[governance] FW: [IP] IAB soliciting comments on mitigation of pervasive surveillance:

Lee W McKnight lmcknigh at syr.edu
Wed Oct 8 10:39:16 EDT 2014


FYI,


IAB requests comments on pervasive surveillance mitigation.


Lee


________________________________
From: Dave Farber via ip <ip at listbox.com>
Sent: Tuesday, October 7, 2014 5:54 PM
To: ip
Subject: [IP] IAB soliciting comments on mitigation of pervasive surveillance:

---------- Forwarded message ----------
From: "Mike Liebhold" <mnl at well.com<mailto:mnl at well.com>>
Date: Oct 7, 2014 5:38 PM
Subject: IAB soliciting comments on mitigation of pervasive surveillance:
To: "Dewayne Hendricks" <dewayne at warpspeed.com<mailto:dewayne at warpspeed.com>>, "Dave Farber" <dave at farber.net<mailto:dave at farber.net>>
Cc:

Hi Dewayne and Dave,

The Inernet Architecture Board is  soliciting comments on two drafts that  may be of interested in:

Pervasive Attack: A Threat Model and Problem Statement
https://tools.ietf.org/html/draft-barnes-pervasive-problem-01

"Documents published in 2013 have revealed several classes of "pervasive" attack on Internet communications.  In this document, we review the main attacks that have been published, and develop a  threat model that describes these pervasive attacks.  Based on this  threat model, we discuss the techniques that can be employed in Internet protocol design to increase the protocols robustness to pervasive attacks." [snip]

Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement
https://tools.ietf.org/html/draft-iab-privsec-confidentiality-threat-00

"Documents published in 2013 have revealed several classes of "pervasive" attack on Internet communications.  In this document we develop a threat model that describes these pervasive attacks.  We start by assuming a completely passive adversary with an interest in indiscriminate eavesdropping that can observe network traffic, then expand the threat model with a set of verified attacks that have been published.  Based on this threat model, we discuss the techniques that can be employed in Internet protocol design to increase the  protocols robustness to pervasive attacks." [snip]



-------- Original Message --------
Subject:     Re: [perpass] IAB security/privacy programme PM draft
Date:     Tue, 07 Oct 2014 12:35:17 -0400
From:     Joseph Lorenzo Hall <joe at cdt.org><mailto:joe at cdt.org>
To:     perpass at ietf.org<mailto:perpass at ietf.org>


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

As the showrunner for the confidentiality effort in the IAB privacy
and security program, please do share your feedback with us. We are
also contemplating a companion document on mitigations for the threats
outlined in the threat model.

best, Joe

On 9/15/14, 10:56 AM, Stephen Farrell wrote:
>
> Hi all,
>
> Richard and a few folks started work on documenting a problem
> statement [1] some time ago. As I think was stated here before it
> seems like a good plan for that to be progressed as part of the
> IAB's re-factored security/privacy programme. So Brian Trammell has
> picked up the pen and pushed out [2].
>
> Comments very welcome (I've still to read it myself so will send my
> comments here too when I've had a chance),
>
> Cheers, S.
>
>
> [1] http://tools.ietf.org/html/draft-barnes-pervasive-problem [2]
> https://tools.ietf.org/html/draft-iab-privsec-confidentiality-threat
>
>  _______________________________________________ perpass mailing
> list perpass at ietf.org<mailto:perpass at ietf.org>
> https://www.ietf.org/mailman/listinfo/perpass
>

- --
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825<tel:202-407-8825>
(f) 202-637-0968<tel:202-637-0968>
joe at cdt.org<mailto:joe at cdt.org>
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (Darwin)

iQIcBAEBCAAGBQJUNBZEAAoJEF+GaYdAqahxrEsP/28vDnQatU/cplFLiWz9+Xda
8lscV2uhxEaQYHgy4wvsd03vgfFCE/RfG7AwX8h1+S7XDUg27GpUHLPeXJesF6cy
WOSnzYN6K/WmDMn8AKYv+/FDYf6JdB5yc0zmiivAbOTDwsi6LTbRMvwRhMyUXlEM
OeZlbZz5GkyMmDccUNSjS6B8WrGnxilnQX07c7bRgeq9DR5DB8QwaRsg66Z757Bi
vSqDAG/87aKU8Pov5gRRHNY9QskOneuFWEIOO4pl+eqodx3c45Lyx7Ain7vjy/nO
l92FTyOyf47I99vWWyrit/KBPImxNFnP2txZu1WuWXz/yNYCKxrOMiTdIycjVwVK
7jpfcAtC7IB11+nMTy4xNl4kzRBcZnCXVaWhZ+b+5/SuZX4qKrwB4YeFlQQKJXXY
+F9XeG1MAjaF4qmNFeLsIUO0wadRXQ23RSlKfDqNe8s+Y2BsvoUepzxmsbSsJCJ0
NAGEGNqBnwXQwbaJO9MtTU0RzXbe1KzJw26eHY5/nfCBfyn2hYw9TjzH0cmAOOXX
IcxVYBfJLu/tUNvxtpaPhlu3yvzcU99KxdjLpBsD/wOk4mfblg9AAZiwxXdq5k7+
nCSPz+CodE2OWt7UsqdCIdBiW/yaC2qnLcnMw197lRxJnDwE2NrbQx72AQAd6u9Z
ndxTiZ7dEsIuOJE0OCaL
=4SpJ
-----END PGP SIGNATURE-----

_______________________________________________
perpass mailing list
perpass at ietf.org<mailto:perpass at ietf.org>
https://www.ietf.org/mailman/listinfo/perpass


Archives<https://www.listbox.com/member/archive/247/=now> [https://www.listbox.com/images/feed-icon-10x10.jpg] <https://www.listbox.com/member/archive/rss/247/8923115-8446eb07>  | Modify<https://www.listbox.com/member/?member_id=8923115&id_secret=8923115-86ed04cc> Your Subscription | Unsubscribe Now<https://www.listbox.com/unsubscribe/?member_id=8923115&id_secret=8923115-e899f1f0&post_id=20141007175433:84064986-4E6C-11E4-B4BD-961C92A489B0>     [https://www.listbox.com/images/listbox-logo-small.png] <http://www.listbox.com/>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.igcaucus.org/pipermail/governance/attachments/20141008/8d262237/attachment.htm>
-------------- next part --------------
____________________________________________________________
You received this message as a subscriber on the list:
     governance at lists.igcaucus.org
To be removed from the list, visit:
     http://www.igcaucus.org/unsubscribing

For all other list information and functions, see:
     http://lists.igcaucus.org/info/governance
To edit your profile and to find the IGC's charter, see:
     http://www.igcaucus.org/

Translate this email: http://translate.google.com/translate_t


More information about the Governance mailing list