| draft-arkko-farrell-arch-model-t-00.txt | draft-arkko-farrell-arch-model-t.txt | |||
|---|---|---|---|---|
| Network Working Group J. Arkko | Network Working Group J. Arkko | |||
| Internet-Draft Ericsson | Internet-Draft Ericsson | |||
| Intended status: Informational S. Farrell | Intended status: Informational S. Farrell | |||
| Expires: May 7, 2020 Trinity College Dublin | Expires: June 17, 2020 Trinity College Dublin | |||
| November 04, 2019 | December 15, 2019 | |||
| Challenges and Changes in the Internet Threat Model | Challenges and Changes in the Internet Threat Model | |||
| draft-arkko-farrell-arch-model-t-00 | draft-arkko-farrell-arch-model-t-01 | |||
| Abstract | Abstract | |||
| Communications security has been at the center of many security | Communications security has been at the center of many security | |||
| improvements in the Internet. The goal has been to ensure that | improvements in the Internet. The goal has been to ensure that | |||
| communications are protected against outside observers and attackers. | communications are protected against outside observers and attackers. | |||
| This memo suggests that the existing threat model, while important | This memo suggests that the existing threat model, while important | |||
| and still valid, is no longer alone sufficient to cater for the | and still valid, is no longer alone sufficient to cater for the | |||
| pressing security issues in the Internet. For instance, it is also | pressing security issues in the Internet. For instance, it is also | |||
| necessary to protect systems against endpoints that are compromised, | necessary to protect systems against endpoints that are compromised, | |||
| malicious, or whose interests simply do not align with the interests | malicious, or whose interests simply do not align with the interests | |||
| of the users. While such protection is difficult, there are some | of the users. While such protection is difficult, there are some | |||
| measures that can be taken. | measures that can be taken. | |||
| It is particularly important to ensure that as we continue to develop | It is particularly important to ensure that as we continue to develop | |||
| Internet technology, non-communications security related threats are | Internet technology, non-communications security related threats, and | |||
| properly understood. | privacy issues, are properly understood. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on May 7, 2020. | This Internet-Draft will expire on June 17, 2020. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2019 IETF Trust and the persons identified as the | Copyright (c) 2019 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Observations . . . . . . . . . . . . . . . . . . . . . . . . 5 | 2. Observations . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 2.1. Communications Security Improvements . . . . . . . . . . 5 | 2.1. Communications Security Improvements . . . . . . . . . . 6 | |||
| 2.2. Beyond Communications Security . . . . . . . . . . . . . 6 | 2.2. Beyond Communications Security . . . . . . . . . . . . . 6 | |||
| 2.3. Examples . . . . . . . . . . . . . . . . . . . . . . . . 8 | 2.3. Examples . . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 2.3.1. Deliberate adversarial behaviour in applications . . 8 | 2.3.1. Deliberate adversarial behaviour in applications . . 9 | |||
| 2.3.2. Inadvertent adversarial behaviours . . . . . . . . . 13 | 2.3.2. Inadvertent adversarial behaviours . . . . . . . . . 13 | |||
| 3. Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 14 | 3. Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 14 | |||
| 3.1. The Role of End-to-end . . . . . . . . . . . . . . . . . 14 | 3.1. The Role of End-to-end . . . . . . . . . . . . . . . . . 14 | |||
| 3.2. Trusted networks . . . . . . . . . . . . . . . . . . . . 16 | 3.2. Trusted networks . . . . . . . . . . . . . . . . . . . . 16 | |||
| 3.2.1. Even closed networks can have compromised nodes . . . 17 | 3.2.1. Even closed networks can have compromised nodes . . . 17 | |||
| 3.3. Balancing Threats . . . . . . . . . . . . . . . . . . . . 18 | 3.3. Balancing Threats . . . . . . . . . . . . . . . . . . . . 18 | |||
| 4. Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 | 4. Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 | |||
| 4.1. Basic Guidelines . . . . . . . . . . . . . . . . . . . . 18 | 4.1. Basic Guidelines . . . . . . . . . . . . . . . . . . . . 19 | |||
| 4.2. Potential Further Guidelines . . . . . . . . . . . . . . 20 | 4.2. Potential Further Guidelines . . . . . . . . . . . . . . 21 | |||
| 4.2.1. Consider ABuse-cases as well as use-cases . . . . . . 20 | 4.2.1. Consider ABuse-cases as well as use-cases . . . . . . 21 | |||
| 4.2.2. Isolation . . . . . . . . . . . . . . . . . . . . . . 20 | 4.2.2. Isolation . . . . . . . . . . . . . . . . . . . . . . 21 | |||
| 4.2.3. Transparency . . . . . . . . . . . . . . . . . . . . 20 | 4.2.3. Transparency . . . . . . . . . . . . . . . . . . . . 21 | |||
| 4.2.4. Minimise . . . . . . . . . . . . . . . . . . . . . . 21 | 4.2.4. Minimise . . . . . . . . . . . . . . . . . . . . . . 22 | |||
| 4.2.5. Same-Origin Policy . . . . . . . . . . . . . . . . . 21 | 4.2.5. Same-Origin Policy . . . . . . . . . . . . . . . . . 22 | |||
| 4.2.6. Greasing . . . . . . . . . . . . . . . . . . . . . . 21 | 4.2.6. Greasing . . . . . . . . . . . . . . . . . . . . . . 22 | |||
| 4.2.7. Generalise OAuth Threat Model . . . . . . . . . . . . 21 | 4.2.7. Generalise OAuth Threat Model . . . . . . . . . . . . 22 | |||
| 4.2.8. Look again at how well we're securing infrastructure 22 | 4.2.8. Look again at how well we're securing infrastructure 23 | |||
| 4.2.9. Consider recovery from attack as part of protocol | 4.2.9. Consider recovery from attack as part of protocol | |||
| design . . . . . . . . . . . . . . . . . . . . . . . 22 | design . . . . . . . . . . . . . . . . . . . . . . . 23 | |||
| 4.2.10. Don't think in terms of hosts . . . . . . . . . . . . 22 | 4.2.10. Don't think in terms of hosts . . . . . . . . . . . . 23 | |||
| 4.3. Does IETF Analysis of Protocols Need to Change? . . . . . 23 | 4.2.11. Trusted Computing . . . . . . . . . . . . . . . . . . 24 | |||
| 4.3.1. Develop a BCP for privacy considerations . . . . . . 23 | 4.2.12. Trust Boundaries . . . . . . . . . . . . . . . . . . 24 | |||
| 4.3.2. Re-consider protocol design "lore" . . . . . . . . . 23 | 4.3. Does IETF Analysis of Protocols Need to Change? . . . . . 25 | |||
| 4.3.3. Consider the user perspective . . . . . . . . . . . . 23 | 4.3.1. Develop a BCP for privacy considerations . . . . . . 25 | |||
| 4.3.4. Potential changes in RFC 3552 . . . . . . . . . . . . 24 | 4.3.2. Re-consider protocol design "lore" . . . . . . . . . 25 | |||
| 4.3.5. Potential Changes in RFC 7258 . . . . . . . . . . . . 25 | 4.3.3. Consider the user perspective . . . . . . . . . . . . 25 | |||
| 5. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 25 | 4.3.4. Potential changes in RFC 3552 . . . . . . . . . . . . 25 | |||
| 6. Informative References . . . . . . . . . . . . . . . . . . . 26 | 4.3.5. Potential Changes in RFC 7258 . . . . . . . . . . . . 26 | |||
| Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . 32 | 5. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 27 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 32 | 6. Informative References . . . . . . . . . . . . . . . . . . . 28 | |||
| Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . 35 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 36 | ||||
| 1. Introduction | 1. Introduction | |||
| Communications security has been at the center of many security | Communications security has been at the center of many security | |||
| improvements in the Internet. The goal has been to ensure that | improvements in the Internet. The goal has been to ensure that | |||
| communications are protected against outside observers and attackers. | communications are protected against outside observers and attackers. | |||
| At the IETF, this approach has been formalized in BCP 72 [RFC3552], | At the IETF, this approach has been formalized in BCP 72 [RFC3552], | |||
| which defined the Internet threat model in 2003. | which defined the Internet threat model in 2003. | |||
| The purpose of a threat model is to outline what threats exist in | The purpose of a threat model is to outline what threats exist in | |||
| skipping to change at page 4, line 12 | skipping to change at page 4, line 12 | |||
| not all of their aspects have been fully protected. Fortunately, | not all of their aspects have been fully protected. Fortunately, | |||
| there are ongoing projects working on improvements. | there are ongoing projects working on improvements. | |||
| o Adversaries have increased their pressure against other avenues of | o Adversaries have increased their pressure against other avenues of | |||
| attack, from compromising devices to legal coercion of centralized | attack, from compromising devices to legal coercion of centralized | |||
| endpoints in conversations. | endpoints in conversations. | |||
| o New adversaries and risks have arisen, e.g., due to creation of | o New adversaries and risks have arisen, e.g., due to creation of | |||
| large centralized information sources. | large centralized information sources. | |||
| o While communications-security does seem to be required to protect | ||||
| privacy, more is needed. | ||||
| In short, attacks are migrating towards the currently easier targets, | In short, attacks are migrating towards the currently easier targets, | |||
| which no longer necessarily include direct attacks on traffic flows. | which no longer necessarily include direct attacks on traffic flows. | |||
| In addition, trading information about users and ability to influence | In addition, trading information about users and ability to influence | |||
| them has become a common practice for many Internet services, often | them has become a common practice for many Internet services, often | |||
| without consent of the users. | without users understanding those practices. | |||
| This memo suggests that the existing threat model, while important | This memo suggests that the existing threat model, while important | |||
| and still valid, is no longer alone sufficient to cater for the | and still valid, is no longer alone sufficient to cater for the | |||
| pressing security issues in the Internet. For instance, while it | pressing security issues in the Internet. For instance, while it | |||
| continues to be very important to protect Internet communications | continues to be very important to protect Internet communications | |||
| against outsiders, it is also necessary to protect systems against | against outsiders, it is also necessary to protect systems against | |||
| endpoints that are compromised, malicious, or whose interests simply | endpoints that are compromised, malicious, or whose interests simply | |||
| do not align with the interests of the users. | do not align with the interests of the users. | |||
| Of course, there are many trade-offs in the Internet on who one | Of course, there are many trade-offs in the Internet on who one | |||
| skipping to change at page 4, line 50 | skipping to change at page 5, line 4 | |||
| monitoring. Further down the road, updated threat models could | monitoring. Further down the road, updated threat models could | |||
| result in changes in BCP 72 [RFC3552] (guidelines for writing | result in changes in BCP 72 [RFC3552] (guidelines for writing | |||
| security considerations) and BCP 188 [RFC7258] (pervasive | security considerations) and BCP 188 [RFC7258] (pervasive | |||
| monitoring), to include proper consideration of non-communications | monitoring), to include proper consideration of non-communications | |||
| security threats. | security threats. | |||
| It may also be necessary to have dedicated guidance on how systems | It may also be necessary to have dedicated guidance on how systems | |||
| design and architecture affect security. The sole consideration of | design and architecture affect security. The sole consideration of | |||
| communications security aspects in designing Internet protocols may | communications security aspects in designing Internet protocols may | |||
| lead to accidental or increased impact of security issues elsewhere. | lead to accidental or increased impact of security issues elsewhere. | |||
| For instance, allowing a participant to unnecessarily collect or | For instance, allowing a participant to unnecessarily collect or | |||
| receive information may lead to a similar effect as described in | receive information may lead to a similar effect as described in | |||
| [RFC8546] for protocols: over time, unnecessary information will get | [RFC8546] for protocols: over time, unnecessary information will get | |||
| used with all the associated downsides, regardless of what deployment | used with all the associated downsides, regardless of what deployment | |||
| expectations there were during protocol design. | expectations there were during protocol design. | |||
| This memo does not stand alone. To begin with, it is a merge of | ||||
| earlier work by the two authors [I-D.farrell-etm] | ||||
| [I-D.arkko-arch-internet-threat-model]. There are also other | ||||
| documents discussing this overall space, e.g. | ||||
| [I-D.lazanski-smart-users-internet] [I-D.arkko-arch-dedr-report]. | ||||
| The authors of this memo envisage independent development of each of | ||||
| those (and other work) with an eventual goal to extract an updated | ||||
| (but usefully brief!) description of an extended threat model from | ||||
| the collection of works. We consider it an open question whether | ||||
| this memo, or any of the others, would be usefully published as an | ||||
| RFC. | ||||
| The rest of this memo is organized as follows. Section 2 makes some | The rest of this memo is organized as follows. Section 2 makes some | |||
| observations about the situation, with respect to communications | observations about the situation, with respect to communications | |||
| security and beyond. The section also provides a number of real- | security and beyond. The section also provides a number of real- | |||
| world examples. | world examples. | |||
| Section 3 discusses some high-level implications that can be drawn, | Section 3 discusses some high-level implications that can be drawn, | |||
| such as the need to consider what the "ends" really are in an "end- | such as the need to consider what the "ends" really are in an "end- | |||
| to-end" communication. | to-end" communication. | |||
| Section 4 discusses the potential remedies, both from the point of | Section 4 discusses some potential remedies, both from the point of | |||
| view of a system design, as well as from the point of IETF procedures | view of a system design, as well as from the point of IETF procedures | |||
| and recommended analysis procedures when designing new protocols. | and recommended analysis procedures when designing new protocols. | |||
| For instance, Section 4.1 will also discuss high-level guidance to | For instance, Section 4.1 will also discuss high-level guidance to | |||
| addressing these threats, and Section 4.3.4 suggests some potential | addressing these threats, and Section 4.3.4 suggests some potential | |||
| changes to the definition of the IETF's "Internet Threat Model". It | changes to the definition of the IETF's "Internet Threat Model". It | |||
| is also apparent that the dangers posed by pervasive monitoring need | is also apparent that the dangers posed by pervasive monitoring need | |||
| to be taken in a broader light, given the evolution of the threats | to be taken in a broader light, given the evolution of the threats | |||
| beyond communications security. | beyond communications security. | |||
| Comments are solicited on these and other aspects of this document. | Comments are solicited on these and other aspects of this document. | |||
| The best place for discussion is on the arch-discuss list | The best place for discussion is on the arch-discuss list | |||
| (https://www.ietf.org/mailman/listinfo/Architecture-discuss). | (https://www.ietf.org/mailman/listinfo/Architecture-discuss). | |||
| Finally, Section 5 draws some conclusions for next steps. | Finally, Section 5 draws some conclusions for next steps. | |||
| 2. Observations | 2. Observations | |||
| 2.1. Communications Security Improvements | 2.1. Communications Security Improvements | |||
| The fraction of Internet traffic that is cryptographically protected | Being able to ask about threat model improvements is due to progress | |||
| has grown tremendously in the last few years. Several factors have | already made: The fraction of Internet traffic that is | |||
| contributed to this change, from Snowden revelations to business | cryptographically protected has grown tremendously in the last few | |||
| reasons and to better available technology such as HTTP/2 [RFC7540], | years. Several factors have contributed to this change, from Snowden | |||
| TLS 1.3 [RFC8446], QUIC [I-D.ietf-quic-transport]. | revelations to business reasons and to better available technology | |||
| such as HTTP/2 [RFC7540], TLS 1.3 [RFC8446], QUIC | ||||
| [I-D.ietf-quic-transport]. | ||||
| In many networks, the majority of traffic has flipped from being | In many networks, the majority of traffic has flipped from being | |||
| cleartext to being encrypted. Reaching the level of (almost) all | cleartext to being encrypted. Reaching the level of (almost) all | |||
| traffic being encrypted is no longer something unthinkable but rather | traffic being encrypted is no longer something unthinkable but rather | |||
| a likely outcome in a few years. | a likely outcome in a few years. | |||
| At the same time, technology developments and policy choices have | At the same time, technology developments and policy choices have | |||
| driven the scope of cryptographic protection from protecting only the | driven the scope of cryptographic protection from protecting only the | |||
| pure payload to protecting much of the rest as well, including far | pure payload to protecting much of the rest as well, including far | |||
| more header and meta-data information than was protected before. For | more header and meta-data information than was protected before. For | |||
| skipping to change at page 6, line 25 | skipping to change at page 6, line 48 | |||
| been resolved - far from it. But the situation is definitely | been resolved - far from it. But the situation is definitely | |||
| different from what it was a few years ago. Remaining issues will be | different from what it was a few years ago. Remaining issues will be | |||
| and are worked on; the fight between defense and attack will also | and are worked on; the fight between defense and attack will also | |||
| continue. Communications security will stay at the top of the agenda | continue. Communications security will stay at the top of the agenda | |||
| in any Internet technology development. | in any Internet technology development. | |||
| 2.2. Beyond Communications Security | 2.2. Beyond Communications Security | |||
| There are, however, significant issues beyond communications security | There are, however, significant issues beyond communications security | |||
| in the Internet. To begin with, it is not necessarily clear that one | in the Internet. To begin with, it is not necessarily clear that one | |||
| can trust all the endpoints. | can trust all the endpoints in any protocol interaction. | |||
| Of course, the endpoints were never trusted, but the pressures | Of course, the endpoints were never trusted, but the pressures | |||
| against endpoints issues seem to be mounting. For instance, the | against endpoints issues seem to be mounting. For instance, the | |||
| users may not be in as much control over their own devices as they | users may not be in as much control over their own devices as they | |||
| used to be due to manufacturer-controlled operating system | used to be due to manufacturer-controlled operating system | |||
| installations and locked device ecosystems. And within those | installations and locked device ecosystems. And within those | |||
| ecosystems, even the applications that are available tend to have | ecosystems, even the applications that are available tend to have | |||
| features that users by themselves would most likely not desire to | privileges that users by themselves would most likely not desire | |||
| have, such as excessive rights to media, location, and peripherals. | those applications have, such as excessive rights to media, location, | |||
| There are also designated efforts by various authorities to hack end- | and peripherals. There are also designated efforts by various | |||
| user devices as a means of intercepting data about the user. | authorities to hack end-user devices as a means of intercepting data | |||
| about the user. | ||||
| The situation is different, but not necessarily better on the side of | The situation is different, but not necessarily better on the side of | |||
| servers. The pattern of communications in today's Internet is almost | servers. The pattern of communications in today's Internet is almost | |||
| always via a third party that has at least as much information than | always via a third party that has at least as much information as the | |||
| the other parties have. For instance, these third parties are | other parties have. For instance, these third parties are typically | |||
| typically endpoints for any transport layer security connections, and | endpoints for any transport layer security connections, and able to | |||
| able to see any communications or other messaging in cleartextx. | see any communications or other messaging in cleartext. There are | |||
| There are some exceptions, of course, e.g., messaging applications | some exceptions, of course, e.g., messaging applications with end-to- | |||
| with end-to-end protection. | end protection. | |||
| With the growth of trading users' information by many of these third | With the growth of trading users' information by many of these third | |||
| parties, it becomes necessary to take precautions against endpoints | parties, it becomes necessary to take precautions against endpoints | |||
| that are compromised, malicious, or whose interests simply do not | that are compromised, malicious, or whose interests simply do not | |||
| align with the interests of the users. | align with the interests of the users. | |||
| Specifically, the following issues need attention: | Specifically, the following issues need attention: | |||
| o Security of users' devices and the ability of the user to control | o Security of users' devices and the ability of the user to control | |||
| their own equipment. | their own equipment. | |||
| skipping to change at page 7, line 32 | skipping to change at page 8, line 6 | |||
| o Network and application architectures that result in a lot of | o Network and application architectures that result in a lot of | |||
| information collected in a (logically) central location. | information collected in a (logically) central location. | |||
| o Leverage and control points outside the hands of the users or end- | o Leverage and control points outside the hands of the users or end- | |||
| user device owners. | user device owners. | |||
| For instance, while e-mail transport security [RFC7817] has become | For instance, while e-mail transport security [RFC7817] has become | |||
| much more widely distributed in recent years, progress in securing | much more widely distributed in recent years, progress in securing | |||
| e-mail messages between users has been much slower. This has lead to | e-mail messages between users has been much slower. This has lead to | |||
| a situation where e-mail content is considered a critical resource by | a situation where e-mail content is considered a critical resource by | |||
| mail providers who use it for machine learning, advertisement | some mail service providers who use the content for machine learning, | |||
| targeting, and other purposes. | advertisement targeting, and other purposes unrelated to message | |||
| delivery. Equally however, it is unclear how some useful anti-spam | ||||
| techniques could be deployed in an end-to-end encrypted mail universe | ||||
| (with today's end-to-end mail sercurity protocols). | ||||
| The Domain Name System (DNS) shows signs of ageing but due to the | The Domain Name System (DNS) shows signs of ageing but due to the | |||
| legacy of deployed systems has changed very slowly. Newer technology | legacy of deployed systems has changed very slowly. Newer technology | |||
| [RFC8484] developed at the IETF enables DNS queries to be performed | [RFC8484] developed at the IETF enables DNS queries to be performed | |||
| confidentially, but its deployment is happening mostly in browsers | confidentially, but its initial deployment is happening mostly in | |||
| that use global DNS resolver services, such as Cloudflare's 1.1.1.1 | browsers that use global DNS resolver services, such as Cloudflare's | |||
| or Google's 8.8.8.8. This results in faster evolution and better | 1.1.1.1 or Google's 8.8.8.8. This results in faster evolution and | |||
| security for end users. | better security for end users. | |||
| However, if one steps back and considers the overall security effects | However, if one steps back and considers the potential security and | |||
| of these developments, the resulting effects can be different. While | privacy effects of these developments, the outcome could appear | |||
| the security of the actual protocol exchanges improves with the | different. While the security and confidentiality of the protocol | |||
| introduction of this new technology, at the same time this implies a | exchanges improves with the introduction of this new technology, at | |||
| move from using a worldwide distributed set of DNS resolvers into | the same time this could lead to a move from using a worldwide | |||
| more centralised global resolvers. While these resolvers are very | distributed set of DNS resolvers into a far smaller set of | |||
| well maintained (and a great service), they are potential high-value | centralised global resolvers. While these resolvers are very well | |||
| maintained (and a great service), they are potential high-value | ||||
| targets for pervasive monitoring and Denial-of-Service (DoS) attacks. | targets for pervasive monitoring and Denial-of-Service (DoS) attacks. | |||
| In 2016, for example, DoS attacks were launched against Dyn, one of | In 2016, for example, DoS attacks were launched against Dyn, one of | |||
| the largest DNS providers, leading to some outages. It is difficult | the largest DNS providers, leading to some outages. It is difficult | |||
| to imagine that DNS resolvers wouldn't be a target in many future | to imagine that DNS resolvers wouldn't be a target in many future | |||
| attacks or pervasive monitoring projects. | attacks or pervasive monitoring projects. | |||
| Unfortunately, there is little that even large service providers can | Unfortunately, there is little that even large service providers can | |||
| do to refuse authority-sanctioned pervasive monitoring. As a result | do to not be a DDoS target, not to refuse authority-sanctioned | |||
| it seems that the only reasonable course of defense is to ensure that | pervasive monitoring. As a result it seems that a reasonable defense | |||
| no such information or control point exists. | strategy may be to aim for outcomes where such highly centralised | |||
| control points are unecessary or don't handle sensitive data. | ||||
| (Recalling that with the DNS, information about the requestor and the | ||||
| act of requesting an answer are what is potentially sensitive, rather | ||||
| than the content of the answer.) | ||||
| There are other examples about the perils of centralised solutions in | There are other examples of the perils of centralised solutions in | |||
| Internet infrastructure. The DNS example involved an interesting | Internet infrastructure. The DNS example involves an interesting | |||
| combination of information flows (who is asking for what domain | combination of information flows (who is asking for what domain | |||
| names) as well as a potential ability to exert control (what domains | names) as well as a potential ability to exert control (what domains | |||
| will actually resolve to an address). Routing systems are primarily | will actually resolve to an address). Routing systems are primarily | |||
| about control. While there are intra-domain centralized routing | about control. While there are intra-domain centralized routing | |||
| solutions (such as PCE [RFC4655]), a control within a single | solutions (such as PCE [RFC4655]), a control within a single | |||
| administrative domain is usually not the kind of centralization that | administrative domain is usually not the kind of centralization that | |||
| we would be worried about. Global centralization would be much more | we would be worried about. Global centralization would be much more | |||
| concerning. Fortunately, global Internet routing is performed a | concerning. Fortunately, global Internet routing is performed a | |||
| among peers. However, controls could be introduced even in this | among peers. However, controls could be introduced even in this | |||
| global, distributed system. To secure some of the control exchanges, | global, distributed system. To secure some of the control exchanges, | |||
| skipping to change at page 9, line 19 | skipping to change at page 9, line 50 | |||
| network actors as potential adversaries despite the many examples of | network actors as potential adversaries despite the many examples of | |||
| network operators who do act primarily in the best interests of their | network operators who do act primarily in the best interests of their | |||
| users. | users. | |||
| 2.3.1.1. Malware in curated application stores | 2.3.1.1. Malware in curated application stores | |||
| Despite the best efforts of curators, so-called App-Stores frequently | Despite the best efforts of curators, so-called App-Stores frequently | |||
| distribute malware of many kinds and one recent study [Curated] | distribute malware of many kinds and one recent study [Curated] | |||
| claims that simple obfuscation enables malware to avoid detection by | claims that simple obfuscation enables malware to avoid detection by | |||
| even sophisticated operators. Given the scale of these deployments, | even sophisticated operators. Given the scale of these deployments, | |||
| ditribution of even a small percentage of malware-infected | distribution of even a small percentage of malware-infected | |||
| applictions can affect a huge number of people. | applictions can affect a huge number of people. | |||
| 2.3.1.2. Virtual private networks (VPNs) | 2.3.1.2. Virtual private networks (VPNs) | |||
| Virtual private networks (VPNs) are supposed to hide user traffic to | Virtual private networks (VPNs) are supposed to hide user traffic to | |||
| various degrees depending on the particular technology chosen by the | various degrees depending on the particular technology chosen by the | |||
| VPN provider. However, not all VPNs do what they say, some for | VPN provider. However, not all VPNs do what they say, some for | |||
| example misrepresenting the countries in which they provide vantage | example misrepresenting the countries in which they provide vantage | |||
| points [Vpns]. | points [Vpns]. | |||
| skipping to change at page 13, line 17 | skipping to change at page 13, line 42 | |||
| Not all adversarial behaviour by applications is deliberate, some is | Not all adversarial behaviour by applications is deliberate, some is | |||
| likely due to various levels of carelessness (some quite | likely due to various levels of carelessness (some quite | |||
| understandable, others not) and/or due to erroneous assumptions about | understandable, others not) and/or due to erroneous assumptions about | |||
| the environments in which those applications (now) run. | the environments in which those applications (now) run. | |||
| We very briefly list some such cases: | We very briefly list some such cases: | |||
| o Application abuse for command and control, for example, use of IRC | o Application abuse for command and control, for example, use of IRC | |||
| or apache logs for [CommandAndControl] | or apache logs for [CommandAndControl] | |||
| o Carelessly [LeakyBuckets], for example, lots of Amazon S3 leaks | o Carelessly leaky data stores [LeakyBuckets], for example, lots of | |||
| showing that careless admins can too easily cause application | Amazon S3 leaks showing that careless admins can too easily cause | |||
| server data to become available to adversaries | application server data to become available to adversaries | |||
| o Virtualisation exposing secrets, for example, [MeltdownAndSpectre] | o Virtualisation exposing secrets, for example, Meltdown and Spectre | |||
| and similar side-channels | [MeltdownAndSpectre] [Kocher2019] [Lipp2018] and other similar | |||
| side-channel attacks. | ||||
| o Compromised badly-maintained web sites, that for example, have led | o Compromised badly-maintained web sites, that for example, have led | |||
| to massive online [Passwords]. | to massive online [Passwords]. | |||
| o Supply-chain attacks, for example, the [TargetAttack] or malware | o Supply-chain attacks, for example, the [TargetAttack] or malware | |||
| within pre-installed applications on Android phones [Bloatware]. | within pre-installed applications on Android phones [Bloatware]. | |||
| o Breaches of major service providers, that many of us might have | o Breaches of major service providers, that many of us might have | |||
| assumed would be sufficiently capable to be the best large-scale | assumed would be sufficiently capable to be the best large-scale | |||
| "Identity providers", for example: | "Identity providers", for example: | |||
| skipping to change at page 17, line 5 | skipping to change at page 17, line 27 | |||
| environments. | environments. | |||
| In general, the outside vs. inside security model is outdated for | In general, the outside vs. inside security model is outdated for | |||
| most situations, due to the complex and evolving networks and the | most situations, due to the complex and evolving networks and the | |||
| need to support mixture of devices from different sources (e.g., BYOD | need to support mixture of devices from different sources (e.g., BYOD | |||
| networks). Network virtualization also implies that previously clear | networks). Network virtualization also implies that previously clear | |||
| notions of local area networks and physical proximity may create an | notions of local area networks and physical proximity may create an | |||
| entirely different reality from what appears from a simple notion of | entirely different reality from what appears from a simple notion of | |||
| a local network. | a local network. | |||
| Similarly, even trusted, well-managed parties can be problematic, | ||||
| even when operating openly in the Internet. Systems that collect | ||||
| data from a large number of Internet users, or that are used by a | ||||
| large number of devices have some inherent issues: large data stores | ||||
| attract attempts to use that data in a manner that is not consistent | ||||
| with the users' interests. They can also become single points of | ||||
| failure through network management, software, or business failures. | ||||
| See also [I-D.arkko-arch-infrastructure-centralisation]. | ||||
| 3.2.1. Even closed networks can have compromised nodes | 3.2.1. Even closed networks can have compromised nodes | |||
| This memo argues that the situation is even more dire than what was | This memo argues that the situation is even more dire than what was | |||
| explained above. It is impossible to ensure that all components in a | explained above. It is impossible to ensure that all components in a | |||
| network are actually trusted. Even in a closed network with | network are actually trusted. Even in a closed network with | |||
| carefully managed components there may be compromised components, and | carefully managed components there may be compromised components, and | |||
| this should be factored into the design of the system and protocols | this should be factored into the design of the system and protocols | |||
| used in the system. | used in the system. | |||
| For instance, during the Snowden revelations it was reported that | For instance, during the Snowden revelations it was reported that | |||
| internal communication flows of large content providers were | internal communication flows of large content providers were | |||
| compromised in an effort to acquire information from large number of | compromised in an effort to acquire information from large numbers of | |||
| end users. This shows the need to protect not just communications | end users. This shows the need to protect not just communications | |||
| targeted to go over the Internet, but in many cases also internal and | targeted to go over the Internet, but in many cases also internal and | |||
| control communications. | control communications. | |||
| Furthermore, there is a danger of compromised nodes, so | Furthermore, there is a danger of compromised nodes, so | |||
| communications security alone will be insufficient to protect against | communications security alone will be insufficient to protect against | |||
| this. The defences against this include limiting information within | this. The defences against this include limiting information within | |||
| networks to the parties that have a need to know, as well as limiting | networks to the parties that have a need to know, as well as limiting | |||
| control capabilities. This is necessary even when all the nodes are | control capabilities. This is necessary even when all the nodes are | |||
| under the control of the same network manager; the network manager | under the control of the same network manager; the network manager | |||
| needs to assume that some nodes and communications will be | needs to assume that some nodes and communications will be | |||
| compromised, and build a system to mitigate or minimise attacks even | compromised, and build a system to mitigate or minimise attacks even | |||
| under that assumption. | under that assumption. | |||
| Even airgapped networks can have these issues, as evidenced, for | Even airgapped networks can have these issues, as evidenced, for | |||
| instance, by the Stuxnet worm. The Internet is not the only form of | instance, by the Stuxnet worm. The Internet is not the only form of | |||
| connectivity, as most systems include, for instance, USB ports that | connectivity, as most systems include, for instance, USB ports that | |||
| proved to be the achilles heel of the targets in the Stuxnet case. | proved to be the achilles heel of the targets in the Stuxnet case. | |||
| More commonly, every system runs large amount of software, and it is | More commonly, every system runs large amount of software, and it is | |||
| often not practical or even possible to black the software to prevent | often not practical or even possible to prevent compromised code even | |||
| compromised code even in a high-security setting, let alone in | in a high-security setting, let alone in commercial or private | |||
| commercial or private networks. Installation media, physical ports, | networks. Installation media, physical ports, both open source and | |||
| both open source and proprietary programs, firmware, or even | proprietary programs, firmware, or even innocent-looking components | |||
| innocent-looking components on a circuit board can be suspect. In | on a circuit board can be suspect. In addition, complex underlying | |||
| addition, complex underlying computing platforms, such as modern CPUs | computing platforms, such as modern CPUs with underlying security and | |||
| with underlying security and management tools are prone for problems. | management tools are prone to problems. | |||
| In general, this means that one cannot entirely trust even a closed | In general, this means that one cannot entirely trust even a closed | |||
| system where you picked all the components yourself. Analysis for | system where you picked all the components yourself. Analysis for | |||
| the security of many interesting real-world systems now commonly | the security of many interesting real-world systems now commonly | |||
| needs to include cross-component attacks, e.g., the use of car radios | needs to include cross-component attacks, e.g., the use of car radios | |||
| and other externally communicating devices as part of attacks | and other externally communicating devices as part of attacks | |||
| launched against the control components such as breaks in a car | launched against the control components such as breaks in a car | |||
| [Savage]. | [Savage]. | |||
| 3.3. Balancing Threats | 3.3. Balancing Threats | |||
| skipping to change at page 18, line 50 | skipping to change at page 19, line 32 | |||
| protocol designers: | protocol designers: | |||
| 1. Consider first principles in protecting information and systems, | 1. Consider first principles in protecting information and systems, | |||
| rather than following a specific pattern such as protecting | rather than following a specific pattern such as protecting | |||
| information in a particular way or at a particular protocol | information in a particular way or at a particular protocol | |||
| layer. It is necessary to understand what components can be | layer. It is necessary to understand what components can be | |||
| compromised, where interests may or may not be aligned, and what | compromised, where interests may or may not be aligned, and what | |||
| parties have a legitimate role in being a party to a specific | parties have a legitimate role in being a party to a specific | |||
| information or a control task. | information or a control task. | |||
| 2. Minimize information passed to others: Information passed to | 2. Once you have something, do not pass it onto others without | |||
| another party in a protocol exchange should be minimized to guard | serious consideration: In other words, minimize information | |||
| against the potential compromise of that party. | passed to others. Information passed to another party in a | |||
| protocol exchange should be minimized to guard against the | ||||
| potential compromise of that party. | ||||
| 3. Perform end-to-end protection via other parties: Information | 3. Perform end-to-end protection via other parties: Information | |||
| passed via another party who does not intrinsically need the | passed via another party who does not intrinsically need the | |||
| information to perform its function should be protected end-to- | information to perform its function should be protected end-to- | |||
| end to its intended recipient. This guideline is general, and | end to its intended recipient. This guideline is general, and | |||
| holds equally for sending TCP/IP packets, TLS connections, or | holds equally for sending TCP/IP packets, TLS connections, or | |||
| application-layer interactions. As [RFC8546] notes, it is a | application-layer interactions. As [RFC8546] notes, it is a | |||
| useful design rule to avoid "accidental invariance" (the | useful design rule to avoid "accidental invariance" (the | |||
| deployment of on-path devices that over-time start to make | deployment of on-path devices that over-time start to make | |||
| assumptions about protocols). However, it is also a necessary | assumptions about protocols). However, it is also a necessary | |||
| skipping to change at page 23, line 16 | skipping to change at page 24, line 5 | |||
| programme, appears to posit the same kind of thesis. In the stackevo | programme, appears to posit the same kind of thesis. In the stackevo | |||
| case, that work would presumably lead to some new definition of | case, that work would presumably lead to some new definition of | |||
| protocol endpoint, but (consensus on) such a definition may not be | protocol endpoint, but (consensus on) such a definition may not be | |||
| needed for an expanded threat model. For this work, it may be | needed for an expanded threat model. For this work, it may be | |||
| sufficient to note that protocol endpoints can no longer be | sufficient to note that protocol endpoints can no longer be | |||
| considered to be executing on a traditional host, to assume (at | considered to be executing on a traditional host, to assume (at | |||
| protocol design time) that all endpoints will be run in a virtualised | protocol design time) that all endpoints will be run in a virtualised | |||
| environment where co-tenants and (sometimes) hypervisors are | environment where co-tenants and (sometimes) hypervisors are | |||
| adversaries, and to then call for analysis of such scenarios. | adversaries, and to then call for analysis of such scenarios. | |||
| 4.2.11. Trusted Computing | ||||
| Various trusted computing mechanisms allow placing some additional | ||||
| trust on a particular endpoint. This can be useful to address some | ||||
| of the issues in this memo: | ||||
| o A network manager of a set of devices may be assured that the | ||||
| devices have not been compromised. | ||||
| o An outside party may be assured that someone who runs a device | ||||
| employs a particular software installation in that device, and | ||||
| that the software runs in a protected environment. | ||||
| IETF work such as TEEP [I-D.ietf-teep-architecture] | ||||
| [I-D.ietf-teep-protocol] and RATS [I-D.ietf-rats-eat] may be helpful | ||||
| in providing attestations to other nodes about a particular endpoint, | ||||
| or lifecycle management of such endpoints. | ||||
| One should note, however, that it is often not possible to fully | ||||
| protect endpoints (see, e.g., [Kocher2019] [Lipp2018] | ||||
| [I-D.taddei-smart-cless-introduction] | ||||
| [I-D.mcfadden-smart-endpoint-taxonomy-for-cless]). And of course, a | ||||
| trusted computing may be set up and controlled by a party that itself | ||||
| is not trusted; a client that contacts a server that the server's | ||||
| owner runs in a trusted computing setting does not change the fact | ||||
| that the client and the server's owner may have different interests. | ||||
| As a result, there is a need to prepare for the possibility that | ||||
| another party in a communication is not entirely trusted. | ||||
| 4.2.12. Trust Boundaries | ||||
| Traditional forms of communication equipment have morphed into | ||||
| today's virtualized environments, where new trust boundaries exist, | ||||
| e.g., between different virtualisation layers. And an application | ||||
| might consider itself trusted while not entirely trusting the | ||||
| underlying operating system. A browser application wants to protect | ||||
| itself against Javascript loaded from a website, while the website | ||||
| considers itself and the Javascript an application that it wants to | ||||
| protect from the browser. | ||||
| In general, there are multiple parties even in a single device, with | ||||
| differing interests, including some that have (or claim to) the | ||||
| interest of the human user in mind. | ||||
| 4.3. Does IETF Analysis of Protocols Need to Change? | 4.3. Does IETF Analysis of Protocols Need to Change? | |||
| It may also be necessary to make procedural changes in how new | It may also be necessary to make procedural changes in how new | |||
| protocols are defined at the IETF. For instance, our existing | protocols are defined at the IETF. For instance, our existing | |||
| documentation of threat models and requirements for security | documentation of threat models and requirements for security | |||
| considerations sections may not be adequate in today's world. | considerations sections may not be adequate in today's world. | |||
| These suggested changes are entirely tentative. | These suggested changes are entirely tentative. | |||
| 4.3.1. Develop a BCP for privacy considerations | 4.3.1. Develop a BCP for privacy considerations | |||
| skipping to change at page 26, line 9 | skipping to change at page 27, line 46 | |||
| A key focus area at the IETF has been the security of transport | A key focus area at the IETF has been the security of transport | |||
| protocols, and how transport layer security can be best used to | protocols, and how transport layer security can be best used to | |||
| provide the right security for various applications. However, more | provide the right security for various applications. However, more | |||
| work is needed in equivalently broadly deployed tools for minimising | work is needed in equivalently broadly deployed tools for minimising | |||
| or obfuscating information provided by users to other entities, and | or obfuscating information provided by users to other entities, and | |||
| the use of end-to-end security through entities that are involved in | the use of end-to-end security through entities that are involved in | |||
| the protocol exchange but who do not need to know everything that is | the protocol exchange but who do not need to know everything that is | |||
| being passed through them. | being passed through them. | |||
| Comments on the issues discussed in this memo are gladly taken either | Comments on the issues discussed in this memo are gladly taken either | |||
| privately or on the architecture-discuss mailing list. | privately or on the model-t mailing list | |||
| (https://www.ietf.org/mailman/listinfo/Model-t). | ||||
| Some further work includes items listed in Section 4.1 and | ||||
| Section 4.3, as well as compiling categories of vulnerabilities that | ||||
| need to be addressed, examples of specific attacks, and continuing | ||||
| the analysis of the situation and possible new remedies. | ||||
| It is also necessary find suitable use cases that the IETF can | ||||
| address by further work in this space. A completely adversial | ||||
| situation is not really workable, but there are situations where some | ||||
| parties are trustworthy, and wish to co-operate to show to each other | ||||
| that this is really the case. In these situations data minimisation | ||||
| can be beneficial to both, attestation can provide additional trust, | ||||
| detection of incidents can alert the parties to action, and so on. | ||||
| 6. Informative References | 6. Informative References | |||
| [AbuseCases] | [AbuseCases] | |||
| McDermott, J. and C. Fox, "Using abuse case models for | McDermott, J. and C. Fox, "Using abuse case models for | |||
| security requirements analysis", IEEE Annual Computer | security requirements analysis", IEEE Annual Computer | |||
| Security Applications Conference (ACSAC'99), | Security Applications Conference (ACSAC'99), | |||
| https://www.acsac.org/1999/papers/wed-b-1030-john.pdf , | https://www.acsac.org/1999/papers/wed-b-1030-john.pdf , | |||
| 1999. | 1999. | |||
| skipping to change at page 27, line 38 | skipping to change at page 29, line 38 | |||
| https://www.net.in.tum.de/fileadmin/bibtex/publications/ | https://www.net.in.tum.de/fileadmin/bibtex/publications/ | |||
| papers/schlamp_TMA_1_2015.pdf , 2015. | papers/schlamp_TMA_1_2015.pdf , 2015. | |||
| [Home] Nthala, N. and I. Flechais, "Rethinking home network | [Home] Nthala, N. and I. Flechais, "Rethinking home network | |||
| security", European Workshop on Usable Security | security", European Workshop on Usable Security | |||
| (EuroUSEC), https://ora.ox.ac.uk/objects/ | (EuroUSEC), https://ora.ox.ac.uk/objects/ | |||
| uuid:e2460f50-579b-451b-b14e-b7be2decc3e1/download_file?sa | uuid:e2460f50-579b-451b-b14e-b7be2decc3e1/download_file?sa | |||
| fe_filename=bare_conf_EuroUSEC2018.pdf&file_format=applica | fe_filename=bare_conf_EuroUSEC2018.pdf&file_format=applica | |||
| tion%2Fpdf&type_of_work=Conference+item , 2018. | tion%2Fpdf&type_of_work=Conference+item , 2018. | |||
| [I-D.arkko-arch-dedr-report] | ||||
| Arkko, J. and T. Hardie, "Report from the IAB workshop on | ||||
| Design Expectations vs. Deployment Reality in Protocol | ||||
| Development", draft-arkko-arch-dedr-report-00 (work in | ||||
| progress), November 2019. | ||||
| [I-D.arkko-arch-infrastructure-centralisation] | ||||
| Arkko, J., "Centralised Architectures in Internet | ||||
| Infrastructure", draft-arkko-arch-infrastructure- | ||||
| centralisation-00 (work in progress), November 2019. | ||||
| [I-D.arkko-arch-internet-threat-model] | ||||
| Arkko, J., "Changes in the Internet Threat Model", draft- | ||||
| arkko-arch-internet-threat-model-01 (work in progress), | ||||
| July 2019. | ||||
| [I-D.farrell-etm] | [I-D.farrell-etm] | |||
| Farrell, S., "We're gonna need a bigger threat model", | Farrell, S., "We're gonna need a bigger threat model", | |||
| draft-farrell-etm-03 (work in progress), July 2019. | draft-farrell-etm-03 (work in progress), July 2019. | |||
| [I-D.iab-protocol-maintenance] | [I-D.iab-protocol-maintenance] | |||
| Thomson, M., "The Harmful Consequences of the Robustness | Thomson, M., "The Harmful Consequences of the Robustness | |||
| Principle", draft-iab-protocol-maintenance-03 (work in | Principle", draft-iab-protocol-maintenance-04 (work in | |||
| progress), May 2019. | progress), November 2019. | |||
| [I-D.ietf-httpbis-expect-ct] | [I-D.ietf-httpbis-expect-ct] | |||
| estark@google.com, e., "Expect-CT Extension for HTTP", | estark@google.com, e., "Expect-CT Extension for HTTP", | |||
| draft-ietf-httpbis-expect-ct-08 (work in progress), | draft-ietf-httpbis-expect-ct-08 (work in progress), | |||
| December 2018. | December 2018. | |||
| [I-D.ietf-mls-architecture] | [I-D.ietf-mls-architecture] | |||
| Omara, E., Beurdouche, B., Rescorla, E., Inguva, S., Kwon, | Omara, E., Beurdouche, B., Rescorla, E., Inguva, S., Kwon, | |||
| A., and A. Duric, "The Messaging Layer Security (MLS) | A., and A. Duric, "The Messaging Layer Security (MLS) | |||
| Architecture", draft-ietf-mls-architecture-03 (work in | Architecture", draft-ietf-mls-architecture-03 (work in | |||
| progress), September 2019. | progress), September 2019. | |||
| [I-D.ietf-quic-transport] | [I-D.ietf-quic-transport] | |||
| Iyengar, J. and M. Thomson, "QUIC: A UDP-Based Multiplexed | Iyengar, J. and M. Thomson, "QUIC: A UDP-Based Multiplexed | |||
| and Secure Transport", draft-ietf-quic-transport-23 (work | and Secure Transport", draft-ietf-quic-transport-24 (work | |||
| in progress), September 2019. | in progress), November 2019. | |||
| [I-D.ietf-rats-eat] | ||||
| Mandyam, G., Lundblade, L., Ballesteros, M., and J. | ||||
| O'Donoghue, "The Entity Attestation Token (EAT)", draft- | ||||
| ietf-rats-eat-01 (work in progress), July 2019. | ||||
| [I-D.ietf-teep-architecture] | ||||
| Pei, M., Tschofenig, H., Thaler, D., and D. Wheeler, | ||||
| "Trusted Execution Environment Provisioning (TEEP) | ||||
| Architecture", draft-ietf-teep-architecture-05 (work in | ||||
| progress), December 2019. | ||||
| [I-D.ietf-teep-protocol] | ||||
| Tschofenig, H., Pei, M., Wheeler, D., and D. Thaler, | ||||
| "Trusted Execution Environment Provisioning (TEEP) | ||||
| Protocol", draft-ietf-teep-protocol-00 (work in progress), | ||||
| December 2019. | ||||
| [I-D.ietf-tls-esni] | [I-D.ietf-tls-esni] | |||
| Rescorla, E., Oku, K., Sullivan, N., and C. Wood, | Rescorla, E., Oku, K., Sullivan, N., and C. Wood, | |||
| "Encrypted Server Name Indication for TLS 1.3", draft- | "Encrypted Server Name Indication for TLS 1.3", draft- | |||
| ietf-tls-esni-04 (work in progress), July 2019. | ietf-tls-esni-05 (work in progress), November 2019. | |||
| [I-D.ietf-tls-grease] | [I-D.ietf-tls-grease] | |||
| Benjamin, D., "Applying GREASE to TLS Extensibility", | Benjamin, D., "Applying GREASE to TLS Extensibility", | |||
| draft-ietf-tls-grease-04 (work in progress), August 2019. | draft-ietf-tls-grease-04 (work in progress), August 2019. | |||
| [I-D.lazanski-smart-users-internet] | ||||
| Lazanski, D., "An Internet for Users Again", draft- | ||||
| lazanski-smart-users-internet-00 (work in progress), July | ||||
| 2019. | ||||
| [I-D.mcfadden-smart-endpoint-taxonomy-for-cless] | ||||
| McFadden, M., "Endpoint Taxonomy for CLESS", draft- | ||||
| mcfadden-smart-endpoint-taxonomy-for-cless-00 (work in | ||||
| progress), July 2019. | ||||
| [I-D.nottingham-for-the-users] | [I-D.nottingham-for-the-users] | |||
| Nottingham, M., "The Internet is for End Users", draft- | Nottingham, M., "The Internet is for End Users", draft- | |||
| nottingham-for-the-users-09 (work in progress), July 2019. | nottingham-for-the-users-09 (work in progress), July 2019. | |||
| [I-D.taddei-smart-cless-introduction] | ||||
| Taddei, A., Wueest, C., Roundy, K., and D. Lazanski, | ||||
| "Capabilities and Limitations of an Endpoint-only Security | ||||
| Solution", draft-taddei-smart-cless-introduction-01 (work | ||||
| in progress), July 2019. | ||||
| [Kocher2019] | ||||
| Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., | ||||
| Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, | ||||
| T., Schwarz, M., and Y. Yarom, "Spectre Attacks: | ||||
| Exploiting Speculative Execution", 40th IEEE Symposium on | ||||
| Security and Privacy (S&P'19) , 2019. | ||||
| [LeakyBuckets] | [LeakyBuckets] | |||
| Chickowski, E., "Leaky Buckets: 10 Worst Amazon S3 | Chickowski, E., "Leaky Buckets: 10 Worst Amazon S3 | |||
| Breaches", Bitdefender blog, | Breaches", Bitdefender blog, | |||
| https://businessinsights.bitdefender.com/ | https://businessinsights.bitdefender.com/ | |||
| worst-amazon-breaches , 2018. | worst-amazon-breaches , 2018. | |||
| [Lipp2018] | ||||
| Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., | ||||
| Fogh, A., Horn, J., Mangard, S., Kocher, P., Genkin, D., | ||||
| Yarom, Y., and M. Hamburg, "Meltdown: Reading Kernel | ||||
| Memory from User Space", 27th USENIX Security Symposium | ||||
| (USENIX Security 18) , 2018. | ||||
| [Mailbug] Englehardt, S., Han, J., and A. Narayanan, "I never signed | [Mailbug] Englehardt, S., Han, J., and A. Narayanan, "I never signed | |||
| up for this! Privacy implications of email tracking", | up for this! Privacy implications of email tracking", | |||
| Proceedings on Privacy Enhancing Technologies 2018.1 | Proceedings on Privacy Enhancing Technologies 2018.1 | |||
| (2018): 109-126, https://www.degruyter.com/downloadpdf/j/ | (2018): 109-126, https://www.degruyter.com/downloadpdf/j/ | |||
| popets.2018.2018.issue-1/popets-2018-0006/ | popets.2018.2018.issue-1/popets-2018-0006/ | |||
| popets-2018-0006.pdf , 2018. | popets-2018-0006.pdf , 2018. | |||
| [MeltdownAndSpectre] | [MeltdownAndSpectre] | |||
| CISA, ., "Meltdown and Spectre Side-Channel Vulnerability | CISA, ., "Meltdown and Spectre Side-Channel Vulnerability | |||
| Guidance", Alert (TA18-004A), | Guidance", Alert (TA18-004A), | |||
| skipping to change at page 32, line 26 | skipping to change at page 35, line 38 | |||
| [Vpns] Khan, M., DeBlasio, J., Voelker, G., Snoeren, A., Kanich, | [Vpns] Khan, M., DeBlasio, J., Voelker, G., Snoeren, A., Kanich, | |||
| C., and N. Vallina, "An empirical analysis of the | C., and N. Vallina, "An empirical analysis of the | |||
| commercial VPN ecosystem", ACM Internet Measurement | commercial VPN ecosystem", ACM Internet Measurement | |||
| Conference 2018 (pp. 443-456), | Conference 2018 (pp. 443-456), | |||
| https://eprints.networks.imdea.org/1886/1/ | https://eprints.networks.imdea.org/1886/1/ | |||
| imc18-final198.pdf , 2018. | imc18-final198.pdf , 2018. | |||
| Appendix A. Acknowledgements | Appendix A. Acknowledgements | |||
| The authors would like to thank the members of the IAB, participants | The authors would like to thank the IAB: | |||
| of the IETF SAAG meeting, participants of the IAB 2019 DEDR workshop, | ||||
| and numerous other people for insightful comments and discussions in | Alissa Cooper, Wes Hardaker, Ted Hardie, Christian Huitema, Zhenbin | |||
| this space. | Li, Erik Nordmark, Mark Nottingham, Melinda Shore, Jeff Tantsura, | |||
| Martin Thomson, Brian Trammel, Mirja Kuhlewind, and Colin Perkins. | ||||
| The authors would also like to thank the participants of the IETF | ||||
| SAAG meeting where this topic was discussed: | ||||
| Harald Alvestrand, Roman Danyliw, Daniel Kahn Gilmore, Wes Hardaker, | ||||
| Bret Jordan, Ben Kaduk, Dominique Lazanski, Eliot Lear, Lawrence | ||||
| Lundblade, Kathleen Moriarty, Kirsty Paine, Eric Rescorla, Ali | ||||
| Rezaki, Mohit Sethi, Ben Schwartz, Dave Thaler, Paul Turner, David | ||||
| Waltemire, and Jeffrey Yaskin. | ||||
| The authors would also like to thank the participants of the IAB 2019 | ||||
| DEDR workshop: | ||||
| Tuomas Aura, Vittorio Bertola, Carsten Bormann, Stephane Bortzmeyer, | ||||
| Alissa Cooper, Stephen Farrell, Hannu Flinck, Carl Gahnberg, Phillip | ||||
| Hallam-Baker, Ted Hardie, Paul Hoffman, Christian Huitema, Geoff | ||||
| Huston, Konstantinos Komaitis, Mirja Kuhlewind, Dirk Kutscher, | ||||
| Zhenbin Li, Julien Maisonneuve, John Mattson, Moritz Muller, Joerg | ||||
| Ott, Lucas Pardue, Jim Reid, Jan-Frederik Rieckers, Mohit Sethi, | ||||
| Melinda Shore, Jonne Soininen, Andrew Sullivan, and Brian Trammell. | ||||
| The authors would also like to thank the participants of the November | ||||
| 2016 meeting at the IETF: | ||||
| Carsten Bormann, Tommy C, Roman Danyliw, Christian Huitema, Ben | ||||
| Kaduk, Dirk Kutscher, Dominique Lazanski, Eric Rescorla, Ali Rezaki, | ||||
| Melinda Shore, Martin Thomson, and Robin Wilton ... (missing many | ||||
| people... did we have minutes other than the list of actions?) ... | ||||
| Finally, the authors would like to thank numerous other people for | ||||
| insightful comments and discussions in this space. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Jari Arkko | Jari Arkko | |||
| Ericsson | Ericsson | |||
| Email: jari.arkko@piuha.net | Email: jari.arkko@piuha.net | |||
| Stephen Farrell | Stephen Farrell | |||
| Trinity College Dublin | Trinity College Dublin | |||
| End of changes. 39 change blocks. | ||||
| 96 lines changed or deleted | 291 lines changed or added | |||
This html diff was produced by rfcdiff 1.34. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||