ietf.org>; Fri, 27 Mar 2015 04:26:35 -0700 (PDT)
Received: from [172.20.1.163] (rrcs-71-41-251-196.sw.biz.rr.com [71.41.251.196]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id t2RBQFr4010009 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Fri, 27 Mar 2015 04:26:20 -0700
Message-ID: <55153E55.10806@dcrocker.net>
Date: Fri, 27 Mar 2015 06:26:13 -0500
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: Ted Lemon <mellon@fugue.com>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
References: <20150327021140.9EB45228181@palinka.tinho.net> <5514C3A3.4080107@cs.tcd.ie> <610E1982-5E08-453D-AD81-6DB26ADD41F0@fugue.com>
In-Reply-To: <610E1982-5E08-453D-AD81-6DB26ADD41F0@fugue.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Fri, 27 Mar 2015 04:26:23 -0700 (PDT)
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/mPiCis0giFNmnG9jRLZ5qDApWj8>
Cc: perpass@ietf.org, dan@geer.org
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Mar 2015 11:26:39 -0000

On 3/26/2015 11:02 PM, Ted Lemon wrote:
> Come on, Dan, don't troll us!


Ted,

As far as I'm aware, this is a forum for discussing technical aspects of
privacy, rather than policy aspects.  As such, debating the policy
implications of true 'perfect' e2e encryption seems out of scope, though
I'd assume that being notified of useful articles about it is worthy.

Still, a casual ad hominem like yours constitutes a far greater trolling
action in the IETF than a serious posting to a an article about a
difficult topic.  Attempting to marginalize a serious person's serious
posting by attacking their motives is supposed to be unacceptable in the
IETF.

In fact since it prompted Stephen's response, I'd say that the comment
on downsides to 'perfect e2e encryption' was useful:  I class Stephen's
clarification of the difference between the goal of perfect e2e
encryption, vs. the currently-attainable far-less-than-perfect, an
essential clarification to discussions about efforts like https-everywhere.

This is not an intimate conversation amongst well-acquainted colleagues
subject to their own private social contract of behavior.  It's a public
forum.

d/


-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Fri Mar 27 04:42:52 2015
Return-Path: <jhall@cdt.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6140A1ACD6E for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 04:42:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.199
X-Spam-Level: 
X-Spam-Status: No, score=-1.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-0.7, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CsKeeQb0nI27 for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 04:42:50 -0700 (PDT)
Received: from mail-la0-f47.google.com (mail-la0-f47.google.com [209.85.215.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D23671ACD5F for <perpass@ietf.org>; Fri, 27 Mar 2015 04:42:49 -0700 (PDT)
Received: by labto5 with SMTP id to5so68341468lab.0 for <perpass@ietf.org>; Fri, 27 Mar 2015 04:42:48 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:content-transfer-encoding; bh=IGZpGdM5V3WKu/OLUZI/V7DPy/twtiwH+vpWBq4CLNQ=; b=lr93CK2ICfSx2RbDzB4a6r+I4uaxmX7F9KGyQgjZOWiua06A7DMLWvPYU5LGsTX6/z grpOomYJlqvGKKUik7nCiy3gfIMyYpbWSaM7I2z7EaFyTGPix/xH/e3oeHmX6PM9JPnT PhXcApB5TxtVtxKAWZeFmEEx5+o6QIdkTy9cGI/aaGrwgwFWVTagM42XXGA9aNLGBDuI hmyDxRQvKkNKCoywnKASq5vMEcpCWdGXmlSreSemJrzPbaQ6esV9odvTRaziBsJRTiKk /S4yx235l6OoIVd27gOBZuZm49fgaqcOClSHaA+HdfaHrZBOmu3HsQKJ6avxrN+5FX9z xCxw==
X-Gm-Message-State: ALoCoQk+Jco6ilawmE4xt75rrA8sIEmHnAVat6iy+WVTkB3gcsq6lyfdoANIxg70crthxMJxi0ZL
X-Received: by 10.152.179.68 with SMTP id de4mr17512602lac.65.1427456568191; Fri, 27 Mar 2015 04:42:48 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.25.37.4 with HTTP; Fri, 27 Mar 2015 04:42:27 -0700 (PDT)
In-Reply-To: <20150327021140.9EB45228181@palinka.tinho.net>
References: <5512EC32.2030001@well.com> <20150327021140.9EB45228181@palinka.tinho.net>
From: Joseph Lorenzo Hall <joe@cdt.org>
Date: Fri, 27 Mar 2015 06:42:27 -0500
Message-ID: <CABtrr-VEy1LpaWPL6Si92i+DCdrgySDrC7GnrR+6DkVu1o7Bvg@mail.gmail.com>
To: dan@geer.org
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/DE4PY_XoHMiDcYaA8LYYI17P98Y>
Cc: perpass@ietf.org
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Mar 2015 11:42:51 -0000

On Thu, Mar 26, 2015 at 9:11 PM,  <dan@geer.org> wrote:
> Encryption everywhere all the time?  No, thank you.
>
> Better said, and at effective length, by David Golumbia
>
>    Opt-Out Citizenship: End-to-End Encryption and
>    Constitutional Governance
>    http://www.uncomputing.org/?p=3D272

In addition to what others have said -- this does feel like a trolling
of perpass -- I think Mike Masnick summed up a useful perspective on
this from an article on FBI Director Comey's rather bizarre testimony
yesterday where he asked for US legislation mandating backdoors. In
short, just because we are mediating more of our lives through
networked devices does not mean the government should be able to to
access those flows, and it doesn't take away the responsibility to do
good old police work.

----

https://www.techdirt.com/articles/20150325/17430330432/fbi-quietly-removes-=
recommendation-to-encrypt-your-phone-as-fbi-director-warns-how-encryption-w=
ill-lead-to-tears.shtml

....

Not surprisingly, Comey pulls out the trifecta of FUD in trying to
explain why it needs to spy on everyone: pedophiles, kidnappers and
drug dealers:

=E2=80=9CTech execs say privacy should be the paramount virtue,=E2=80=9D Co=
mey
continued, =E2=80=9CWhen I hear that I close my eyes and say try to image w=
hat
the world looks like where pedophiles can=E2=80=99t be seen, kidnapper can=
=E2=80=99t
be seen, drug dealers can=E2=80=99t be seen.=E2=80=9D

Except we know exactly what that looks like -- because that's the
world we've basically always lived with. And yet, law enforcement
folks like the FBI and various police departments were able to use
basic detective work to track down criminals.

----

The thinking from articles like the one Dan sent can naturally be
extended to demanding government access to what are effectively our
thoughts (the last bastion of freedom in a Democracy, I'd think) once
we have computational cognitive support systems (which is not nearly
as sci-fi as you might think.

best, Joe

--=20
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
joe@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871


From nobody Fri Mar 27 09:29:47 2015
Return-Path: <nweaver@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E899B1A1BA5 for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 09:29:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.001
X-Spam-Level: 
X-Spam-Status: No, score=-0.001 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ppeI-uTcyKSx for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 09:29:43 -0700 (PDT)
Received: from mail-pd0-x235.google.com (mail-pd0-x235.google.com [IPv6:2607:f8b0:400e:c02::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E0AAF1A03B3 for <perpass@ietf.org>; Fri, 27 Mar 2015 09:29:42 -0700 (PDT)
Received: by pdnc3 with SMTP id c3so101266680pdn.0 for <perpass@ietf.org>; Fri, 27 Mar 2015 09:29:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=sender:subject:mime-version:content-type:from:in-reply-to:date:cc :message-id:references:to; bh=MOX8gB2R/FkTWPBOdwwPUqg7Q3X5g8HnGfiWTuqZuS8=; b=uqDAEUzSC90pzCgu5IL6xfRw7dm9EdtvbfjBVcQkNNRYYwcV9tiD9cJhycpu+BNIS/ X2WeKMy2S7zKJutmsqXYjzujhN/9mixjKVoXCh+9qXfQKXqYjamGzUSJzaDiBBOCGNkJ dzue2HR9kTvoLvuiBJE7AogJVlQw+RAbQ+DjIwYktIvvIuCor9YiV4fvuJD72zGDtgPQ qL3tNpENFqHBAGAI1qpjCzkioBab958hwfufZ5SKQI61IjLuq9SnduKtxAgYOwsJYlkN Af8pgDE6Mh3rJaoaOWaw9ekx2pawRHh893PaPeVdhRrGpqrnv5WrLzfJxJrBSyVQBWhS h1og==
X-Received: by 10.69.13.225 with SMTP id fb1mr37052646pbd.104.1427473782496; Fri, 27 Mar 2015 09:29:42 -0700 (PDT)
Received: from ?IPv6:2601:9:2b80:12f1:a930:f653:8e39:6fe9? ([2601:9:2b80:12f1:a930:f653:8e39:6fe9]) by mx.google.com with ESMTPSA id g10sm2639893pdm.29.2015.03.27.09.29.40 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 27 Mar 2015 09:29:41 -0700 (PDT)
Sender: Nicholas Weaver <nweaver@gmail.com>
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2070.6\))
Content-Type: multipart/signed; boundary="Apple-Mail=_E33D99A5-81E2-4601-A370-A71A089C066F"; protocol="application/pgp-signature"; micalg=pgp-sha512
X-Pgp-Agent: GPGMail 2.5b6
From: Nicholas Weaver <nweaver@icsi.berkeley.edu>
In-Reply-To: <20150327021140.9EB45228181@palinka.tinho.net>
Date: Fri, 27 Mar 2015 09:29:39 -0700
Message-Id: <C2FDB3BB-FCE8-40A4-8AFF-8946D58C7C64@icsi.berkeley.edu>
References: <20150327021140.9EB45228181@palinka.tinho.net>
To: dan@geer.org
X-Mailer: Apple Mail (2.2070.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/_tYlP4CL1nh7yDZZ-Vrj-DtFiG4>
Cc: perpass@ietf.org, Nicholas Weaver <nweaver@icsi.berkeley.edu>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Mar 2015 16:29:46 -0000

--Apple-Mail=_E33D99A5-81E2-4601-A370-A71A089C066F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


> On Mar 26, 2015, at 7:11 PM, dan@geer.org wrote:
>=20
> Encryption everywhere all the time?  No, thank you.
>=20
> Better said, and at effective length, by David Golumbia

This assumes three things:

a)  That you are protected by US law

b)  That the systems are NOBUS ("Nobody But Us")

c)  That cleartext isn't a direct exploitable vulnerability.

Unfortunately none is the case



Lets take case A and assume you aren't a 5EYES citizen.  The US is quite =
explicit that if you aren't a 5EYES citizen, anything goes:  There are =
no legal limits, there are no protections against US activities.

In particular, "economic espionage" in the classic sense [1] is on the =
table: So if anything you do affects international commerce, you are an =
in-scope target.



Lets take case B: There is an implicit assumption that the only one =
watching is the "good guys".  Its quite true that the NSA has been =
remarkably constrained in its monitoring outside its mandates =
(unfortunately its mandates include "SIGINT development" and economic =
issues.)

But who says the NSA is the only one listening?

The NSA's gross overreach in acting against others brings into play the =
golden rule corollary: "Feel free to do unto others as they hath already =
done unto you". [2]  All it takes to monitor a 10 Gbps link is a load =
balancer and a couple of 1u PCs: the software itself is pretty much =
routine NIDS-type stuff [3].

We have near zero security on internal communications crossing the US.  =
You think a foreign country can't have a couple of "diplomats" hire a =
bobcat?  Place monitors at Foggy Bottom starbucks or every hotel in DC?

And that isn't even beginning to consider all the things said countries =
can do on their borders:  If one endpoint of your communication is =
outside the US, and the countries it cross (*cough* France *cough*) can =
gain benefit from monitoring it, they will.  And since the NSA did it to =
them, they are welcome to do it back to us.



Lets take case C, which is the kicker:  Cleartext is not just an avenue =
for monitoring, but a vector for attack.  If your adversary can see your =
cleartext communication, and can identify you as a target, they can =
modify that communication to exploit you.

This is the biggest problem.  The NSA said "its OK for nation states to =
directly 'shoot' exploits from the backbone".

This also interacts very strongly with B: For <$200/each, I can deploy =
an open WiFi monitor thats fully deniable (everything is COTS), =
disguised (think 'plug in air freshener'), and tamper resistant, which =
enables not just "monitor all on the wifi" but explicit "pwn by name": =
injecting malicious responses into traffic of identified targets.



And the allowed target set is effectively everybody: the GCHQ used this =
to penetrate Belgacom.  Yes, telecom is critical infrastructure, and =
GCHQ used this to exploit a NATO ally's critical infrastructure.  So if =
you can penetrate an ally's critical infrastructure by injecting =
exploits into cleartext communication, and the NSA and GCHQ said its OK =
by doing it, why can't the DGSE do it to us?

If you are lucky, your adversary can be any country where your traffic =
passes through except your own.



Taken together:

If you aren't 5EYES, US law won't protect you.

If you are, foreign law won't protect you.

And in either case, cleartext, by being modified, is an exploitable =
vulnerability, not just an observation hole.


This is why we MUST encrypt all the things.

There are no legal norms and niceties that can protect our interests, no =
matter who "our" is:  The US government, US companies, US individuals,  =
foreign governments, foreign companies, foreign individuals, they all =
now face a practical UN full of adversaries who can and will exploit =
anything they want.

Its all on the table.

By spying on every communication for words like "WTO." and =
$CANDIDATE_NAME, by hacking Belgacom, Petrobras, Gemalto, Huawei, and =
individuals like Quisquater, the NSA and company have told the rest of =
the world that there are no limits on who you can spy on and who you can =
hack, and the rest of the world will listen.




[1] The typical NSA dodge is to redefine "economic espionage" to being =
'provide the information to US companies'.  Thats true, they do not =
appear to do that form of economic espionage.  But they are quite =
willing to hand the information over to other portions of the US =
government, e.g. it is acceptable behavior to search every email seen on =
the planet for voting information on the WTO, and we've seen the NZ =
rules for this.

[2] The biggest offender is not the NSA but the GCHQ (British).  But =
they did it with our toys and then "Putin's law" comes into effect:  If =
you give someone a missile, you are partially responsible for who they =
shoot down.

[3] The biggest limit is often asymmetric traffic.  Bro in particular =
doesn't handle seeing one-side of a link, and its been a low priority =
for developers to change that.  But you can always download Vortex and =
start from there.

--
Nicholas Weaver                  it is a tale, told by an idiot,
nweaver@icsi.berkeley.edu                full of sound and fury,
510-666-2903                                 .signifying nothing
PGP: http://www1.icsi.berkeley.edu/~nweaver/data/nweaver_pub.asc


--Apple-Mail=_E33D99A5-81E2-4601-A370-A71A089C066F
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org

iQIcBAEBCgAGBQJVFYVzAAoJEG2B1w+SDi/uqAQQAIHWWVrMornPslGyv+nQOO+V
0H9iq1bJ6DxId3G2GBTcTCdZblva6uFNk3CABShcRRsokO/gQToRqhBXXPX0VMXh
sg/SeaZhjPyp5l6K/ZpSr+Cn1daUvMbLsRx7IK9qBKaZkxkimwkn5VBG8pcaJpuT
qXIomdOEtfNdiHrXaQ4ggErXU8yTJ1Y5iXkPYYjjA6SjhANod7E0YPaFpUi0+g44
6I74BQMWAlbrgCVVfD0BWzGeJP+rx4QjyWDR2ay5UG3yHW1AD6odEfBIIBsW1vEz
6kWtecVeGuPEZIkpV2TO2InvIdN1W+XAO+nrhix8521zaGkh4P7ZJiEKOBIuVxP8
ouGZ4xUXJaCMTMq3t5mHomU/3C/QoFzxT1PepctF9gc+nm0dI/lvm1TGeC09XLl8
qUs2pG7uD2Y4c7fOtmiovibyS+IeJdy9rZBELWWmr4FgkgrNAd/F4XP8ChAlYF4m
31dJaCRkFdpqWpcbeg85uBZDRVEkdTSqSMBDohlmTz/ebFJpzvY3XZeHD2fMP04d
48ap4eflDy2yjiFwFzGrrL1WUspw57qV5Fc1wmuRG+U/h735CRUxecC+ziWvX1KS
1wsF1IQMUHAToOaBoyli1q5mQuddUax5e4T7iOJieGVHB2WCVtDiGZTklY6bsbQM
jvu8oAJ+GbTLIZfboNOn
=9XSQ
-----END PGP SIGNATURE-----

--Apple-Mail=_E33D99A5-81E2-4601-A370-A71A089C066F--


From nobody Fri Mar 27 18:48:21 2015
Return-Path: <mellon@fugue.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1736B1A1B17 for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 18:48:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nKkpN11cgzXP for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 18:48:19 -0700 (PDT)
Received: from toccata.fugue.com (toccata.fugue.com [204.152.186.142]) by ietfa.amsl.com (Postfix) with ESMTP id A9BC41A1B0B for <perpass@ietf.org>; Fri, 27 Mar 2015 18:48:19 -0700 (PDT)
Received: from [10.0.20.107] (c-71-233-43-215.hsd1.nh.comcast.net [71.233.43.215]) by toccata.fugue.com (Postfix) with ESMTPSA id 5204F238031A; Fri, 27 Mar 2015 21:48:17 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Ted Lemon <mellon@fugue.com>
In-Reply-To: <55153E55.10806@dcrocker.net>
Date: Fri, 27 Mar 2015 21:48:14 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <22D97A6B-AE0E-449D-8924-346E97A4B881@fugue.com>
References: <20150327021140.9EB45228181@palinka.tinho.net> <5514C3A3.4080107@cs.tcd.ie> <610E1982-5E08-453D-AD81-6DB26ADD41F0@fugue.com> <55153E55.10806@dcrocker.net>
To: dcrocker@bbiw.net
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/yvHzTxbbMYSCiKhlUGecJ4dTWR8>
Cc: perpass@ietf.org, dan@geer.org, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Mar 2015 01:48:21 -0000

On Mar 27, 2015, at 7:26 AM, Dave Crocker <dhc@dcrocker.net> wrote:
> This is not an intimate conversation amongst well-acquainted =
colleagues
> subject to their own private social contract of behavior.  It's a =
public
> forum.

My reaction was based on genuine surprise to see Dan repeating this =
argument, since he lived through the last set of crypto wars just like =
the rest of us.   It was said with affection, but meant seriously.   If =
there is a new argument to be had here, it was not usefully presented in =
that article.


From nobody Fri Mar 27 19:36:33 2015
Return-Path: <dan@geer.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFE461A1A86 for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 19:36:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zbUibzQqoYwc for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 19:36:25 -0700 (PDT)
Received: from palinka.tinho.net (palinka.tinho.net [166.84.6.13]) by ietfa.amsl.com (Postfix) with ESMTP id 322121A1A81 for <perpass@ietf.org>; Fri, 27 Mar 2015 19:36:25 -0700 (PDT)
Received: by palinka.tinho.net (Postfix, from userid 126) id 251BE228164; Fri, 27 Mar 2015 22:36:14 -0400 (EDT)
Received: from palinka.tinho.net (localhost [127.0.0.1]) by palinka.tinho.net (Postfix) with ESMTP id 1D2A0228155; Fri, 27 Mar 2015 22:36:14 -0400 (EDT)
From: dan@geer.org
To: Nicholas Weaver <nweaver@icsi.berkeley.edu>
In-Reply-To: Your message of "Fri, 27 Mar 2015 09:29:39 -0700." <C2FDB3BB-FCE8-40A4-8AFF-8946D58C7C64@icsi.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <98559.1427510174.1@palinka.tinho.net>
Date: Fri, 27 Mar 2015 22:36:14 -0400
Message-Id: <20150328023614.251BE228164@palinka.tinho.net>
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/STJE-P4Lj74fDMJmX_iViQo9Ku0>
Cc: perpass@ietf.org
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Mar 2015 02:36:30 -0000

I don't have the {skill,time,drive} to debate all this,
for which I apologize.  I will ask you a question that
may produce the same response from you as I just gave,
namely: In a world where the deployment curve of the IoT
has a 17-month doubling time, who or what is going to do
the key management that you would actually believe in?

--dan


From nobody Fri Mar 27 20:08:56 2015
Return-Path: <lear@cisco.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 628201A1B69 for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 20:08:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BRn0Cf61gl3v for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 20:08:52 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2479E1A1A37 for <perpass@ietf.org>; Fri, 27 Mar 2015 20:08:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7264; q=dns/txt; s=iport; t=1427512132; x=1428721732; h=message-id:date:from:mime-version:to:subject:references: in-reply-to; bh=ZoVKHVbvIWC1PhtL2Q75I2rkEGej3f0wW2UlKitujSE=; b=Q+EK+6AKoCOi1hyRcc7hTm4G6l7yOyCGxOhJUpyTi4ahkm3yzQLirl3e Dta181rXXkOjKl5FeT9U52unKXNxgHxMiB/XQNkmOntz4JGAoCKGcmQnv ATFmewEH+cQ4pdDRozR2DPQ6UkLivR/Fmlyb6EJU76BXBoDv7sGn9MRSh 0=;
X-Files: signature.asc : 486
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D6CgByGhZV/4MNJK1cgwZSXIMTwkGFcwKBMkwBAQEBAQF9QQGDUwEBAgEBDhVCBwoCEQshFgsCAgkDAgECAUUGAQwIAQEFiB4IDbJLmWgBAQEBAQEBAwEBAQEBAQEBGoopf4R/gmiBRQEEjkmDd4EyVIYBgRs6gneCOSGNCyKCAhyBbCIxAYJCAQEB
X-IronPort-AV: E=Sophos;i="5.11,482,1422921600";  d="asc'?scan'208,217";a="136165854"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by alln-iport-4.cisco.com with ESMTP; 28 Mar 2015 03:08:51 +0000
Received: from [10.86.242.96] (che-vpn-cluster-2-96.cisco.com [10.86.242.96]) by alln-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id t2S38oB0008773; Sat, 28 Mar 2015 03:08:50 GMT
Message-ID: <55161B3D.5010604@cisco.com>
Date: Fri, 27 Mar 2015 23:08:45 -0400
From: Eliot Lear <lear@cisco.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, dan@geer.org, Ted Lemon <Ted.Lemon@nominum.com>, Joseph Lorenzo Hall <joe@cdt.org>, perpass <perpass@ietf.org>
References: <20150327021140.9EB45228181@palinka.tinho.net> <5514C3A3.4080107@cs.tcd.ie>
In-Reply-To: <5514C3A3.4080107@cs.tcd.ie>
Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="21LDvf4KHGtLj8ojaBFsGRHL5jC5oU8ba"
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/WHdkmTpY9P8qdyM5stC21iyfKUs>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Mar 2015 03:08:54 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--21LDvf4KHGtLj8ojaBFsGRHL5jC5oU8ba
Content-Type: multipart/alternative;
 boundary="------------070404010001020706070900"

This is a multi-part message in MIME format.
--------------070404010001020706070900
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi,

It seems to me that having an honest discussion about our biases, goals,
and assumptions might help.

My goal: I want the Internet to continue to grow in a safe way.  It
can't do that if people don't trust the infrastructure.  There are EU
studies that discuss what happens when people experience some form of
harm on the Internet.[1]  Encryption has played a role in reducing that
harm.  But it can also increase harm for the very reasons stated in that
article.  Not acknowledging this would be absurd.

Please now see below.

On 3/26/15 9:42 PM, Stephen wrote:

>> Better said, and at effective length, by David Golumbia
>>
>>    Opt-Out Citizenship: End-to-End Encryption and
>>    Constitutional Governance
>>    http://www.uncomputing.org/?p=3D272
> Had a quick flick. Arguments based on a presumption of "perfect
> end-to-end encryption" are utterly useless as they are counterfactual.
> Anything one likes can follow from a false assumption like that.
>

Let me see if I understand this statement correctly: this group is
working toward a world in which we encrypt our communications, and when
someone discusses what that world might look like, you claim it's
"counterfactual"?  That's not a reasonable argument.

Ted claims that the author argues that there is no need for a right to
privacy.  I didn't read that in the article at all, but rather that the
Constitution must be taken as a whole: the same document that protects
our rights also provides various balancing tests to protect the rights
of others.

On the other hand, the piece missing from that article is the need for
confidence in the infrastructure, and Ted goes in this direction: if you
give the good guys means to gain access to communications, in all
likelihood you're giving the bad guys those very same capabilities.=20
That has been the cornerstone of the IETF position for a very long time,
and it holds for whatever definition of "good guys" and "bad guys" you
might have.  Weakening end-to-end encryption weakens confidence in the
infrastructure.  This guy doesn't care because his focus is about the
balance of needs from a legal sense.  But these issues cannot be viewed
in isolation from one another.

Eliot
[1] Riek, et. al, /Understanding the Influence of Cybercrime Risk on the
E-Service Adoption of European Internet Users/, WEIS 2014.=20
http://weis2014.econinfosec.org/papers/RiekBoehmeMoore-WEIS2014.pdf


--------------070404010001020706070900
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html>
  <head>
    <meta content=3D"text/html; charset=3Dutf-8" http-equiv=3D"Content-Ty=
pe">
  </head>
  <body bgcolor=3D"#FFFFFF" text=3D"#000000">
    Hi,<br>
    <br>
    It seems to me that having an honest discussion about our biases,
    goals, and assumptions might help.<br>
    <br>
    My goal: I want the Internet to continue to grow in a safe way.=C2=A0=
 It
    can't do that if people don't trust the infrastructure.=C2=A0 There a=
re
    EU studies that discuss what happens when people experience some
    form of harm on the Internet.[1]=C2=A0 Encryption has played a role i=
n
    reducing that harm.=C2=A0 But it can also increase harm for the very
    reasons stated in that article.=C2=A0 Not acknowledging this would be=

    absurd.<br>
    <br>
    Please now see below.<br>
    <br>
    <div class=3D"moz-cite-prefix">On 3/26/15 9:42 PM, Stephen wrote:<br>=

    </div>
    <br>
    <blockquote cite=3D"mid:5514C3A3.4080107@cs.tcd.ie" type=3D"cite">
      <blockquote type=3D"cite">
        <pre wrap=3D"">Better said, and at effective length, by David Gol=
umbia

   Opt-Out Citizenship: End-to-End Encryption and
   Constitutional Governance
   <a class=3D"moz-txt-link-freetext" href=3D"http://www.uncomputing.org/=
?p=3D272">http://www.uncomputing.org/?p=3D272</a>
</pre>
      </blockquote>
      <pre wrap=3D"">
Had a quick flick. Arguments based on a presumption of "perfect
end-to-end encryption" are utterly useless as they are counterfactual.
Anything one likes can follow from a false assumption like that.

</pre>
    </blockquote>
    <br>
    Let me see if I understand this statement correctly: this group is
    working toward a world in which we encrypt our communications, and
    when someone discusses what that world might look like, you claim
    it's "counterfactual"?=C2=A0 That's not a reasonable argument.<br>
    <br>
    Ted claims that the author argues that there is no need for a right
    to privacy.=C2=A0 I didn't read that in the article at all, but rathe=
r
    that the Constitution must be taken as a whole: the same document
    that protects our rights also provides various balancing tests to
    protect the rights of others. <br>
    <br>
    On the other hand, the piece missing from that article is the need
    for confidence in the infrastructure, and Ted goes in this
    direction: if you give the good guys means to gain access to
    communications, in all likelihood you're giving the bad guys those
    very same capabilities.=C2=A0 That has been the cornerstone of the IE=
TF
    position for a very long time, and it holds for whatever definition
    of "good guys" and "bad guys" you might have.=C2=A0 Weakening end-to-=
end
    encryption weakens confidence in the infrastructure.=C2=A0 This guy
    doesn't care because his focus is about the balance of needs from a
    legal sense.=C2=A0 But these issues cannot be viewed in isolation fro=
m
    one another.<br>
    <br>
    Eliot<br>
    [1]
    <meta http-equiv=3D"content-type" content=3D"text/html; charset=3Dutf=
-8">
    Riek, et. al, <i>Understanding the Influence of Cybercrime Risk on
      the E-Service Adoption of European Internet Users</i>, WEIS 2014.=C2=
=A0
    <a class=3D"moz-txt-link-freetext" href=3D"http://weis2014.econinfose=
c.org/papers/RiekBoehmeMoore-WEIS2014.pdf">http://weis2014.econinfosec.or=
g/papers/RiekBoehmeMoore-WEIS2014.pdf</a><br>
    <br>
  </body>
</html>

--------------070404010001020706070900--

--21LDvf4KHGtLj8ojaBFsGRHL5jC5oU8ba
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)

iQEcBAEBAgAGBQJVFhtBAAoJEIe2a0bZ0noz5TcH/ApV2UHd7LNAvoybLrVaTAHd
17G6sBUXiXmfj9ZNe6m0H/qGr7wHqLia8jcF7rxrKCJE3YMmoV+f0gCJPafJpURe
BIpIh/OZPJmo5IHd19LVOHcoqGAojkfpKLaGcULEIQlkjWOEVGw8/mdEekQQe6Hu
Z3ASNTAmbRCyj3U0e11GcUwYwZue+Ir6k3CcPT/nX3NoAPLETFyWuCa0qxtmoYth
PaowfIwm7LYmKC0BgTNvAqMWSTryV9afzKZF5mB4rmoCSWTeFHbIg7vcS3HUO1Kg
TYaLgMKS9Bcblg3Vn6wCFzVKlL5kUKZLSDWmmKio4U41+Q91vtbz/7VAdV0/Ifc=
=zrBt
-----END PGP SIGNATURE-----

--21LDvf4KHGtLj8ojaBFsGRHL5jC5oU8ba--


From nobody Fri Mar 27 21:23:04 2015
Return-Path: <huitema@huitema.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98C9F1A1B95 for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 21:23:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.3
X-Spam-Level: 
X-Spam-Status: No, score=-3.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_I_LETTER=-2, J_CHICKENPOX_31=0.6, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FD4RjPiA7b_n for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 21:23:01 -0700 (PDT)
Received: from xsmtp05.mail2web.com (xsmtp25.mail2web.com [168.144.250.191]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 35C071A1BA2 for <perpass@ietf.org>; Fri, 27 Mar 2015 21:23:01 -0700 (PDT)
Received: from [10.5.2.35] (helo=xmail10.myhosting.com) by xsmtp05.mail2web.com with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <huitema@huitema.net>) id 1YbiGu-0008A4-PI for perpass@ietf.org; Sat, 28 Mar 2015 00:23:00 -0400
Received: (qmail 23358 invoked from network); 28 Mar 2015 04:22:55 -0000
Received: from unknown (HELO huitema1) (Authenticated-user:_huitema@huitema.net@[24.16.156.113]) (envelope-sender <huitema@huitema.net>) by xmail10.myhosting.com (qmail-ldap-1.03) with ESMTPA for <dan@geer.org>; 28 Mar 2015 04:22:55 -0000
From: "Christian Huitema" <huitema@huitema.net>
To: "'Eliot Lear'" <lear@cisco.com>, "'Stephen Farrell'" <stephen.farrell@cs.tcd.ie>, <dan@geer.org>, "'Ted Lemon'" <Ted.Lemon@nominum.com>, "'Joseph Lorenzo Hall'" <joe@cdt.org>, "'perpass'" <perpass@ietf.org>
References: <20150327021140.9EB45228181@palinka.tinho.net> <5514C3A3.4080107@cs.tcd.ie> <55161B3D.5010604@cisco.com>
In-Reply-To: <55161B3D.5010604@cisco.com>
Date: Fri, 27 Mar 2015 23:22:54 -0500
Message-ID: <004001d0690e$dd65cf80$98316e80$@huitema.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AQNjBTd+tuLsDj40+b3iRfryWsdqvwHLDIxRAd/GYEeZ7rdlAA==
Content-Language: en-us
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/3oQJjC-BA3k1udYDCBM2n_Y2OyM>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Mar 2015 04:23:03 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Friday, March 27, 2015 at 10:09 PM, Eliot Lear wrote:

> Let me see if I understand this statement correctly: this group is =
working toward a world in which we encrypt our communications, and when =
someone discusses what that world might look like, you claim it's =
"counterfactual"?  That's not a reasonable argument.
> Ted claims that the author argues that there is no need for a right to =
privacy.  I didn't read that in the article at all, but rather that the =
Constitution must be taken as a whole: the same document that protects =
our rights also provides various balancing tests to protect the rights =
of others.=20

The author's point is that the state, with proper warrants, should be =
able to conduct searches for evidence of crimes. While this is a =
reasonable argument, it does not follow that people should not have the =
right to protect their communications. For example, there is no mandate =
anywhere that people should keep a copy of their private letters in some =
kind of archive, so that they could later be found when the police asks =
for it. And there is definitely no expectation that all our private =
communications should be copied and archived by the state. And I am =
pretty sure that there was no such expectation among the authors of the =
US constitution and Bill of Rights.

- -- Christian Huitema




=20
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (MingW32)
Comment: Using gpg4o v3.4.103.5490 - http://www.gpg4o.com/
Charset: utf-8

iQEcBAEBAgAGBQJVFiydAAoJELba05IUOHVQ2q4H/i0VxlhAxXgvGFEiIiNmVUT/
9e3Ny+nmN/MJjM02PitbJoQkG+IarEgF6Dd+93fTXcH+sGtNdo5Z1UWr/MCCIuQ0
5ZJ9XeZWnuWfKHXA4OoKHwJQ+SITYv3CSo69r0h87OuESKk50fy2495ioCcOPyDU
nqAMEVRTSKMh6MLBB8OOnLwmudWNp4W76/sGEg0JOtLpQbqXNuQgk9p2yBkZ9YKb
Xu+Czovq3fKfLn2wSzKQ1KH+Qe1mkYT+km0mOs+5x+r3GyD9Ff7B/ghP8faDtm68
AcngF6bKppCHcRH0D0YxbBRFhNT0wCyzyvTh9kHJbm97UcSzMYsOu7FUR4WVLXg=3D
=3DLlp/
-----END PGP SIGNATURE-----


From nobody Sat Mar 28 05:50:31 2015
Return-Path: <lear@cisco.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 442D11A8771 for <perpass@ietfa.amsl.com>; Sat, 28 Mar 2015 05:50:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -16.51
X-Spam-Level: 
X-Spam-Status: No, score=-16.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, GB_I_LETTER=-2, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZGRvctapbiZ0 for <perpass@ietfa.amsl.com>; Sat, 28 Mar 2015 05:50:28 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 971AC1A876F for <perpass@ietf.org>; Sat, 28 Mar 2015 05:50:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4815; q=dns/txt; s=iport; t=1427547028; x=1428756628; h=message-id:date:from:mime-version:to:subject:references: in-reply-to; bh=YNS9OY9VoD5xQHPnBI15NMbQ4uKHqWdqSPokvPFHJYg=; b=FoBv4Kq0FE1AtbOlooLqgnoFsYqCwp1EFsAcLNcsy2H+AW2tVOcqBLhx uvxHH6/A1gGS96YxpDR7Gleo7kWyRK3sbylGgz1R8iJtZs6I35rqcff+I 0VSDqTn8nT+D5BtCFePSB2sh0+/enXepg+xLiFbn5Ut9GUmoVH96y7tSa I=;
X-Files: signature.asc : 486
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DsBACQohZV/4wNJK1cgwZSWoMQwHCBR4V9AoEpOBQBAQEBAQEBfIQUAQEBAwEOFUITBgsLBBQJFgsCAgkDAgECAUUGAQwIAQGIIwiyL5oLAQEBAQEBAQMBAQEBAQEBARqLIYR8gmiBRQEEkjiBMVSFf4FVhS6NJiKCAhyBbCIxgkMBAQE
X-IronPort-AV: E=Sophos;i="5.11,484,1422921600";  d="asc'?scan'208,217";a="136123098"
Received: from alln-core-7.cisco.com ([173.36.13.140]) by alln-iport-8.cisco.com with ESMTP; 28 Mar 2015 12:50:26 +0000
Received: from [10.86.242.96] (che-vpn-cluster-2-96.cisco.com [10.86.242.96]) by alln-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id t2SCoPSg021046; Sat, 28 Mar 2015 12:50:25 GMT
Message-ID: <5516A38B.5020005@cisco.com>
Date: Sat, 28 Mar 2015 08:50:19 -0400
From: Eliot Lear <lear@cisco.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: Christian Huitema <huitema@huitema.net>, "'Stephen Farrell'" <stephen.farrell@cs.tcd.ie>, dan@geer.org, "'Ted Lemon'" <Ted.Lemon@nominum.com>, "'Joseph Lorenzo Hall'" <joe@cdt.org>, "'perpass'" <perpass@ietf.org>
References: <20150327021140.9EB45228181@palinka.tinho.net> <5514C3A3.4080107@cs.tcd.ie> <55161B3D.5010604@cisco.com> <004001d0690e$dd65cf80$98316e80$@huitema.net>
In-Reply-To: <004001d0690e$dd65cf80$98316e80$@huitema.net>
Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="hFBF65DDCUKj4s5IQXq1eM185sKXG1FqA"
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/EXiucjzWME2AeCNYsf_0hGAQtls>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Mar 2015 12:50:30 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--hFBF65DDCUKj4s5IQXq1eM185sKXG1FqA
Content-Type: multipart/alternative;
 boundary="------------070709070601040800080504"

This is a multi-part message in MIME format.
--------------070709070601040800080504
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Christian,

On 3/28/15 12:22 AM, Christian Huitema wrote:
>
> The author's point is that the state, with proper warrants, should be
> able to conduct searches for evidence of crimes.

Yes.

> While this is a reasonable argument, it does not follow that people
> should not have the right to protect their communications.

Yes.

> For example, there is no mandate anywhere that people should keep a
> copy of their private letters in some kind of archive, so that they
> could later be found when the police asks for it.

But if they *did* keep a copy they could be compelled to reveal it if
the state had probable cause or a warrant.  The technology to actually
retain copies was beyond the horizon of the framers.

> And there is definitely no expectation that all our private
> communications should be copied and archived by the state.=20

Unless the state has a warrant or probable cause.

> And I am pretty sure that there was no such expectation among the
> authors of the US constitution and Bill of Rights.

We'll never know, but they left a very strong hint in the 4th amendment
that they would indeed seek an appropriate balance of rights, as the
Massachusetts Compromise shows the Bill of Rights was hotly debated
between federalists and anti-federalists.

When we get beyond the United States, of course, different societies
have different views about All Of This.

Eliot


--------------070709070601040800080504
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html>
  <head>
    <meta content=3D"text/html; charset=3Dutf-8" http-equiv=3D"Content-Ty=
pe">
  </head>
  <body bgcolor=3D"#FFFFFF" text=3D"#000000">
    Hi Christian,<br>
    <br>
    On 3/28/15 12:22 AM, Christian Huitema wrote:<br>
    <blockquote type=3D"cite"><br>
      The author's point is that the state, with proper warrants, should
      be able to conduct searches for evidence of crimes.</blockquote>
    <br>
    Yes.<br>
    <br>
    <blockquote type=3D"cite"> While this is a reasonable argument, it
      does not follow that people should not have the right to protect
      their communications.</blockquote>
    <br>
    Yes.<br>
    <br>
    <blockquote type=3D"cite"> For example, there is no mandate anywhere
      that people should keep a copy of their private letters in some
      kind of archive, so that they could later be found when the police
      asks for it.</blockquote>
    <br>
    But if they <b>did</b> keep a copy they could be compelled to
    reveal it if the state had probable cause or a warrant.=C2=A0 The
    technology to actually retain copies was beyond the horizon of the
    framers.<br>
    <br>
    <blockquote type=3D"cite"> And there is definitely no expectation tha=
t
      all our private communications should be copied and archived by
      the state. </blockquote>
    <br>
    Unless the state has a warrant or probable cause.<br>
    <br>
    <blockquote type=3D"cite">And I am pretty sure that there was no such=

      expectation among the authors of the US constitution and Bill of
      Rights.<br>
    </blockquote>
    <br>
    We'll never know, but they left a very strong hint in the 4th
    amendment that they would indeed seek an appropriate balance of
    rights, as the Massachusetts Compromise shows the Bill of Rights was
    hotly debated between federalists and anti-federalists.<br>
    <br>
    When we get beyond the United States, of course, different societies
    have different views about All Of This.<br>
    <br>
    Eliot<br>
    <br>
  </body>
</html>

--------------070709070601040800080504--

--hFBF65DDCUKj4s5IQXq1eM185sKXG1FqA
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)

iQEcBAEBAgAGBQJVFqOQAAoJEIe2a0bZ0noz2OIIAMG21HXLj6PmZA7eFhebqwh1
YtM4VQoo/vcwFeVDXoH9MbbT1mnLw91QECBZMA2zeCc5y2YKpU4PvkB7dFJ2m+Xb
FvyuGLHvX9X+Ng+Vbrtj2W5G5LCJHHD6wSnL31BwgqgaTsoam/3GqNZFc5SxMd9R
Phdh3xnWnil6zoM+OfOPNd27J4mr6woQK/aM45o0/OjPmIqXat5AHcIJPDjE4Y1o
0m6Slsd1S093nATQxs+Rp5lNnFnYjNWApPbCU6uGmB7xM7xyz36EhlnTwW1ahIcB
4a4CBT6jZbKTgRC7msLIaWjGJJb/jV1nYv8F6bq66f0XDmDO52FukNcRCK1yMBA=
=YP1I
-----END PGP SIGNATURE-----

--hFBF65DDCUKj4s5IQXq1eM185sKXG1FqA--


From nobody Sat Mar 28 06:39:21 2015
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26C111A87BA for <perpass@ietfa.amsl.com>; Sat, 28 Mar 2015 06:39:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.31
X-Spam-Level: 
X-Spam-Status: No, score=-2.31 tagged_above=-999 required=5 tests=[RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6VrYN0Bf4xS2 for <perpass@ietfa.amsl.com>; Sat, 28 Mar 2015 06:39:13 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A8B1E1A8797 for <perpass@ietf.org>; Sat, 28 Mar 2015 06:39:10 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id C42A2BEB1; Sat, 28 Mar 2015 13:39:06 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8InErtQ6Bt9q; Sat, 28 Mar 2015 13:39:04 +0000 (GMT)
Received: from [127.0.0.1] (unknown [31.221.87.78]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 16483BEAF; Sat, 28 Mar 2015 13:39:04 +0000 (GMT)
X-Priority: 3
To: lear@cisco.com
From: stephen.farrell@cs.tcd.ie
In-Reply-To: <55161B3D.5010604@cisco.com>
References: <20150327021140.9EB45228181@palinka.tinho.net> <5514C3A3.4080107@cs.tcd.ie> <55161B3D.5010604@cisco.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64
Date: Sat, 28 Mar 2015 13:39:02 +0000
Message-ID: <qq0kn.nlxcl4.2t596e-qmf@mercury.scss.tcd.ie>
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/SDDojjGPBEajWb_6Wof2L-IL2Og>
Cc: perpass@ietf.org, dan@geer.org, Ted.Lemon@nominum.com, joe@cdt.org
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Mar 2015 13:39:15 -0000
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From nobody Sat Mar 28 07:00:35 2015
Return-Path: <hmco@env.dtu.dk>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1AAB91A1BF8 for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 23:39:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.901
X-Spam-Level: 
X-Spam-Status: No, score=-0.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DK=1.009, RCVD_IN_DNSWL_NONE=-0.0001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DeTVqlfsVEZk for <perpass@ietfa.amsl.com>; Fri, 27 Mar 2015 23:39:23 -0700 (PDT)
Received: from spamfilter1.dtu.dk (spamfilter1.dtu.dk [130.225.73.112]) (using TLSv1.2 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5B2E1A1B30 for <perpass@ietf.org>; Fri, 27 Mar 2015 23:39:22 -0700 (PDT)
Received: from ait-pexedg01.win.dtu.dk (ait-pexedg01.win.dtu.dk [192.38.82.191]) by spamfilter1.dtu.dk  with ESMTP id t2S6dF1J013694-t2S6dF1L013694 (version=TLSv1.0 cipher=AES128-SHA bits=128 verify=CAFAIL); Sat, 28 Mar 2015 07:39:15 +0100
Received: from ait-pex02mbx05.win.dtu.dk (192.38.82.185) by ait-pexedg01.win.dtu.dk (192.38.82.191) with Microsoft SMTP Server (TLS) id 14.3.224.2; Sat, 28 Mar 2015 07:39:26 +0100
Received: from ait-pex01mbx01.win.dtu.dk ([fe80::49f9:dd7a:cb60:3434]) by ait-pex02mbx05.win.dtu.dk ([fe80::5122:b451:7f84:8c28%16]) with mapi id 14.03.0224.002; Sat, 28 Mar 2015 07:40:36 +0100
From: Hugo Maxwell Connery <hmco@env.dtu.dk>
To: "dan@geer.org" <dan@geer.org>
Thread-Topic: [perpass] https.CIO.gov
Thread-Index: AQHQaDNccPqRicBUUEG97rnt79fKkZ0xbNBr
Date: Sat, 28 Mar 2015 06:38:13 +0000
Message-ID: <6CB05D82CE245B4083BBF3B97E2ED47029463B@ait-pex01mbx01.win.dtu.dk>
References: Your message of "Wed, 25 Mar 2015 10:11:14 -0700." <5512EC32.2030001@well.com>,<20150327021140.9EB45228181@palinka.tinho.net>
In-Reply-To: <20150327021140.9EB45228181@palinka.tinho.net>
Accept-Language: en-AU, da-DK, en-US
Content-Language: en-AU
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [130.225.73.250]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/z6uGB9WN7j0gMhK5DTrDQJ9B3gY>
X-Mailman-Approved-At: Sat, 28 Mar 2015 07:00:32 -0700
Cc: "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Mar 2015 06:39:28 -0000

Hi,

Standard Fallacy: if communications are encrypted they cannot be read/obtai=
ned.

There are two places where 'encrypted' communications are viewable, at
the sender and receiver.  Thus, the government (or anyone) can obtain the
communications by invading the sending or receiving system if either a plai=
n-text
of the message(s) or the key and cipher text are still obtainable on the de=
vice.
Metadata of the communication is often available in logs.

The question is, under what circumstances should the government (or others)
be able to do this?

Recall that when people say 'encryption' what they usually mean is 'secure
communication' and that means 3 things (CIA model): Confidentiality,=20
Integrity and Authenticity. =20

Sometimes only two of these properties are desired, and I suggest that we s=
hould=20
be thinking about this.  For example, a public forum wishes for integrity
and authenticity but does not necessarily require confidentiality.

No amount of digital 'secure communications' will prevent surveillance when
an end-point device is compromised (e.g key logger).

Additionally, current transport protocols include the addresses of the end-=
points
and thus expose the metadata of these connections to all locations in the=20
communications path, irrespective of 'secure communications'. =20

Thus, anonymity is another consideration that is entailed in these discussi=
ons.
--
Hugo Connery, Head of IT, DTU Environment, http://www.env.dtu.dk
________________________________________
From: perpass [perpass-bounces@ietf.org] on behalf of dan@geer.org [dan@gee=
r.org]
Sent: Friday, 27 March 2015 03:11
To: perpass@ietf.org
Subject: Re: [perpass] https.CIO.gov

Encryption everywhere all the time?  No, thank you.

Better said, and at effective length, by David Golumbia

   Opt-Out Citizenship: End-to-End Encryption and
   Constitutional Governance
   http://www.uncomputing.org/?p=3D272


--dan

_______________________________________________
perpass mailing list
perpass@ietf.org
https://www.ietf.org/mailman/listinfo/perpass


From nobody Sat Mar 28 07:09:59 2015
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A9B01A87E1 for <perpass@ietfa.amsl.com>; Sat, 28 Mar 2015 07:09:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.31
X-Spam-Level: 
X-Spam-Status: No, score=-2.31 tagged_above=-999 required=5 tests=[RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jpNeGUClep1J for <perpass@ietfa.amsl.com>; Sat, 28 Mar 2015 07:09:57 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9AF171A87D4 for <perpass@ietf.org>; Sat, 28 Mar 2015 07:09:57 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 6E80DBE8B; Sat, 28 Mar 2015 14:09:55 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kbn8lpB-CXEb; Sat, 28 Mar 2015 14:09:54 +0000 (GMT)
Received: from [10.32.65.98] (unknown [31.221.87.78]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id E7C91BEB1; Sat, 28 Mar 2015 14:09:53 +0000 (GMT)
Message-ID: <5516B631.9050006@cs.tcd.ie>
Date: Sat, 28 Mar 2015 14:09:53 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: dan@geer.org, Nicholas Weaver <nweaver@icsi.berkeley.edu>
References: <20150328023614.251BE228164@palinka.tinho.net>
In-Reply-To: <20150328023614.251BE228164@palinka.tinho.net>
OpenPGP: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/i_BW_7ipyQwnkjOmKFIZv9dVjz4>
Cc: perpass@ietf.org
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Mar 2015 14:09:58 -0000

On 28/03/15 02:36, dan@geer.org wrote:
> In a world where the deployment curve of the IoT
> has a 17-month doubling time, who or what is going to do
> the key management that you would actually believe in?

I'm sorry but the article *you* quoted made just the opposite
assumption (that doing "perfect" e2e crypto is possible) and
now you want to argue the opposite side? (That it is not.)
That's not IMO constructive.

As to what we should be doing - we (participating in the IETF)
should be (and I think are) doing the engineering to figure out
if and how we can make the Internet more secure and privacy
friendly without breaking it. Yes, there are unsolved problems
there related to key management at scale and there are perhaps
even more fundamental issues with privacy generally (in that
we don't understand it nearly as well as other security things)
but we ought not be trying to use both sides of arguments for
what look to me like purely rhetorical purposes.

Higher quality input is of course welcome.

S.


From nobody Sat Mar 28 07:58:02 2015
Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 933201A889F for <perpass@ietfa.amsl.com>; Sat, 28 Mar 2015 07:58:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.235
X-Spam-Level: 
X-Spam-Status: No, score=-3.235 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, GB_I_LETTER=-2, SPF_SOFTFAIL=0.665] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZY7HDcsR72Bd for <perpass@ietfa.amsl.com>; Sat, 28 Mar 2015 07:58:00 -0700 (PDT)
Received: from resqmta-ch2-02v.sys.comcast.net (resqmta-ch2-02v.sys.comcast.net [IPv6:2001:558:fe21:29:69:252:207:34]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83B5B1A8881 for <perpass@ietf.org>; Sat, 28 Mar 2015 07:58:00 -0700 (PDT)
Received: from resomta-ch2-10v.sys.comcast.net ([69.252.207.106]) by resqmta-ch2-02v.sys.comcast.net with comcast id 92xl1q0022JGN3p012xzva; Sat, 28 Mar 2015 14:57:59 +0000
Received: from Paul-Kyzivats-MacBook-Pro.local ([50.138.229.151]) by resomta-ch2-10v.sys.comcast.net with comcast id 92xz1q00D3Ge9ey012xz76; Sat, 28 Mar 2015 14:57:59 +0000
Message-ID: <5516C176.7050608@alum.mit.edu>
Date: Sat, 28 Mar 2015 10:57:58 -0400
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: perpass@ietf.org
References: <20150327021140.9EB45228181@palinka.tinho.net> <5514C3A3.4080107@cs.tcd.ie> <55161B3D.5010604@cisco.com> <004001d0690e$dd65cf80$98316e80$@huitema.net>
In-Reply-To: <004001d0690e$dd65cf80$98316e80$@huitema.net>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=q20140121; t=1427554679; bh=3k/hgaAOOIBjpJqdEPq90NIoXtgDWg71xCzOUfAfkpQ=; h=Received:Received:Message-ID:Date:From:MIME-Version:To:Subject: Content-Type; b=wacaP5AQTJnzUiMMEOKBgNEZFehjXMESYdxtFvKSWoKkoWbXaqK825XSXgm0u7gMW e67VUAqNcDTavgIPQ+5gIqCL2+KFBa7mhV03EF94AXUjCiS5TUDTODPL6G7iU6QLOa 5+2GUJe+QmVLBt9poy8os4aUc13rI2CzPesoUDghMtuhK8T83vqjX0UyPBjvHErOTe I9bnAki7OLlBw40qLSOgTnO4RJaMafNG5AdldMNNYTbFBmVe5AD8J406JeYkLj0nfE 3eHcVJSr/KaPMARmymsjNkfX7q02hptByUtaoVYPGLSQ3upx/LFxgiME3c2V2FKgT9 n6Y2ZyFr6WKPg==
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/F_FFcTrslE7Vl-HpOiIKZQceiIQ>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Mar 2015 14:58:01 -0000

On 3/28/15 12:22 AM, Christian Huitema wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On Friday, March 27, 2015 at 10:09 PM, Eliot Lear wrote:
>
>> Let me see if I understand this statement correctly: this group is working toward a world in which we encrypt our communications, and when someone discusses what that world might look like, you claim it's "counterfactual"?  That's not a reasonable argument.
>> Ted claims that the author argues that there is no need for a right to privacy.  I didn't read that in the article at all, but rather that the Constitution must be taken as a whole: the same document that protects our rights also provides various balancing tests to protect the rights of others.
>
> The author's point is that the state, with proper warrants, should be able to conduct searches for evidence of crimes. While this is a reasonable argument, it does not follow that people should not have the right to protect their communications. For example, there is no mandate anywhere that people should keep a copy of their private letters in some kind of archive, so that they could later be found when the police asks for it. And there is definitely no expectation that all our private communications should be copied and archived by the state. And I am pretty sure that there was no such expectation among the authors of the US constitution and Bill of Rights.

I also generally agree with this.

The problem is that many non-technical proposals around this take it to 
mean that all communications should be blocked from being encrypted in a 
way that prevents presumed good actors from deciphering them. They fail 
to recognize that this will also allow bad actors to decipher them.

Perhaps this can be addressed by focusing on the right of individuals to 
protect their communications from access by bad actors. (Even if this 
makes it more difficult for the "good" actors with warrants.)

	Thanks,
	Paul


From nobody Sat Mar 28 22:38:52 2015
Return-Path: <seda@nyu.edu>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 860151A9172 for <perpass@ietfa.amsl.com>; Sat, 28 Mar 2015 22:38:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.035
X-Spam-Level: 
X-Spam-Status: No, score=-0.035 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_SOFTFAIL=0.665] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EUqXjyrnEP2n for <perpass@ietfa.amsl.com>; Sat, 28 Mar 2015 22:38:49 -0700 (PDT)
Received: from mail-qc0-f177.google.com (mail-qc0-f177.google.com [209.85.216.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6A6DF1A916F for <perpass@ietf.org>; Sat, 28 Mar 2015 22:38:49 -0700 (PDT)
Received: by qcfy6 with SMTP id y6so28111132qcf.2 for <perpass@ietf.org>; Sat, 28 Mar 2015 22:38:48 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:content-type:message-id:mime-version :subject:date:references:to:in-reply-to; bh=p5MzY8hmf68NArjbCsZBpgzTMiAOB8oyPKeBNhGI9VI=; b=dsUfMD5z1v7NxANbS9roTgN7SdCwaxXICdLoUoBuCFjlpwT+Jr8f1m4KdC1g61abMn 3dJCpqeZUbUMrVIsQ0gVSHIG3YJd6dUdkBBjyLRh3in2bzu9m4jxnhhhVY52EY2ojwIR jhj9KgN52byYAvLejLe0ANkrAljaTq1HgzeAmn9FZIhlLrM8hhteRLND0Pxoewcq3o70 bMuEDol97A+nTkFQjlDWC9sZ+FVvZahSodqRF0eElbXhBqWNXKvqdbSEbAeWI53QtVra iUKpT04Da7iPt22XF/QMs8zNquffMM9qEpQ+3blFBHXHbwhEktqpvDd1zV78xbRIIk+c YzTA==
X-Gm-Message-State: ALoCoQnQ2pee6E3byMyyFmQIVypLhM2m3wJm+JJhfHl851GmeB13wEvqvzikoWJ9nMRIZpve2s9B
X-Received: by 10.140.43.199 with SMTP id e65mr33471161qga.34.1427607528611; Sat, 28 Mar 2015 22:38:48 -0700 (PDT)
Received: from [192.168.0.2] (cpe-158-222-146-11.nyc.res.rr.com. [158.222.146.11]) by mx.google.com with ESMTPSA id h6sm5160198qgf.14.2015.03.28.22.38.46 for <perpass@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sat, 28 Mar 2015 22:38:47 -0700 (PDT)
From: Seda Gurses <seda@nyu.edu>
Content-Type: multipart/alternative; boundary="Apple-Mail=_2D12B18D-11E4-4EFB-8A1F-F523336554EF"
Message-Id: <59E1959A-B587-4B58-985A-D2CD8C2680C6@nyu.edu>
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
Date: Sun, 29 Mar 2015 01:38:45 -0400
References: <mailman.42.1427569206.3417.perpass@ietf.org>
To: perpass@ietf.org
In-Reply-To: <mailman.42.1427569206.3417.perpass@ietf.org>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/xDkT3YjxmB4gMjFTW15EbxakQNE>
Subject: Re: [perpass] perpass Digest, Vol 19, Issue 10
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 29 Mar 2015 05:38:51 -0000

--Apple-Mail=_2D12B18D-11E4-4EFB-8A1F-F523336554EF
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252


Hi everyone,

I am following up on the discussion that was partially spurred by the =
reference to the Golumbia article that argues against anonymous =
communications as a universally accessible and acceptable service. I =
agree with the issues that Golumbia has with respect to the unequally =
distributed benefits of anonymous communications and absolutely =
appreciate the engagement with the topic. Technically speaking, however, =
I find his position uninformed and his legal analysis too short to do =
justice to the issue. What is maybe worse is that his points are =
uncomfortably aligned with the =93going dark=94 argument [0]: a popular =
argument that is especially dubious when more private and public data is =
available to law enforcement and government agencies than ever and the =
number of non-commercial civilian use of encryption and anonymous =
communications is abysmal. The latter is one important reason why =
addressing privacy in standards is key.

Having said that, the interaction between privacy laws and privacy =
enhancing technologies is complex and worthy of further discussion. In =
[1] you will find an outdated but hopefully still useful paper on this =
topic. Also in that article is a distinction between types of PETs based =
on the role of the service provider, which you may appreciate.
Cheers,
seda




[0] 	Going Dark by James Comey =
http://www.fbi.gov/news/speeches/going-dark-are-technology-privacy-and-pub=
lic-safety-on-a-collision-course

[1] 	Hero or Villain: The Data Controller in Privacy Law and =
Technologies, Claudia Diaz, Omer Tene, Seda Gurses
	https://www.cosic.esat.kuleuven.be/publications/article-2365.pdf

	Constitutional privacy law in Europe and the United States =
establishes the right to privacy as freedom from government =
surveillance. It is based on suspicion of power and distrust in the =
state, which can unleash ominous intrusions into the private sphere to =
crush dissent and stifle democratic discourse and free speech. Over the =
past forty years, an additional legal framework has emerged to protect =
information privacy. Yet unlike the constitutional framework, =
information privacy law provides little protection against the risk of =
surveillance by either governments or private sector entities. Indeed, =
such organizations are assumed by law to be trusted entities acting as =
stewards of individuals=92 rights, essentially =93information =
fiduciaries.=94

This Article demonstrates that an analysis of the assumptions and =
principles underlining privacy enhancing technologies (PETs) highlights =
the gap between the constitutional and information privacy frameworks. =
It argues that by embracing PETs, information privacy law can =
recalibrate to better protect individuals from surveillance and unwanted =
intrusions into their private lives. Conversely, if the law continues on =
its current trajectory, emphasizing organizational accountability and =
marginalizing data minimization and transparency, PETs would become =
unviable and individuals subject to increasingly stifling digital =
oversight.








>=20
> From: Hugo Maxwell Connery <hmco@env.dtu.dk>
> Subject: Re: [perpass] https.CIO.gov
> Date: March 28, 2015 at 2:38:13 AM EDT
> To: "dan@geer.org" <dan@geer.org>
> Cc: "perpass@ietf.org" <perpass@ietf.org>
>=20
>=20
> Hi,
>=20
> Standard Fallacy: if communications are encrypted they cannot be =
read/obtained.
>=20
> There are two places where 'encrypted' communications are viewable, at
> the sender and receiver.  Thus, the government (or anyone) can obtain =
the
> communications by invading the sending or receiving system if either a =
plain-text
> of the message(s) or the key and cipher text are still obtainable on =
the device.
> Metadata of the communication is often available in logs.
>=20
> The question is, under what circumstances should the government (or =
others)
> be able to do this?
>=20
> Recall that when people say 'encryption' what they usually mean is =
'secure
> communication' and that means 3 things (CIA model): Confidentiality,=20=

> Integrity and Authenticity. =20
>=20
> Sometimes only two of these properties are desired, and I suggest that =
we should=20
> be thinking about this.  For example, a public forum wishes for =
integrity
> and authenticity but does not necessarily require confidentiality.
>=20
> No amount of digital 'secure communications' will prevent surveillance =
when
> an end-point device is compromised (e.g key logger).
>=20
> Additionally, current transport protocols include the addresses of the =
end-points
> and thus expose the metadata of these connections to all locations in =
the=20
> communications path, irrespective of 'secure communications'. =20
>=20
> Thus, anonymity is another consideration that is entailed in these =
discussions.
> --
> Hugo Connery, Head of IT, DTU Environment, http://www.env.dtu.dk
> ________________________________________
> From: perpass [perpass-bounces@ietf.org] on behalf of dan@geer.org =
[dan@geer.org]
> Sent: Friday, 27 March 2015 03:11
> To: perpass@ietf.org
> Subject: Re: [perpass] https.CIO.gov
>=20
> Encryption everywhere all the time?  No, thank you.
>=20
> Better said, and at effective length, by David Golumbia
>=20
>   Opt-Out Citizenship: End-to-End Encryption and
>   Constitutional Governance
>   http://www.uncomputing.org/?p=3D272
>=20
>=20
> --dan
>=20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
>=20
>=20
>=20


--Apple-Mail=_2D12B18D-11E4-4EFB-8A1F-F523336554EF
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;"><div><br></div><div>Hi =
everyone,</div><div><br></div><div>I am following up on the discussion =
that was partially spurred by the reference to the Golumbia article that =
argues against anonymous communications as a universally accessible and =
acceptable service. I agree with the issues that Golumbia has with =
respect to the unequally distributed benefits of anonymous =
communications and absolutely appreciate the engagement with the topic. =
Technically speaking, however, I find his position uninformed and his =
legal analysis too short to do justice to the issue. What is maybe worse =
is that his points are uncomfortably aligned with the =93going dark=94 =
argument [0]: a popular argument that is especially dubious when more =
private and public data is available to law enforcement and government =
agencies than ever and the number of non-commercial civilian use of =
encryption and anonymous communications is abysmal. The latter is one =
important reason why addressing privacy in standards is =
key.</div><div><br></div><div>Having said that, the interaction between =
privacy laws and privacy enhancing technologies is complex and worthy of =
further discussion. In [1] you will find an outdated but hopefully still =
useful paper on this topic. Also in that article is a distinction =
between types of PETs based on the role of the service provider, which =
you may =
appreciate.</div><div>Cheers,</div><div>seda</div><div><br></div><div><br>=
</div><div><br></div><div><br></div><div>[0]&nbsp;<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span>Going =
Dark by James Comey&nbsp;<a =
href=3D"http://www.fbi.gov/news/speeches/going-dark-are-technology-privacy=
-and-public-safety-on-a-collision-course">http://www.fbi.gov/news/speeches=
/going-dark-are-technology-privacy-and-public-safety-on-a-collision-course=
</a></div><div><br></div><div>[1] <span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span>Hero or Villain: The Data =
Controller in Privacy Law and Technologies, Claudia Diaz, Omer Tene, =
Seda Gurses</div><div><span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span><a =
href=3D"https://www.cosic.esat.kuleuven.be/publications/article-2365.pdf">=
https://www.cosic.esat.kuleuven.be/publications/article-2365.pdf</a></div>=
<div><span style=3D"background-color: rgb(255, 255, =
255);"><br></span></div><div><span style=3D"background-color: rgb(255, =
255, 255);"><span class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span>Constitutional privacy law in Europe and the United States =
establishes the right to privacy as freedom from government =
surveillance. It is based on suspicion of power and distrust in the =
state, which can unleash ominous intrusions into the private sphere to =
crush dissent and stifle democratic discourse and free speech. Over the =
past forty years, an additional legal framework has emerged to protect =
information privacy. Yet unlike the constitutional framework, =
information privacy law provides little protection against the risk of =
surveillance by either governments or private sector entities. Indeed, =
such organizations are assumed by law to be trusted entities acting as =
stewards of individuals=92 rights, essentially =93information =
fiduciaries.=94</span><br><br><span style=3D"background-color: rgb(255, =
255, 255);">This Article demonstrates that an analysis of the =
assumptions and principles underlining privacy enhancing technologies =
(PETs) highlights the gap between the constitutional and information =
privacy frameworks. It argues that by embracing PETs, information =
privacy law can recalibrate to better protect individuals from =
surveillance and unwanted intrusions into their private lives. =
Conversely, if the law continues on its current trajectory, emphasizing =
organizational accountability and marginalizing data minimization and =
transparency, PETs would become unviable and individuals subject to =
increasingly stifling digital =
oversight.</span></div><div><br></div><div><br></div><div><br></div><div><=
br></div><div><br></div><div><br></div><div><br></div><div><br></div><div>=
<blockquote type=3D"cite"><br><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px;"><span =
style=3D"font-family:'Helvetica'; color:rgba(127, 127, 127, =
1.0);"><b>From: </b></span><span style=3D"font-family:'Helvetica';">Hugo =
Maxwell Connery &lt;<a =
href=3D"mailto:hmco@env.dtu.dk">hmco@env.dtu.dk</a>&gt;<br></span></div><d=
iv style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;"><span style=3D"font-family:'Helvetica'; =
color:rgba(127, 127, 127, 1.0);"><b>Subject: </b></span><span =
style=3D"font-family:'Helvetica';"><b>Re: [perpass] <a =
href=3D"http://https.CIO.gov">https.CIO.gov</a></b><br></span></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;"><span style=3D"font-family:'Helvetica'; =
color:rgba(127, 127, 127, 1.0);"><b>Date: </b></span><span =
style=3D"font-family:'Helvetica';">March 28, 2015 at 2:38:13 AM =
EDT<br></span></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px;"><span =
style=3D"font-family:'Helvetica'; color:rgba(127, 127, 127, =
1.0);"><b>To: </b></span><span style=3D"font-family:'Helvetica';">"<a =
href=3D"mailto:dan@geer.org">dan@geer.org</a>" &lt;<a =
href=3D"mailto:dan@geer.org">dan@geer.org</a>&gt;<br></span></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;"><span style=3D"font-family:'Helvetica'; =
color:rgba(127, 127, 127, 1.0);"><b>Cc: </b></span><span =
style=3D"font-family:'Helvetica';">"<a =
href=3D"mailto:perpass@ietf.org">perpass@ietf.org</a>" &lt;<a =
href=3D"mailto:perpass@ietf.org">perpass@ietf.org</a>&gt;<br></span></div>=
<br><br>Hi,<br><br>Standard Fallacy: if communications are encrypted =
they cannot be read/obtained.<br><br>There are two places where =
'encrypted' communications are viewable, at<br>the sender and receiver. =
&nbsp;Thus, the government (or anyone) can obtain the<br>communications =
by invading the sending or receiving system if either a plain-text<br>of =
the message(s) or the key and cipher text are still obtainable on the =
device.<br>Metadata of the communication is often available in =
logs.<br><br>The question is, under what circumstances should the =
government (or others)<br>be able to do this?<br><br>Recall that when =
people say 'encryption' what they usually mean is =
'secure<br>communication' and that means 3 things (CIA model): =
Confidentiality, <br>Integrity and Authenticity. &nbsp;<br><br>Sometimes =
only two of these properties are desired, and I suggest that we should =
<br>be thinking about this. &nbsp;For example, a public forum wishes for =
integrity<br>and authenticity but does not necessarily require =
confidentiality.<br><br>No amount of digital 'secure communications' =
will prevent surveillance when<br>an end-point device is compromised =
(e.g key logger).<br><br>Additionally, current transport protocols =
include the addresses of the end-points<br>and thus expose the metadata =
of these connections to all locations in the <br>communications path, =
irrespective of 'secure communications'. &nbsp;<br><br>Thus, anonymity =
is another consideration that is entailed in these =
discussions.<br>--<br>Hugo Connery, Head of IT, DTU Environment, <a =
href=3D"http://www.env.dtu.dk">http://www.env.dtu.dk</a><br>______________=
__________________________<br>From: perpass [<a =
href=3D"mailto:perpass-bounces@ietf.org">perpass-bounces@ietf.org</a>] =
on behalf of <a href=3D"mailto:dan@geer.org">dan@geer.org</a> [<a =
href=3D"mailto:dan@geer.org">dan@geer.org</a>]<br>Sent: Friday, 27 March =
2015 03:11<br>To: <a =
href=3D"mailto:perpass@ietf.org">perpass@ietf.org</a><br>Subject: Re: =
[perpass] <a =
href=3D"http://https.CIO.gov">https.CIO.gov</a><br><br>Encryption =
everywhere all the time? &nbsp;No, thank you.<br><br>Better said, and at =
effective length, by David Golumbia<br><br> &nbsp;&nbsp;Opt-Out =
Citizenship: End-to-End Encryption and<br> &nbsp;&nbsp;Constitutional =
Governance<br> &nbsp;&nbsp;<a =
href=3D"http://www.uncomputing.org/?p=3D272">http://www.uncomputing.org/?p=
=3D272</a><br><br><br>--dan<br><br>_______________________________________=
________<br>perpass mailing list<br><a =
href=3D"mailto:perpass@ietf.org">perpass@ietf.org</a><br>https://www.ietf.=
org/mailman/listinfo/perpass<br><br><br><br></blockquote></div><br></body>=
</html>=

--Apple-Mail=_2D12B18D-11E4-4EFB-8A1F-F523336554EF--


From nobody Sun Mar 29 14:14:54 2015
Return-Path: <dhc@dcrocker.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F7FA1A1A76 for <perpass@ietfa.amsl.com>; Sun, 29 Mar 2015 14:14:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.5
X-Spam-Level: 
X-Spam-Status: No, score=-3.5 tagged_above=-999 required=5 tests=[BAYES_50=0.8, GB_I_LETTER=-2, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bZ7W6jsWPko3 for <perpass@ietfa.amsl.com>; Sun, 29 Mar 2015 14:14:52 -0700 (PDT)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3934C1A1A52 for <perpass@ietf.org>; Sun, 29 Mar 2015 14:14:52 -0700 (PDT)
Received: from [192.168.1.141] (104-60-96-29.lightspeed.sntcca.sbcglobal.net [104.60.96.29]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id t2TLE1Uh023039 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Sun, 29 Mar 2015 14:14:04 -0700
Message-ID: <55186B16.5010109@dcrocker.net>
Date: Sun, 29 Mar 2015 14:13:58 -0700
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: Eliot Lear <lear@cisco.com>, Christian Huitema <huitema@huitema.net>, "'Stephen Farrell'" <stephen.farrell@cs.tcd.ie>, dan@geer.org, "'Ted Lemon'" <Ted.Lemon@nominum.com>, "'Joseph Lorenzo Hall'" <joe@cdt.org>, "'perpass'" <perpass@ietf.org>
References: <20150327021140.9EB45228181@palinka.tinho.net> <5514C3A3.4080107@cs.tcd.ie> <55161B3D.5010604@cisco.com> <004001d0690e$dd65cf80$98316e80$@huitema.net> <5516A38B.5020005@cisco.com>
In-Reply-To: <5516A38B.5020005@cisco.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Sun, 29 Mar 2015 14:14:08 -0700 (PDT)
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/aB2jYPGy0Lvg4PoHjfabt_61Eq0>
Subject: Re: [perpass] https.CIO.gov
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 29 Mar 2015 21:14:53 -0000

On 3/28/2015 5:50 AM, Eliot Lear wrote:
>> For example, there is no mandate anywhere that people should keep a
>> copy of their private letters in some kind of archive, so that they
>> could later be found when the police asks for it.
> 
> But if they *did* keep a copy they could be compelled to reveal it if
> the state had probable cause or a warrant.  The technology to actually
> retain copies was beyond the horizon of the framers.


And it should be noted that compelling disclosure in this way is
fundamentally different from prohibiting/defeating protection against
lesser efforts.  That is, being required to produce encryption keys is
not the same as being required to use encryption that does not provide
serious protection.  (A backdoor is an example of not being serious.)

This is probably obvious, but I think it worth noting, since I see it at
the core of the encrypt-everything/don't-allow-it debate.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net

