Re: SSL/TLS everywhere fail

On Fri, Dec 4, 2015 at 4:10 PM, Poul-Henning Kamp <phk@phk.freebsd.dk>
wrote:

> --------
> In message <245746A1-A574-4D19-A8AA-8AC5270D0D8F@lukasa.co.uk>, Cory
> Benfield w
> rites:
>
> My point is that TLS anywhere made this *possible* for them.
>
>
​And were a majority of traffic in plaintext​ this would have been
impossible?  Harder?  I think maybe easier, instead.   Less expensive, to
boot.  Sure, passive analysis is easier yet, but MiTM of plaintext is
easier than MiTM of TLS on its face.


> The correct response would have been to roll out more or less
> *exactly* what the encryption draft contains, along with a wide
> number of diverse key-management schedules.
>
>
​There may also be more than one correct response.​  Doing more than one
thing may be required to get to a desired state, after all.


That way the Kazakh government, no matter how much they desired it,
> would not be able to do a MiTM on their entire country, because they
> would not be able to get any tool from anywhere to implement it.
>
> Their political choice would then be reduced to:
>
>    A) Pass traffic, collecting only the "envelope",
>
> or
>
>    B) Block all traffic that cannot be inspected.
>
> Even in Kazakstan B) would be politically suicide, so the result would
> *at worst* be A).
>
> A) Would have been a *much* better situation than what is now happening.
>
> Now that they *have* implemented total MiTM, we fight the uphill
> battle where they can (and probably will) block any other kind of
> encrypted traffic than TLS, so rolling out our stronger weapon just
> got impossble.
>
>
​And your evidence for this is what, exactly? ​Combined with TLS, how does
your stronger weapon get weaker?

Ted

Received on Saturday, 5 December 2015 00:41:12 UTC