Internet DRAFT - draft-crocker-strint-workshop-messaging
draft-crocker-strint-workshop-messaging
Network Working Group D. Crocker
Internet-Draft Brandenburg InternetWorking
Intended status: Informational P. Resnick
Expires: July 20, 2014 Qualcomm Technologies, Inc.
January 16, 2014
STRINT Workshop Position Paper: Levels of Opportunistic Privacy
Protection for Messaging-Oriented Architectures
draft-crocker-strint-workshop-messaging-00
Abstract
Given a concern for pervasive monitoring, messaging information
needing protection includes primary payload, descriptive meta-data,
and traffic-related analysis. Complete protection against pervasive
monitoring (PM), for traffic through complex handling sequences, has
not yet been achieved reliably in real-world operation.
Consequently, it is reasonable to consider a range of mechanisms, for
protecting differing amounts of information and against monitoring of
different kinds. Although channel-based encryption can be helpful,
it is not sufficient. This paper considers pursuing different levels
of end-to-end protection, referencing examples of component
mechanisms that already have encouraging field experience.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on July 20, 2014.
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
Crocker & Resnick Expires July 20, 2014 [Page 1]
Internet-Draft STRINT: Opportunistic Messaging Privacy January 2014
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
1. Background
Concern for pervasive monitoring motivates the deployment of strong
mechanisms that will protect against intrusive disclosure of
information. Information needing protection can be primary payload,
descriptive meta-data, or traffic-related analysis. Most Internet
services operate according to a relatively simple, two-party client/
server model, with the server holding primary data and performing
primary actions, and the user having a direct relationship with the
service being provided. For these arrangements, concerns over
privacy violations tend to focus on wiretapping of the data transfer
mechanism and on server compromise.
In contrast messaging architectures, such as for email [MAILARCH],
can be highly distributed, with any number of application-level
store-and-forward intermediaries. This can produce complex sequences
through many independent administrative authorities, possibly unknown
to either the user or the recipient. Because multi-hop store-and-
forward messaging can involve several systems not under the
administrative control of either end of the messaging transaction,
compromise of any of the intermediate systems can expose messages to
monitoring past the first, or before the last, hop. Therefore end-
to-end encryption is still highly desirable. Key distribution and
validation is one of the greatest impediments to deployment.
Current multi-hop store-and-forward messaging on the Internet uses
primarily two security technologies:
1. Channel encryption between the submitter and its submission
server and final recipient and its receiving server,
respectively, that encryption generally relying on CAs for
authentication; and
2. End-to-end content encryption that relies on pre-authenticated
certificates available to the end-points.
The former is used, but does not provide sufficient protection
against certain kinds of pervasive monitoring, and the latter is
Crocker & Resnick Expires July 20, 2014 [Page 2]
Internet-Draft STRINT: Opportunistic Messaging Privacy January 2014
rarely used because of deployment and use barriers. More
opportunistic mechanisms might have a higher likelihood of
deployment, with minimal effect on services, and therefore should be
attempted. Further if these opportunistic mechanisms do gain
success, they can be used for further minimization of some forms of
abuse.
Complete protection against pervasive monitoring (PM), for traffic
through complex handling sequences, has not yet been achieved
reliably in real-world operation. Consequently, it is reasonable to
consider a range of mechanisms, for protecting differing amounts of
information and against monitoring of different kinds. The premises
are that one or more of these might prove more effective than others
and that some protection is better than none.
Given the scale and urgency of community need for this protection,
mechanisms should be based on established technologies, where
possible. While innovation is needed, it should be kept as modest as
possible. So the major challenge should be system design, rather
than component invention, where possible and practical.
There are four types of data to be considered for protection in a
distributed messaging architecture:
o Message Content
o Header Content
o Envelope meta-data
o Handling meta-data
Message content is considered the primary payload; for email this is
the body of the message. However messaging often contains additional
content in a header, such as the names and addresses of authors and
recipient, content summary, such as a Subject field, date of posting,
and so on. Envelope meta-data is the information used by the transit
service, including recipient and return addresses. Handling
information is created during transit, such as for recording
processing tags by intermediaries. The placement of these bits of
information can vary, so that distinguishing among them can sometimes
be confusing. As an example email relay handling meta-data is placed
into the message header.
Almost all efforts to protect messages have focused on the primary
message content, with two well-known capabilities being standardized.
[OPENPGP][SMIME] However after twenty-five years of these efforts to
Crocker & Resnick Expires July 20, 2014 [Page 3]
Internet-Draft STRINT: Opportunistic Messaging Privacy January 2014
protect messages that are in transit, nearly all such traffic is
still sent in the clear.
In the absence of a success scenario for end-to-end payload privacy
protection, it is not possible to be certain which barriers are
critical, nor how to overcome them. In current discussions, the
primary culprits are believed to be key administration and end user
interface design and performance complexity. Both are deemed to
require too much human effort, and a common view is to essentially
remove humans from needing to configure their services or choose to
use them.
Channel encryption is low-hanging fruit when it comes to messaging
security, though it only offers minimal protections against pervasive
monitoring in its current use. Right now, messaging-related channel
encryption is almost exclusively used between end clients and their
directly-associated servers, mostly for purposes of protecting the
login credentials from monitoring. It does result in clear message
contents also being protected from snooping on the channel between
the end client and server, and it protects envelope information
(which is not otherwise protected by end-to-end content encryption.)
However this protection only operates for the first and last message
hops and leaves intermediate hops unprotected. So the addition of
channel security at every hop is still desirable. Authentication can
be recorded in the envelope if it takes place, presumably in a way
that allows the recipient to confirm that the authentication took
place, but authentication is not necessary for a large increase in
security. For intermediate hops opportunistic encryption would be a
significant improvement and would be deemed sufficient for most
cases. The intermediate servers can simply do key exchange in-band.
2. Incremental End-to-End Protection
Channel encryption can not protect against some of the PM activities
that have been documented. So the more challenging concern is
protection against collaborating or compromised intermediate nodes
and even source and destination servers. Ideally protection
therefore must be end-to-end, defined in terms of the author's and
recipient's independent user agents. The difficulty of achieving
this is exacerbated by the degree of existing Internet messaging
activity that has all user agent behavior on, or controlled by, end-
system web servers, rather than by independent software that is
solely under the control of the author or recipient. Hence the best
end-to-end protection that will be achievable for many users is
between originating server and receiving server.
This highlights the need for incremental mechanisms that provide
increasing protection. Greater user independence should be able to
Crocker & Resnick Expires July 20, 2014 [Page 4]
Internet-Draft STRINT: Opportunistic Messaging Privacy January 2014
permit greater user protection. Another benefit of this incremental
approach is that it is likely to provide some useful protection while
still permitting exposure information necessary to legitimate
management. Of course, balancing between protecting against
problematic monitoring and facilitating legitimate monitoring
(management) requires agreement on the trade-offs and explicit
choices amongst them. The discussion and agreement remain an open
and challenging task.
An observation about focusing on PM protection is that use of
encryption for that purpose does not necessarily carry the usual,
accompanying requirement for strong authentication of one or both
principals in the interaction. In the extreme, this might mean that
typical man-in-the-middle scenarios are not a concern, but it also
can mean that authentication related to an agent -- rather than to
the user -- is sufficient.
This well might permit opportunistic privacy protection without
direct user involvement, possibly with unauthenticated encryption and
no human configuration, and for authentication to take place as a
separate piece of user interface when that is desirable. To the
extent that human involvement is needed for the basic setup, it might
be limited to service administrators, rather than end users. The
obvious appeal of this is that there are orders of magnitude fewer
administrators than there are users, and administrators typically
have far more technical skill.
Key discovery is the most significant challenge during operation of a
protection mechanism. A promising approach that already has some
field experience achieves key distribution through the [DNS]. The
core requirement, of course, is determining what domain name to
query. The most obvious choice in a messaging service is the domain
name of the recipient's address. Enhancing this to permit DNS
queries on an entire email address would be the refinement to
attempt.
A DNS-based mechanism would facilitate query, but would not deal with
key administration. Although there is activity in this space, easy
key generation remain an open issue for the Internet. However note
that by making the critical actors for this service be operators, the
scale of this challenge is dramatically smaller than if end users
need to be involved.
Given a basic key-discovery ability, the question then is what to
encrypt? Simply encrypting a message body is appealing, but leaves
exposed all of the message header, as well as associated handling and
envelope information. This is where the "levels" reference in the
paper's title comes in. Additional mechanisms or services can
Crocker & Resnick Expires July 20, 2014 [Page 5]
Internet-Draft STRINT: Opportunistic Messaging Privacy January 2014
protect increasing amounts of message-related information. However,
a pragmatic basis for choosing different levels is likely to prove
challenging, since users cannot be relied on to make such decision.
Still it will be worth pursuing an activity to describe the choices.
Essentially, they are:
o Content
o Content + Header
o Content + Header + Envelope
For email, one challenge in encrypting the message header is that the
header is modified in transit. A plausible approach is to
encapsulate the original message as a [MIME] attachment, so that the
visible message header is only a form of envelope.
In order to obscure the origin/receiver envelope information, the
message in transit needs to use different envelope data. Given that
the information is essential to message transit, this will require an
overlay relay service, designed to hide actual author/recipient
information. It is worth considering enhancements, to integrate it
more seamlessly for well-motivated users.
3. Exemplars to Demonstrate Feasibility
Although it is easy to offer appealing design ideas, estimating their
real-world feasibility and utility can be challenging. This paper is
not intended to formulate detailed solutions, but it does need to
provide some basis for comfort with the basic approaches it suggests.
The discussion in this section is therefore intended to provide some
substance, to that end.
Rather than consider whether a detail discussed in this section is
good or bad, or whether one approach is better or worse than another,
the reader is encouraged merely to review the examples in terms of
existing deployment experience and the likely pragmatics of
incremental engineering and operations that is described. While it
is likely that superior designs can be specified, the requirement now
is to develop a reasonable degree of comfort that the basic
approaches are plausible.
3.1. Administrators vs. Users
There is considerable field experience with the difference between
the administrative skills of professional operators, versus end-
users. With respect to key administration, specific examples include
[DNSSEC] and [DKIM]. The experience shows that key administration
Crocker & Resnick Expires July 20, 2014 [Page 6]
Internet-Draft STRINT: Opportunistic Messaging Privacy January 2014
tends to be daunting even for professionals, but is infeasible for
most end users.
A related point is the greater deployment and use success that is
likely when providing protection between servers rather than between
end-users. An exemplar of this approach being successful for a
security mechanism is [DKIM] as compared against the problematic
deployment histories of [OPENPGP] and [SMIME]. However the obvious
concern is that the end-users must rely on the safety of their server
operations.
3.2. Key Discovery
Key discovery through the DNS already has several examples, including
[DNSSEC], [DANE] and [DKIM]. In the aggregate they demonstrate that
this basic approach is operationally reasonable.
3.3. Per-User Keys
The history of per-user key administration is particularly
disheartening. To the extent that key discovery via domain names has
established a strong proof of concept, it is appealing to consider
extending it to the granularity of complete email addresses.
Although there have been some attempts at doing this, they gained no
large-scale traction.
Historically, there has been a basic incompatibility between email
address encoding and domain name encoding. A domain name is an
undifferentiated sequence, whereas an email address is structured
into two, semantically-distinct parts (separated by the "@" sign.) A
recent, popular enhancement to DNS naming is the use of an
underscore-based node name, such as [SRVDNS] for information that
does not need to be treated as a hostname. The application of this
enhancement could produce a query name in the style of:
Mailbox._at.example.net
Hence, key query would be for a domain name, where the name might be
a hostname or might be an encoded email address. Although this would
be a new mechanism, it entails no enhancement to infrastructure
services and it re-uses a well-established and reasonably inexpensive
form of DNS-based mechanism.
3.4. Message Encapsulation
Protecting the message header means that it needs to be hidden during
transit, in spite of the header's being modified in transit, for
email. One approach to solving this is to encapsulate the entire
Crocker & Resnick Expires July 20, 2014 [Page 7]
Internet-Draft STRINT: Opportunistic Messaging Privacy January 2014
message as a MIME attachment; the visible header therefore would only
contain handling information. This model of encapsulation only
requires adoption by author (or originating server) and recipient (or
receiving server) and is transparent to the message-handling
infrastructure. Architecturally, it is identical with the way MIME
was propagated, in the 1990s, so it's viability has been well
demonstrated. Also, encapsulating an entire message as an attachment
has already been enabled through [BSMTP].
3.5. Protecting Envelope Meta-Data
If envelope data is to be hidden during transit, it must be
encapsulated in a message with different envelope data, and processed
by special, trusted relays that hide addressing and transit
information, and ensure that none is associated with the message when
it is finally delivered. This is in the spirit of [TOR].
4. Security Considerations
Everything in this draft related to security, and especially to
confidentiality in the service of privacy protection.
5. IANA Considerations
There are no IANA considerations for this draft.
Note to RFC Editor: Please remove the entire IANA Considerations
section, prior to publication
6. References - Informative
[BSMTP] Freed, N., Newman, D., Hoy, M., and , "The Batch SMTP
Media Type", RFC 2442, November 1998.
[DANE] Hoffman, P. and J. Schlyter, "The DNS-Based Authentication
of Named Entities (DANE) Transport Layer Security (TLS)
Protocol: TLSA", RFC 6698, August 2012.
[DKIM] Crocker, D., Hansen, T., and M. Kucherawy, "DomainKeys
Identified Mail (DKIM) Signatures", RFC 6376, September
2011.
[DNSSEC] Arends, R., Austein, R., Larson, M., Massey, D., and S.
Rose, "DNS Security Introduction and Requirements", RFC
4033, March 2005.
[DNS] Mockapetris, P., "Domain names - concepts and facilities",
STD 13, RFC 1034, November 1987.
Crocker & Resnick Expires July 20, 2014 [Page 8]
Internet-Draft STRINT: Opportunistic Messaging Privacy January 2014
[MAILARCH]
Crocker, D., "Internet Mail Architecture", RFC 5598, July
2009.
[MIME] Freed, N. and N. Borenstein, "Multipurpose Internet Mail
Extensions (MIME) Part One: Format of Internet Message
Bodies", RFC 2045, November 1996.
[OPENPGP] Callas, J., Donnerhacke, L., Finney, H., Shaw, D., and R.
Thayer, "OpenPGP Message Format", RFC 4880, November 2007.
[SMIME] Ramsdell, B. and S. Turner, "Secure/Multipurpose Internet
Mail Extensions (S/MIME) Version 3.2 Message
Specification", RFC 5751, January 2010.
[SRVDNS] Gulbrandsen, A., Vixie, P., and L. Esibov, "A DNS RR for
specifying the location of services (DNS SRV)", RFC 2782,
February 2000.
[TLS] Dierks, T. and E. Rescorla, "The Transport Layer Security
(TLS) Protocol Version 1.2", RFC 5246, August 2008.
[TOR] "TOR Project", WEB https://www.torproject.org/, .
Authors' Addresses
Dave Crocker
Brandenburg InternetWorking
675 Spruce Drive
Sunnyvale, CA 94086
USA
Phone: +1.408.246.8253
Email: dcrocker@bbiw.net
Pete Resnick
Qualcomm Technologies, Inc.
5775 Morehouse Drive
San Diego, CA 92121
US
Phone: +1 858 6511 4478
Email: presnick@qti.qualcomm.com
Crocker & Resnick Expires July 20, 2014 [Page 9]