SlideShare a Scribd company logo
Pervasive Monitoring - 2.5 years in
Stephen Farrell
stephen.farrell@cs.tcd.ie 2/30
Pervasive Monitoring
2.5 years in
stephen.farrell@cs.tcd.ie
Networkshop44 March 22nd 2016
Talk Outline
 Me: Trinity College Dublin, topics: security/privacy/DTN;
 IETF security area director (but not speaking for IETF)
 Expecting wisdom? Vision? Apologies:-)
 A quick reminder of how we got here...
 Good stuff people are doing or have done
 Some harder questions arising
 What should we all be doing about this?
 These slides https://down.dsg.cs.tcd.ie/n44/
 More refs at end
stephen.farrell@cs.tcd.ie 3/30
It's an attack
 The actions of NSA and their partners (nation-state or
corporate, coerced or not) are a multi-faceted form of
attack, or are indistinguishable from that
 Not unique, others are likely doing the same... or will
 The scale arguably makes this an example of a new
pervasive monitoring threat model that is neither purely
passive nor a classic Man-in-the-Middle and that we have
not normally considered in protocol design,
implementation or deployment
 A purely technical response will not “solve the problem”
but we should treat an attack as we usually do and try
mitigate it
stephen.farrell@cs.tcd.ie 4/30
Nov 2013 IETF Technical Plenary
(W) https://www.ietf.org/proceedings/88/technical-plenary.html
What have we learned?
 We've mostly learned the unexpectedly broad scope
and scale of Intelligence agency snooping
 If there is a way to get at data or meta-data, then they
are trying or doing it, including “offensively”
 “Offensive” weapon foot-gun offends common sense
 Send the bytes of your “offensive” weapon out and they
will be used against your customers
 If there is >1 way, they'll try/do them all
 “Collection” fallacy (and others) happily trotted out
stephen.farrell@cs.tcd.ie 5/30
What else have we learned?
 Partial timelines:
 https://en.wikipedia.org/wiki/Global_surveillance_disclosure
 https://www.theguardian.com/us-news/nsa
 My favourite:
 https://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-
internet-yahoo
 My most interesting (politically):
 http://www.scmagazineuk.com/gchq-faces-new-belgacom-hack-
allegations/article/388531/
 My most interesting (technically):
 The short-range radar thing
 https://en.wikipedia.org/wiki/NSA_ANT_catalog
 Recent (March 2016) survey (US focused)
 https://www.brennancenter.org/sites/default/files/publications/Overseas_Surveilla
nce_in_an_Interconnected_World.pdf
stephen.farrell@cs.tcd.ie 6/30
A Definition
• Pervasive Monitoring (PM) is widespread (and often
covert) surveillance through intrusive gathering of
protocol artefacts, including application content, or
protocol meta-data such as headers. Active or
passive wiretaps and traffic analysis, (e.g.,
correlation, timing or measuring packet sizes), or
subverting the cryptographic keys used to secure
protocols can also be used as part of pervasive
monitoring. PM is distinguished by being
indiscriminate and very large-scale, rather than by
introducing new types of technical compromise.
stephen.farrell@cs.tcd.ie 7/30
From RFC7258/BCP188: “Pervasive Monitoring is an Attack”
PM is not everything
 PM is far from the only security or privacy issue on
which we need to work
 Spam, malware, DDoS, …
 But mitigations for PM can also help a lot with other
problems
 Hypothesis: If we work to address PM, and prioritise
services and mechanisms that mitigate PM and that are
also effective against other attacks then we will be
doing the “right thing”
stephen.farrell@cs.tcd.ie 8/30
IETF (Re)Action
 Overall: snowdonia has re-energised folks to do
better on security and privacy in general (and not
solely in response to PM)
 Side meeting in Berlin @ IETF-87 (July 2013)
 Tech plenary, major discussion @ IETF-88 (Nov 2013)
 STRINT workshop before IETF-89 (Feb 2014) [RFC7687]
 Topic at many meetings/BoFs @ IETF-89 (July 2014)
 Seeing results from IETF-90 (Nov 2014) onwards...
 Unsurprisingly this is similar to the more broad
technical community reaction
stephen.farrell@cs.tcd.ie 9/30
IETF work related to PM
 RFC 7258/BCP188 published after major IETF LC debate – sets the basis for further
actions
 RFC 7435 defines “Opportunistic Security” - less gold-plating, more deployment
 IAB Statement on Internet Confidentiality: basically: encrypt everything!
 New working groups established:
 UTA: update BCPs on how to “Use TLS in Applications” - RFC7525
 DPRIVE: “DNS Privacy”- unthinkable before snowdonia RFC7626
 TCPINC: “TCP INCreased security”: tcpcrypt proposed two years earlier but rejected
 Mistakenly, including by me, as ack'd at mic @ IETF-88, bummer
 IAB re-factored security and privacy programme
 Developing PM threat model document
 Stuff not going so well
 Old-RFC privacy/PM review team – go back and see what needs fixing: moribund
 Endymail email list for discussion of ways IETF can help those working on new e2e
interpersonal messaging solutions: hard problem
stephen.farrell@cs.tcd.ie 10/30
PM is an Attack RFC 7258
 RFC7258/BCP188 says that all IETF work will consider PM
as an attack to be mitigated as part of our normal design
processes for all protocol development
 Note: this does not mean PM is always relevant nor that it's
always practical to mitigate PM via protocol mechanisms, but if
you can't, you need to be able to say why
 Took ~1000 emails to get rough consensus on that since
countering PM is not free
 Impacts on network management
 Some folks scared of unreasonable security/privacy nerd dominance
stephen.farrell@cs.tcd.ie 11/30
Opportunistic Security RFC 7435
 IETF modus operandi has (in practice) been to define mandatory to
implement security that works for higher security environments
• => often hard/expensive to deploy => often not used => cleartext often
sent even when better options exist
 Opportunistic Security (OS) aims to evaluate these trade-offs on a
connection-by-connection basis, explicitly allowing for e.g.
unauthenticated endpoints for confidentiality (open-channel key
exchange) as an option that is better than cleartext
 I (personally) hope that this concept is followed very often and is
fleshed out to the point where we end up with a new security
development approach that is based around OS
 Not there yet: TLS deprecation of RC4 was interesting because of differing
perspectives from web and mail folks about what conclusion to draw when
following the OS approach
stephen.farrell@cs.tcd.ie 12/30
OS example: Deprecating RC4
 RC4 past sell-by date: agreed by all
 For the web ~15% of https sites were using TLS/RC4 (FF 2014 measurement)
 When RC4 zapped 99% of those just picked a better option (AES, 3DES)
 SMTP+STARTTLS between MTAs
 There is a widely deployed MTA that only does RC4, 3DES is buggy and won't work (so I'm told)
 Zapping RC4 means emails will be sent in clear between MTAs when one is the buggy one
 So – which is better: deprecate RC4 entirely or add this and possibly other caveats?
 IETF rough consensus was to deprecate entirely, but some mail folks were in the rough
 Interesting example implying conclusion from following OS protocol design pattern
will depend on scope
 OS requires us each to figure out some kind of utility or objective function and where those
differ enough, different well meaning folks will reach different conclusions
 It is OK that it is harder to figure out what to do when following the OS approach
stephen.farrell@cs.tcd.ie 13/30
IAB Statement
• “We recommend that encryption be deployed
throughout the protocol stack since there is not a single
place within the stack where all kinds of communication
can be protected.
• The IAB urges protocol designers to design for
confidential operation by default. We strongly
encourage developers to include encryption in their
implementations, and to make them encrypted by
default. We similarly encourage network and service
operators to deploy encryption where it is not yet
deployed, and we urge firewall policy administrators to
permit encrypted traffic.”
• https://www.iab.org/2014/11/14/iab-statement-on-internet-confidentiality/
stephen.farrell@cs.tcd.ie 14/30
DNS Privacy
 DNSSEC provides integrity and origin authentication but
confidentiality/privacy was never considered a
requirement
 Since 2013 that has changed, IETF DPRIVE working group
was formed to tackle this issue
 Problem statement set out in RFC 7626
 QNAME minimisation (in RFC editor queue)
 TLS/TCP on port 853 between stub and recursive almost
done, DTLS/UDP equivalent in the works
 Work on recursive to authoritative starting
stephen.farrell@cs.tcd.ie 15/30
Lurk – Limited Use of Remote Keys
 All this lovely crypto changes how we can manage the network and
who gets to see what – we need to recognise that improving
security and privacy means changes to current n/w mgmt and
operations
 One outcome of MARNEW IAB/GSMA workshop on the topic of how to
deal with much more crypto in mobile networks
 One change is that CDNs are seeing much more use of TLS and
supporting that
 Would like to not have to give the CDN a private key (with a cert for
your name) in doing that
 LURK aims to see if we can keep the TLS server authentication
private key at the content owner while still allowing a CDN to serve
the content
 Birds of a Feather (BoF) meeting at April 2016 IETF Meeting
stephen.farrell@cs.tcd.ie 16/30
Other relevant IETF Things
 TLS 1.3 aiming for better handshake encryption properties and
learning from previous TLS problems in various ways
 HTTP/2.0, [RFC7540] the major deployment model for which seems
to be to run much much more HTTP traffic over TLS
 Extension to HTTP/2.0 defining opportunistic security way of
sending http URI schemed content over TLS
 Negatively: deprecate RC4 [RFC7465] in TLS, SSL3 [RFC7568]
 And since all this is IETF stuff, you can (and please do) join in and
help if you're willing and able – that's how to make it better!
 Even a small amount of good researcher input is hugely valuable (but you
need to be able to deal with a noisy environment;-)
 New Curves and deprecating old crypto (CURDLE WG)
 OPENPGP WG updating crypto
stephen.farrell@cs.tcd.ie 17/30
Non-IETF Things Relevant to IETF
 Crypto Forum Research Group (CFRG) in Internet Research
Task Force (IRTF)
 Goal: provide venue bridging academic crypto and Internet technical
community
 Curve25519, Curve448 [RFC7748]
 Chacha20/Poliy1305 AEAD construct [RFC7664]
 IEEE 802 have started work on privacy and are considering e.g.
MAC address randomisation
 Collaborating with IETF
 W3C TAG statement on “Securing the Web”
 Builds on RFC7258 and IAB statement
 https://www.w3.org/2001/tag/doc/web-https
 … there are loads more
stephen.farrell@cs.tcd.ie 18/30
Longer Term Factors at Play
 Spooks will be spooks (whether govt. or private sector)
 Privacy invasive commerce (legitimate and not)
 Legal accountability mechanisms (courts of various kinds)
 Small+good things can transition to (big+bad, dead or living-dead)
 Badly-informed decision makers/commentators/twits
 Government regulation of business (e.g. Data Protection Agencies)
 Commercial reaction to user privacy requirements (even evil corporate behemoths have
many good folks working for 'em)
 NGOs working to enhance privacy (and get attention)
 Constantly refreshed naivety of yet another generation of clean-slaters (producing
occasional good ideas)
 Guilt-by-association is a fallacy no matter who makes the error
 Technical privacy enhancing/enforcement mechanisms (when those work)
stephen.farrell@cs.tcd.ie 19/30
So what else?
 We've outlined the problem
 We've seen there's work ongoing
 Most addressing relatively low-hanging fruit in a sense
 Still hard to get agreed/done/finished/deployed
 Esp. deployed, which is REQUIRED for this to be at all
useful – Fantasy is of no use here
 But almost are fairly obvious things to do
 Encrypt more, do more/better security, yay!
 So how about a hard problem or two?
stephen.farrell@cs.tcd.ie 20/30
Hard Problem #1
Targeted Monitoring or so-called “LI”
 Many people against PM, but ok with targeted monitoring (e.g. wiretap under warrant), sometimes called “lawful
interception” (LI)
 Requirements for LI from 19th century, (IMO)
 LI deployments can be, and have been, used for PM
 21st century Internet is not amenable to those requirements
• => tension, tussle, cases like Apple/FBI
 The “right thing”™ : openly evaluate requirements taking equal account of Internet-scale interoperability, security and privacy
alongside law enforcement needs
 I doubt it'll happen, for various reasons
 More on this: “Requirements Analysis Required – otherwise Targeted Monitoring Enables Pervasive Monitoring,” March 2016
IEEE Computer Magazine
 http://www.qmags.com/R/?i=3110a8&e=3193789&doi=60830608&uk=2FE1161B1640F7E013144D46111630BBC52FF1
4A391.htm
 https://down.dsg.cs.tcd.ie/cpus/ (preprint/extended version of above)
stephen.farrell@cs.tcd.ie 21/30
Hard Problem #2
Collaborative Corporate Collection
 Advertising-driven or captured-user walled-gardens are inimical to
privacy; always will be; ensnare even educated users; almost
ubiquitous; lead corporations to “collect it all,” even more than TLAs
 Non-solutions include: user education, FOSS, legislation, cleverer
crypto
 Someone has to pay to keep the lights on
 We, the technical community, are bad actors here (along with
advertisers)
 How to balance toxicity of data vs. data-mining benefits?
 How to convince browsers/web-sites to not enable ad-trackers?
 I have no idea how to get to substantive improvement
 But if we don't, PM will continue and accelerate
 TLAs can convince or coerce companies into collaborating
stephen.farrell@cs.tcd.ie 22/30
What to do? (1)
 Discuss the issue openly in whatever fora are relevant
for you, (it's not a secret:-)
 Consider privacy issues in your networks and the data
you make available
 Avoid logging potentially sensitive data if you can
 That means more work! But you should do it
 Turn on crypto wherever you can
 Consider the OS approach to make that easier
stephen.farrell@cs.tcd.ie 23/30
What to do? (2)
 When deploying stuff:
 Turn on crypto – ciphertext should be base assumption for
new things
 Data minimisation – don't use new stuff without
considering privacy implications
 Help with better implementations
 https://cryptech.is/ and similar
 Encourage target diversity - Don't all use the same
services all the time
 Even if you're not a huge population, you can start trends
stephen.farrell@cs.tcd.ie 24/30
What to do? (3)
 Don't demand the impossible (and do nothing in the
meantime)!
 Encourage clean-slate work, but don't imagine it can all be
deployed now – and only deployed things help
 Agitate (if that's your kind of thing:-)
 Consider privacy trade-offs when deploying e.g. IDS,
anti-spam or malware detection technologies
 Go and be responsible network operators and take
the broader implications of your work into account
before, while and after doing it
stephen.farrell@cs.tcd.ie 25/30
Summary
 IETF has consensus PM is an attack (RFC7258) and is
working that problem, as are others
 We all should consider how we can work to make PM
harder, since those doing it will not just stop
 When/if societies do decide that PM is as bad as it is,
then the technical community should have in place
the tools to effect that decision
stephen.farrell@cs.tcd.ie 26/30
stephen.farrell@cs.tcd.ie 27/30
Thanks
Offline questions welcome too
stephen.farrell@cs.tcd.ie
These slides:
(W) https://down.dsg.cs.tcd.ie/ndss/
More References (1)
 General IETF stuff:
 https://www.ietf.org/
 https://www.ietf.org/newcomers.html
 Working group details for WG <foo>:
 https://tools.ietf.org/wg/<foo> - links to charter, docs, mail
archive etc
 Suggested <foo> values:
 tls, dprive, tcpinc, httpbis, uta
stephen.farrell@cs.tcd.ie 28/30
References (2)
 Relevant IETF non-wg lists:
 All of them (loads): https://www.ietf.org/list/nonwg.html
 Perpass – triage list for PM related stuff:
 https://www.ietf.org/mailman/listinfo/perpass
 Secruity area list (saag)
 https://www.ietf.org/mailman/listinfo/perpass
 Possible e2e interpersonal messaging discussion
 https://www.ietf.org/mailman/listinfo/endymail
 General privacy discussion
 https://www.ietf.org/mailman/listinfo/ietf-privacy
 IRTF:
 https://www.irtf.org/
 IRTF Crypto Research Forum Goup: https://irtf.org/cfrg
stephen.farrell@cs.tcd.ie 29/30
References (3)
 Videos (ISOC hint:-)
 IETF youtube stuff in general
 https://www.youtube.com/user/ietf/videos?sort=p&view=0&flow=gri
d
 Nov'13 IETF technical plenary video
 https://www.youtube.com/watch?v=oV71hhEpQ20
 Dan york videos 5 minute summaries of IETF meetings
 There are loads but these are about PM
 https://www.youtube.com/watch?v=HG54EsHYKr0
 https://www.youtube.com/watch?v=fbjs_6Mz-6s
 STRINT workshop (RFC7687)
 Has all 66 position papers
 https://www.w3.org/2014/strint/
stephen.farrell@cs.tcd.ie 30/30
References (4)
 IEEE Internet Computing “soapbox” column on why
PM is bad:
 http://www.computer.org/csdl/mags/ic/2014/04/mic2014
040004.pdf
 Some Internet drafts not referenced above:
 PM Threat model
 https://tools.ietf.org/html/draft-iab-privsec-confidentiality-threat
 DNS Privacy problem statement`
 RFC7626
 “Modern” TLS best current practices
 RFC7525
stephen.farrell@cs.tcd.ie 31/30
Thanks to all our sponsors and exhibitors

More Related Content

PPTX
Software defined networking - huawei - Networkshop44
PPTX
The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44
PPTX
Development of Jisc security programme - Networkshop44
PPTX
Security and Privacy in Cloud Computing - a High-level view
PPTX
ION Malta - Introduction to DNSSEC
PPTX
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
PPTX
Greenbone vulnerability assessment - Networkshop44
PPTX
Cybersecurity by the numbers
Software defined networking - huawei - Networkshop44
The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44
Development of Jisc security programme - Networkshop44
Security and Privacy in Cloud Computing - a High-level view
ION Malta - Introduction to DNSSEC
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Greenbone vulnerability assessment - Networkshop44
Cybersecurity by the numbers

What's hot (20)

PPTX
Privacy in cloud computing
PPTX
ION Malta - DANE: The Future of TLS
PDF
Data Center Trends And Network Security Impact
PDF
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
PDF
Nas nie zaatakują!
PDF
Introduction to Operational Technology 0.1
PPTX
San Francisco Fog Computing Meetup
PDF
WHOIS Database for Incident Response & Handling
PDF
Privacy and security in the cloud Challenges and solutions for our future inf...
PDF
Ramin elahi fog_computing_ecosystem_final_dec22_updated
PDF
Solution BluePrint v. Smart Parking
PDF
Security Issues of IoT with Fog
DOCX
Cloud computing assignment
PDF
Two years of good MANRS
PPTX
Netskope Threat Labs: Cloud As an Attack Vector
PPTX
Cloud computing
PDF
ION Hangzhou - Why Deploy DNSSEC?
PDF
Palo Alto Networks - Magnifier
PDF
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
PPTX
Defcon 27 - The Future of Command and Control
Privacy in cloud computing
ION Malta - DANE: The Future of TLS
Data Center Trends And Network Security Impact
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Nas nie zaatakują!
Introduction to Operational Technology 0.1
San Francisco Fog Computing Meetup
WHOIS Database for Incident Response & Handling
Privacy and security in the cloud Challenges and solutions for our future inf...
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Solution BluePrint v. Smart Parking
Security Issues of IoT with Fog
Cloud computing assignment
Two years of good MANRS
Netskope Threat Labs: Cloud As an Attack Vector
Cloud computing
ION Hangzhou - Why Deploy DNSSEC?
Palo Alto Networks - Magnifier
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Defcon 27 - The Future of Command and Control
Ad

Viewers also liked (20)

PPTX
Next gen insight networkshop44
PPTX
Eduroam in portsmouth's wireless city - Networkshop44
PPTX
Managing and monitoring large scale data transfers - Networkshop44
PPTX
Jisc and janet network updates from network operations, operational services ...
PPTX
End to end performance - Networkshop44
PPTX
Find out about Jisc - Networkshop44 2016
PPTX
Edupert best practices in supporting end users - Networkshop44
PPTX
Eduroam workshop nic mitev probes - networkshop44
PPTX
Jisc update janet6 upgrade networkshop44
PPTX
Whats new in ict law - Networkshop44
PPTX
End to end performance networkshop44
PPTX
Welcome to Networkshop44 - Networkshop44
PPTX
Eduroam seminar - Networkshop44 2016
PPTX
Network performance lessons from the coal face - Networkshop44
PPTX
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
PPTX
Eduroam workshop nic mitev proactive learning - networkshop44
PPTX
Hyper efficient data centres – key ingredient intelligence networkshop44
PPTX
Eduroam workshop nic mitev loughborough uni - networkshop44
PPTX
Multiprotocol label switching (mpls) - Networkshop44
PPTX
Dev ops, noops or hypeops - Networkshop44
Next gen insight networkshop44
Eduroam in portsmouth's wireless city - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44
Jisc and janet network updates from network operations, operational services ...
End to end performance - Networkshop44
Find out about Jisc - Networkshop44 2016
Edupert best practices in supporting end users - Networkshop44
Eduroam workshop nic mitev probes - networkshop44
Jisc update janet6 upgrade networkshop44
Whats new in ict law - Networkshop44
End to end performance networkshop44
Welcome to Networkshop44 - Networkshop44
Eduroam seminar - Networkshop44 2016
Network performance lessons from the coal face - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Eduroam workshop nic mitev proactive learning - networkshop44
Hyper efficient data centres – key ingredient intelligence networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44
Multiprotocol label switching (mpls) - Networkshop44
Dev ops, noops or hypeops - Networkshop44
Ad

Similar to Dealing with pervasive monitoring - Networkshop44 (20)

PDF
Networking in the Penumbra presented by Geoff Huston at NZNOG
PPT
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
PDF
AINTEC 2023: Networking in the Penumbra!
PDF
Secure encryption in a wiretapped future
PPT
CTO-CybersecurityForum-2010-RonWilliams
PDF
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
PDF
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
PPTX
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
PPTX
Network security by sandhya
PPTX
gkk_2021123rg5hSecurity essentials domain 2
PPTX
gkk20211e4djwew4dSecurity essentials domain 2
PPTX
gkkSecurity essentials domain 2
PPTX
Topic22
PPT
Dmk bo2 k8_ccc
PPT
Security chapter6
PPT
Security - ch5.ppt
PPT
8.X Sec & I Pv6
PDF
(eBook PDF) Corporate Computer Security 4th Edition by Randall J. Boyle
PPTX
Securityic2
PPT
lec security
Networking in the Penumbra presented by Geoff Huston at NZNOG
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
AINTEC 2023: Networking in the Penumbra!
Secure encryption in a wiretapped future
CTO-CybersecurityForum-2010-RonWilliams
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Network security by sandhya
gkk_2021123rg5hSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials domain 2
gkkSecurity essentials domain 2
Topic22
Dmk bo2 k8_ccc
Security chapter6
Security - ch5.ppt
8.X Sec & I Pv6
(eBook PDF) Corporate Computer Security 4th Edition by Randall J. Boyle
Securityic2
lec security

More from Jisc (20)

PPTX
Strengthening open access through collaboration: building connections with OP...
PPTX
Andrew-Brown-JUSP-showcase-20240730.pptx
PPTX
JUSP Showcase - Rebuilding Data presentation
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
FE Accessibility training matrix partnership - information session
PPTX
Procuring a research management system: why is it so hard?
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
How libraries can support authors with open access requirements for UKRI fund...
PPTX
Supporting (UKRI) OA monographs at Salford.pptx
PPTX
The approach at University of Liverpool.pptx
PPTX
Jisc's value to HE: the University of Sheffield
PPTX
Towards a code of practice for AI in AT.pptx
PPTX
Jamworks pilot and AI at Jisc (20/03/2024)
PPTX
Wellbeing inclusion and digital dystopias.pptx
PPTX
Accessible Digital Futures project (20/03/2024)
PPTX
Procuring digital preservation CAN be quick and painless with our new dynamic...
PPTX
International students’ digital experience: understanding and mitigating the ...
PPTX
Digital Storytelling Community Launch!.pptx
PPTX
Open Access book publishing understanding your options (1).pptx
PPTX
Scottish Universities Press supporting authors with requirements for open acc...
Strengthening open access through collaboration: building connections with OP...
Andrew-Brown-JUSP-showcase-20240730.pptx
JUSP Showcase - Rebuilding Data presentation
Adobe Express Engagement Webinar (Delegate).pptx
FE Accessibility training matrix partnership - information session
Procuring a research management system: why is it so hard?
Adobe Express Engagement Webinar (Delegate).pptx
How libraries can support authors with open access requirements for UKRI fund...
Supporting (UKRI) OA monographs at Salford.pptx
The approach at University of Liverpool.pptx
Jisc's value to HE: the University of Sheffield
Towards a code of practice for AI in AT.pptx
Jamworks pilot and AI at Jisc (20/03/2024)
Wellbeing inclusion and digital dystopias.pptx
Accessible Digital Futures project (20/03/2024)
Procuring digital preservation CAN be quick and painless with our new dynamic...
International students’ digital experience: understanding and mitigating the ...
Digital Storytelling Community Launch!.pptx
Open Access book publishing understanding your options (1).pptx
Scottish Universities Press supporting authors with requirements for open acc...

Recently uploaded (20)

PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Classroom Observation Tools for Teachers
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Types and Its function , kingdom of life
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Introduction to Building Materials
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Trump Administration's workforce development strategy
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
RMMM.pdf make it easy to upload and study
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
IGGE1 Understanding the Self1234567891011
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Computing-Curriculum for Schools in Ghana
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Classroom Observation Tools for Teachers
Complications of Minimal Access Surgery at WLH
Cell Types and Its function , kingdom of life
Final Presentation General Medicine 03-08-2024.pptx
Introduction to Building Materials
Indian roads congress 037 - 2012 Flexible pavement
Trump Administration's workforce development strategy
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
RMMM.pdf make it easy to upload and study
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
IGGE1 Understanding the Self1234567891011
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
UNIT III MENTAL HEALTH NURSING ASSESSMENT
What if we spent less time fighting change, and more time building what’s rig...
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Computing-Curriculum for Schools in Ghana
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

Dealing with pervasive monitoring - Networkshop44

  • 1. Pervasive Monitoring - 2.5 years in Stephen Farrell
  • 3. Talk Outline  Me: Trinity College Dublin, topics: security/privacy/DTN;  IETF security area director (but not speaking for IETF)  Expecting wisdom? Vision? Apologies:-)  A quick reminder of how we got here...  Good stuff people are doing or have done  Some harder questions arising  What should we all be doing about this?  These slides https://down.dsg.cs.tcd.ie/n44/  More refs at end [email protected] 3/30
  • 4. It's an attack  The actions of NSA and their partners (nation-state or corporate, coerced or not) are a multi-faceted form of attack, or are indistinguishable from that  Not unique, others are likely doing the same... or will  The scale arguably makes this an example of a new pervasive monitoring threat model that is neither purely passive nor a classic Man-in-the-Middle and that we have not normally considered in protocol design, implementation or deployment  A purely technical response will not “solve the problem” but we should treat an attack as we usually do and try mitigate it [email protected] 4/30 Nov 2013 IETF Technical Plenary (W) https://www.ietf.org/proceedings/88/technical-plenary.html
  • 5. What have we learned?  We've mostly learned the unexpectedly broad scope and scale of Intelligence agency snooping  If there is a way to get at data or meta-data, then they are trying or doing it, including “offensively”  “Offensive” weapon foot-gun offends common sense  Send the bytes of your “offensive” weapon out and they will be used against your customers  If there is >1 way, they'll try/do them all  “Collection” fallacy (and others) happily trotted out [email protected] 5/30
  • 6. What else have we learned?  Partial timelines:  https://en.wikipedia.org/wiki/Global_surveillance_disclosure  https://www.theguardian.com/us-news/nsa  My favourite:  https://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images- internet-yahoo  My most interesting (politically):  http://www.scmagazineuk.com/gchq-faces-new-belgacom-hack- allegations/article/388531/  My most interesting (technically):  The short-range radar thing  https://en.wikipedia.org/wiki/NSA_ANT_catalog  Recent (March 2016) survey (US focused)  https://www.brennancenter.org/sites/default/files/publications/Overseas_Surveilla nce_in_an_Interconnected_World.pdf [email protected] 6/30
  • 7. A Definition • Pervasive Monitoring (PM) is widespread (and often covert) surveillance through intrusive gathering of protocol artefacts, including application content, or protocol meta-data such as headers. Active or passive wiretaps and traffic analysis, (e.g., correlation, timing or measuring packet sizes), or subverting the cryptographic keys used to secure protocols can also be used as part of pervasive monitoring. PM is distinguished by being indiscriminate and very large-scale, rather than by introducing new types of technical compromise. [email protected] 7/30 From RFC7258/BCP188: “Pervasive Monitoring is an Attack”
  • 8. PM is not everything  PM is far from the only security or privacy issue on which we need to work  Spam, malware, DDoS, …  But mitigations for PM can also help a lot with other problems  Hypothesis: If we work to address PM, and prioritise services and mechanisms that mitigate PM and that are also effective against other attacks then we will be doing the “right thing” [email protected] 8/30
  • 9. IETF (Re)Action  Overall: snowdonia has re-energised folks to do better on security and privacy in general (and not solely in response to PM)  Side meeting in Berlin @ IETF-87 (July 2013)  Tech plenary, major discussion @ IETF-88 (Nov 2013)  STRINT workshop before IETF-89 (Feb 2014) [RFC7687]  Topic at many meetings/BoFs @ IETF-89 (July 2014)  Seeing results from IETF-90 (Nov 2014) onwards...  Unsurprisingly this is similar to the more broad technical community reaction [email protected] 9/30
  • 10. IETF work related to PM  RFC 7258/BCP188 published after major IETF LC debate – sets the basis for further actions  RFC 7435 defines “Opportunistic Security” - less gold-plating, more deployment  IAB Statement on Internet Confidentiality: basically: encrypt everything!  New working groups established:  UTA: update BCPs on how to “Use TLS in Applications” - RFC7525  DPRIVE: “DNS Privacy”- unthinkable before snowdonia RFC7626  TCPINC: “TCP INCreased security”: tcpcrypt proposed two years earlier but rejected  Mistakenly, including by me, as ack'd at mic @ IETF-88, bummer  IAB re-factored security and privacy programme  Developing PM threat model document  Stuff not going so well  Old-RFC privacy/PM review team – go back and see what needs fixing: moribund  Endymail email list for discussion of ways IETF can help those working on new e2e interpersonal messaging solutions: hard problem [email protected] 10/30
  • 11. PM is an Attack RFC 7258  RFC7258/BCP188 says that all IETF work will consider PM as an attack to be mitigated as part of our normal design processes for all protocol development  Note: this does not mean PM is always relevant nor that it's always practical to mitigate PM via protocol mechanisms, but if you can't, you need to be able to say why  Took ~1000 emails to get rough consensus on that since countering PM is not free  Impacts on network management  Some folks scared of unreasonable security/privacy nerd dominance [email protected] 11/30
  • 12. Opportunistic Security RFC 7435  IETF modus operandi has (in practice) been to define mandatory to implement security that works for higher security environments • => often hard/expensive to deploy => often not used => cleartext often sent even when better options exist  Opportunistic Security (OS) aims to evaluate these trade-offs on a connection-by-connection basis, explicitly allowing for e.g. unauthenticated endpoints for confidentiality (open-channel key exchange) as an option that is better than cleartext  I (personally) hope that this concept is followed very often and is fleshed out to the point where we end up with a new security development approach that is based around OS  Not there yet: TLS deprecation of RC4 was interesting because of differing perspectives from web and mail folks about what conclusion to draw when following the OS approach [email protected] 12/30
  • 13. OS example: Deprecating RC4  RC4 past sell-by date: agreed by all  For the web ~15% of https sites were using TLS/RC4 (FF 2014 measurement)  When RC4 zapped 99% of those just picked a better option (AES, 3DES)  SMTP+STARTTLS between MTAs  There is a widely deployed MTA that only does RC4, 3DES is buggy and won't work (so I'm told)  Zapping RC4 means emails will be sent in clear between MTAs when one is the buggy one  So – which is better: deprecate RC4 entirely or add this and possibly other caveats?  IETF rough consensus was to deprecate entirely, but some mail folks were in the rough  Interesting example implying conclusion from following OS protocol design pattern will depend on scope  OS requires us each to figure out some kind of utility or objective function and where those differ enough, different well meaning folks will reach different conclusions  It is OK that it is harder to figure out what to do when following the OS approach [email protected] 13/30
  • 14. IAB Statement • “We recommend that encryption be deployed throughout the protocol stack since there is not a single place within the stack where all kinds of communication can be protected. • The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default. We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic.” • https://www.iab.org/2014/11/14/iab-statement-on-internet-confidentiality/ [email protected] 14/30
  • 15. DNS Privacy  DNSSEC provides integrity and origin authentication but confidentiality/privacy was never considered a requirement  Since 2013 that has changed, IETF DPRIVE working group was formed to tackle this issue  Problem statement set out in RFC 7626  QNAME minimisation (in RFC editor queue)  TLS/TCP on port 853 between stub and recursive almost done, DTLS/UDP equivalent in the works  Work on recursive to authoritative starting [email protected] 15/30
  • 16. Lurk – Limited Use of Remote Keys  All this lovely crypto changes how we can manage the network and who gets to see what – we need to recognise that improving security and privacy means changes to current n/w mgmt and operations  One outcome of MARNEW IAB/GSMA workshop on the topic of how to deal with much more crypto in mobile networks  One change is that CDNs are seeing much more use of TLS and supporting that  Would like to not have to give the CDN a private key (with a cert for your name) in doing that  LURK aims to see if we can keep the TLS server authentication private key at the content owner while still allowing a CDN to serve the content  Birds of a Feather (BoF) meeting at April 2016 IETF Meeting [email protected] 16/30
  • 17. Other relevant IETF Things  TLS 1.3 aiming for better handshake encryption properties and learning from previous TLS problems in various ways  HTTP/2.0, [RFC7540] the major deployment model for which seems to be to run much much more HTTP traffic over TLS  Extension to HTTP/2.0 defining opportunistic security way of sending http URI schemed content over TLS  Negatively: deprecate RC4 [RFC7465] in TLS, SSL3 [RFC7568]  And since all this is IETF stuff, you can (and please do) join in and help if you're willing and able – that's how to make it better!  Even a small amount of good researcher input is hugely valuable (but you need to be able to deal with a noisy environment;-)  New Curves and deprecating old crypto (CURDLE WG)  OPENPGP WG updating crypto [email protected] 17/30
  • 18. Non-IETF Things Relevant to IETF  Crypto Forum Research Group (CFRG) in Internet Research Task Force (IRTF)  Goal: provide venue bridging academic crypto and Internet technical community  Curve25519, Curve448 [RFC7748]  Chacha20/Poliy1305 AEAD construct [RFC7664]  IEEE 802 have started work on privacy and are considering e.g. MAC address randomisation  Collaborating with IETF  W3C TAG statement on “Securing the Web”  Builds on RFC7258 and IAB statement  https://www.w3.org/2001/tag/doc/web-https  … there are loads more [email protected] 18/30
  • 19. Longer Term Factors at Play  Spooks will be spooks (whether govt. or private sector)  Privacy invasive commerce (legitimate and not)  Legal accountability mechanisms (courts of various kinds)  Small+good things can transition to (big+bad, dead or living-dead)  Badly-informed decision makers/commentators/twits  Government regulation of business (e.g. Data Protection Agencies)  Commercial reaction to user privacy requirements (even evil corporate behemoths have many good folks working for 'em)  NGOs working to enhance privacy (and get attention)  Constantly refreshed naivety of yet another generation of clean-slaters (producing occasional good ideas)  Guilt-by-association is a fallacy no matter who makes the error  Technical privacy enhancing/enforcement mechanisms (when those work) [email protected] 19/30
  • 20. So what else?  We've outlined the problem  We've seen there's work ongoing  Most addressing relatively low-hanging fruit in a sense  Still hard to get agreed/done/finished/deployed  Esp. deployed, which is REQUIRED for this to be at all useful – Fantasy is of no use here  But almost are fairly obvious things to do  Encrypt more, do more/better security, yay!  So how about a hard problem or two? [email protected] 20/30
  • 21. Hard Problem #1 Targeted Monitoring or so-called “LI”  Many people against PM, but ok with targeted monitoring (e.g. wiretap under warrant), sometimes called “lawful interception” (LI)  Requirements for LI from 19th century, (IMO)  LI deployments can be, and have been, used for PM  21st century Internet is not amenable to those requirements • => tension, tussle, cases like Apple/FBI  The “right thing”™ : openly evaluate requirements taking equal account of Internet-scale interoperability, security and privacy alongside law enforcement needs  I doubt it'll happen, for various reasons  More on this: “Requirements Analysis Required – otherwise Targeted Monitoring Enables Pervasive Monitoring,” March 2016 IEEE Computer Magazine  http://www.qmags.com/R/?i=3110a8&e=3193789&doi=60830608&uk=2FE1161B1640F7E013144D46111630BBC52FF1 4A391.htm  https://down.dsg.cs.tcd.ie/cpus/ (preprint/extended version of above) [email protected] 21/30
  • 22. Hard Problem #2 Collaborative Corporate Collection  Advertising-driven or captured-user walled-gardens are inimical to privacy; always will be; ensnare even educated users; almost ubiquitous; lead corporations to “collect it all,” even more than TLAs  Non-solutions include: user education, FOSS, legislation, cleverer crypto  Someone has to pay to keep the lights on  We, the technical community, are bad actors here (along with advertisers)  How to balance toxicity of data vs. data-mining benefits?  How to convince browsers/web-sites to not enable ad-trackers?  I have no idea how to get to substantive improvement  But if we don't, PM will continue and accelerate  TLAs can convince or coerce companies into collaborating [email protected] 22/30
  • 23. What to do? (1)  Discuss the issue openly in whatever fora are relevant for you, (it's not a secret:-)  Consider privacy issues in your networks and the data you make available  Avoid logging potentially sensitive data if you can  That means more work! But you should do it  Turn on crypto wherever you can  Consider the OS approach to make that easier [email protected] 23/30
  • 24. What to do? (2)  When deploying stuff:  Turn on crypto – ciphertext should be base assumption for new things  Data minimisation – don't use new stuff without considering privacy implications  Help with better implementations  https://cryptech.is/ and similar  Encourage target diversity - Don't all use the same services all the time  Even if you're not a huge population, you can start trends [email protected] 24/30
  • 25. What to do? (3)  Don't demand the impossible (and do nothing in the meantime)!  Encourage clean-slate work, but don't imagine it can all be deployed now – and only deployed things help  Agitate (if that's your kind of thing:-)  Consider privacy trade-offs when deploying e.g. IDS, anti-spam or malware detection technologies  Go and be responsible network operators and take the broader implications of your work into account before, while and after doing it [email protected] 25/30
  • 26. Summary  IETF has consensus PM is an attack (RFC7258) and is working that problem, as are others  We all should consider how we can work to make PM harder, since those doing it will not just stop  When/if societies do decide that PM is as bad as it is, then the technical community should have in place the tools to effect that decision [email protected] 26/30
  • 27. [email protected] 27/30 Thanks Offline questions welcome too [email protected] These slides: (W) https://down.dsg.cs.tcd.ie/ndss/
  • 28. More References (1)  General IETF stuff:  https://www.ietf.org/  https://www.ietf.org/newcomers.html  Working group details for WG <foo>:  https://tools.ietf.org/wg/<foo> - links to charter, docs, mail archive etc  Suggested <foo> values:  tls, dprive, tcpinc, httpbis, uta [email protected] 28/30
  • 29. References (2)  Relevant IETF non-wg lists:  All of them (loads): https://www.ietf.org/list/nonwg.html  Perpass – triage list for PM related stuff:  https://www.ietf.org/mailman/listinfo/perpass  Secruity area list (saag)  https://www.ietf.org/mailman/listinfo/perpass  Possible e2e interpersonal messaging discussion  https://www.ietf.org/mailman/listinfo/endymail  General privacy discussion  https://www.ietf.org/mailman/listinfo/ietf-privacy  IRTF:  https://www.irtf.org/  IRTF Crypto Research Forum Goup: https://irtf.org/cfrg [email protected] 29/30
  • 30. References (3)  Videos (ISOC hint:-)  IETF youtube stuff in general  https://www.youtube.com/user/ietf/videos?sort=p&view=0&flow=gri d  Nov'13 IETF technical plenary video  https://www.youtube.com/watch?v=oV71hhEpQ20  Dan york videos 5 minute summaries of IETF meetings  There are loads but these are about PM  https://www.youtube.com/watch?v=HG54EsHYKr0  https://www.youtube.com/watch?v=fbjs_6Mz-6s  STRINT workshop (RFC7687)  Has all 66 position papers  https://www.w3.org/2014/strint/ [email protected] 30/30
  • 31. References (4)  IEEE Internet Computing “soapbox” column on why PM is bad:  http://www.computer.org/csdl/mags/ic/2014/04/mic2014 040004.pdf  Some Internet drafts not referenced above:  PM Threat model  https://tools.ietf.org/html/draft-iab-privsec-confidentiality-threat  DNS Privacy problem statement`  RFC7626  “Modern” TLS best current practices  RFC7525 [email protected] 31/30
  • 32. Thanks to all our sponsors and exhibitors