TLS NPN (Next Protocol Negotiation)
Gregory Maxwell
gmaxwell at gmail.com
Tue Aug 17 23:08:59 UTC 2010
On Tue, Aug 17, 2010 at 2:08 AM, Seth David Schoen <schoen at eff.org> wrote:
[snip]
> I'm tempted to reply pointing out that _all_ uses of TLS represent
> at least potential support for a threat model in which a network
> operator is the adversary whom users are trying to defend against.
> So there's not much conceptually new about having TLS reduce network
> operators' control over traffic, although some of the people in
> the discussion seem to feel there is a qualitative difference
> between, say, keyword filtering and protocol filtering.
s/network operator/someone with access to the network/
A protocol which places the service type outside of the crypto isn't
_only_ vulnerable to the formal operators of the network it's just
simply vulnerable. If you can trust that people with access to the
network are trustworthy then why are you using TLS at all?
If the IETF wishes to make the protocol subject to control by network
operators then they should incorporate an explicit cryptographically
secured backdoor (i.e. something similar to key escrow). This would be
bad from a privacy and security perspective, but because it would be
explicit it would still be arguably superior to INTENTIONALLY MAKING
THE PROTOCOL IMPLICITLY VULNERABLE NOT ONLY TO THE PEOPLE YOU ARE
EXPECTED TO TRUST BUT TO THE ENTIRE WORLD. ahem.
I feel better now.
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
More information about the tor-talk
mailing list