Forgot your password?
typodupeerror
Privacy The Internet Your Rights Online

RFC 7258: Pervasive Monitoring Is an Attack 67

Posted by Unknown Lamer
from the don't-be-so-nosy dept.
An anonymous reader writes with news that the IETF has adopted a policy of designing new protocols taking into account the need to mitigate pervasive monitoring of all traffic. From the article: "...RFC 7258, also known as BCP 188 (where BCP stands for 'Best Common Practice'); it represents Internet Engineering Task Force consensus on the fact that many powerful well-funded entities feel it is appropriate to monitor people's use of the Net, without telling those people. The consensus is: This monitoring is an attack and designers of Internet protocols must work to mitigate it."
This discussion has been archived. No new comments can be posted.

RFC 7258: Pervasive Monitoring Is an Attack

Comments Filter:
  • Next step: (Score:5, Insightful)

    by SuricouRaven (1897204) on Wednesday May 14, 2014 @09:28AM (#46998515)

    The NSA will try to infiltrate the IETF.

  • by Anonymous Coward on Wednesday May 14, 2014 @09:51AM (#46998691)

    The "pen register" part of the Smith v. Maryland makes their monitoring legal in this meta way. Even Hayden says they've killed people based on metadata alone.

    I don't see how you're going to "mitigate" anything until you get the 9 robed activists to pull heads out.

  • by Bob9113 (14996) on Wednesday May 14, 2014 @10:19AM (#46998903) Homepage

    I think your question calls for a multi-context response:

    Greatest combined offensiveness and pervasiveness today: NSA, though GCHQ gets a solid nod for being more offensive and nearly as pervasive (especially if you count cooperation with NSA, but that cuts both ways).
    Most pervasive today / greatest potential psy-ops threat: US corporations (Google and Facebook so far out in front that it doesn't even look like a competition)
    Most offensive monitoring program today: Corporations monitoring public school students.
    Most scary if I thought they posed a credible threat: North Korea
    Most scary based on capability and recent offensive behavior: Russian government.
    Most scary based on capability and mid-term offensive behavior: Chinese government.
    Most scary based on capability and long-term offensive behavior: Russian government.

    I echo your sentiment about the difficulty of separating Chinese and Russian thugs/corporations/government.

  • by Anonymous Coward on Wednesday May 14, 2014 @10:21AM (#46998915)

    of the Internet. The big corporations collect data of everyone and everything. Its too easy for an NSA to walk in at google and demand for their data. However, if they walk into your home, and ask politely to install a monitoring application on your computer, you will probably decline. They do exactly this thing with the corporations, but let them do the dirty work of getting the data from the people. It will be much harder for the NSA and alike if they have to face a truly decentralized internet.

    When you download an NSA trojan, there won't be the eagle on it. Instead it will perhaps be an angry birds logo. Or a blue box. Or a blue f. Or a blue twittering bird.

  • Re:Next step: (Score:5, Insightful)

    by rabtech (223758) on Wednesday May 14, 2014 @10:29AM (#46998985) Homepage

    The NSA will try to infiltrate the IETF.

    Some people may mod this as Funny, but I take it as completely serious.

    Even if it isn't the NSA, do you really think other state actors won't try to exert their influence?

    Expect lot of FUD around security issues by direct paid shills, or just "grass-roots" opposition indirectly fomented by various state security agencies.

  • by Bob9113 (14996) on Wednesday May 14, 2014 @10:31AM (#46998995) Homepage

    From the RFC, so delicious it must be fattening:

    In particular, the term "attack", used technically, implies nothing about the motivation of the actor mounting the attack. The motivation for PM can range from non-targeted nation-state surveillance, to legal but privacy-unfriendly purposes by commercial enterprises, to illegal actions by criminals. The same techniques to achieve PM can be used regardless of motivation. Thus, we cannot defend against the most nefarious actors while allowing monitoring by other actors no matter how benevolent some might consider them to be, since the actions required of the attacker are indistinguishable from other attacks. The motivation for PM is, therefore, not relevant for how PM is mitigated in IETF protocols.

  • by nimbius (983462) on Wednesday May 14, 2014 @10:40AM (#46999053) Homepage
    Open source community: this is excellent and we welcome the opportunity to enhance common protocols like smtp and http with this new mandate.
    Microsoft: we havent met an RFC we cant mangle. Exchange is so broken as to be unusable, Internet Explorer is more exploit than browser, and we hold patents on sharps and plusses for a clone of every major programming language in existence. dont expect this one to go anywhere fellas.
    Google: we'll add an option in chrome that you can click to disable monitoring. Clicking this option will cause a checkmark to appear. This checkmark will make the user feel feelings, and should probably do something with google plus. its a clickable option for google plus really. buy some of our neat glasses too.
    NSA: you realize Russ Housley and Brian Carpenter, both IETF former chairs, have worked with companies that rolled over when we asked for them to spy on you without telling anyone. Jari Arkko has only been around for a year, and we have enough IETF members in our pocket to keep it that way if we want. Go back to sleep, vote the two parties, and buy magnetic bumper ribbons during the next war to support what we tell you.
  • Re:Next step: (Score:5, Insightful)

    by swillden (191260) <shawn-ds@willden.org> on Wednesday May 14, 2014 @10:43AM (#46999077) Homepage Journal

    The NSA will try to infiltrate the IETF.

    The NSA has already been participating in many standards bodies overtly and covertly. But that doesn't really matter. IETF protocols are designed in public, so backroom attempts to subvert them don't work. The only thing the NSA et al can do is to try to get the standards weakened in subtle, non-obvious ways they can exploit. But being able to do that effectively requires being significantly smarter than everyone else who is looking at and commenting on the designs so they can design and insert weaknesses which no one realizes are weaknesses.

    One ploy they can use that doesn't require super genius insight is to try to promote complexity in new standards. Complexity makes implementation harder and increases the probability of exploitable mistakes, in both design and implementation. That won't give them any guaranteed avenues of attack, but it will increase the odds of exploitable weaknesses. So we need to guard against excessive complexity in standards... but that's always been the case anyway.

  • Re:Next step: (Score:5, Insightful)

    by Anonymous Coward on Wednesday May 14, 2014 @12:43PM (#47000243)

    A third way is to control positions responsible for communicating with other groups, which gives them more opportunities to influence the discussion or misrepresent consensus.

    See Trevor Perrin's request [ietf.org] to remove NSA employee Kevin Igoe from the position as co-chair of the Crypto Forum Research Group:

    Reasons for requesting Kevin's removal
    ----
    1) Kevin has provided the *ONLY* positive feedback for Dragonfly that
    can be found on the CFRG mailing list or meeting minutes. The
    contrast between Kevin's enthusiasm and the group's skepticism is
    striking [CFRG_SUMMARY]. It's unclear what this enthusiasm is based
    on. There's no record of Kevin making any effort to understand
    Dragonfly's unusual structure, compare it to alternatives, consider
    possible use cases, or construct a formal security analysis.

    2) Twice Kevin suggested a technique for deriving the Dragonfly
    password-based element which would make the protocol easy to break
    [IGOE_1, IGOE_2]. He also endorsed an ineffective attempt to avoid
    timing attacks by adding extra iterations to one of the loops [IGOE_3,
    IGOE_4]. These are surprising mistakes from an experienced
    cryptographer.

    3) Kevin's approval of Dragonfly to the TLS WG misrepresented CFRG
    consensus, which was skeptical of Dragonfly [CFRG_SUMMARY].

    4) Kevin's NSA affiliation raises unpleasant but unavoidable
    questions regarding these actions. It's entirely possible these are
    just mistakes by a novice chair who lacks experience in a particular
    sort of protocol and is being pressured by IETF participants to
    endorse something. But it's hard to escape an impression of
    carelessness and unseriousness in Kevin's work. One wonders whether
    the NSA is happy to preside over this sort of sloppy crypto design.

    While that's of course speculation, it remains baffling that an
    experienced cryptographer would champion such a shoddy protocol. The
    CFRG chairs have been silent for months, and haven't responded to
    attempts to clarify this.

    The request was reviewed and denied, so the crypto research group is still co-chaired by a NSA employee.

  • Re:Next step: (Score:2, Insightful)

    by Anonymous Coward on Wednesday May 14, 2014 @01:59PM (#47001087)

    I'm of the opposite opinion. The request and the follow-up is evidence that even an open process can and will be subverted if there is no will to actively deal with the issues.

    Note that nothing was done in response to that request. The CRFG is still co-chaired by a NSA employee. Trevor Perrin is unlikely to raise further issues in the future - why do so if there is no will to act on them? That's one less person to speak out the next time they try something.

    One of the reasons people gave for why it's okay to have a NSA co-chair is what you said - that the IETFs open process inherently makes it unsubvertable. I think that's naive. The NSA has infinite resources compared to the volunteers at IETF. The IETF should be defensive and take what little preventive measures they can. Instead they almost wilfully sabotage themselves.

    An open process doesn't help if you do react to issues when they are pointed out. Trevor Perrin raised an issue - that the NSA openly has an employee in the position of maximum leverage in the cryptographic research group - and nothing was done about it. That looks to me like the open process was tested and failed.

  • Re:Next step: (Score:4, Insightful)

    by ArmoredDragon (3450605) on Wednesday May 14, 2014 @04:16PM (#47002767)

    We've already seen this kind of FUD from foreign governments who want authority over ICANN and IANA. Basically they argue that by these being under the US Department of Commerce, which itself is technically run by Congress, the NSA can somehow spy on the world. Complete nonsense (regardless of who holds the keys, the NSA can always do what they do.)

    The real reason they want control over this is because it makes censorship a lot easier. Russia and China want to stop free speech, whereas Europe wants to kill anything they believe is "hate speech" (which technically almost anything can be called hate speech.) I distrust the feds as much as anybody, but IMO the US is the best holder of that because it doesn't do either.

You can measure a programmer's perspective by noting his attitude on the continuing viability of FORTRAN. -- Alan Perlis

Working...