Internet DRAFT - draft-bertola-everything-but-the-user

draft-bertola-everything-but-the-user







Network Working Group                                         V. Bertola
Internet-Draft                                              Open-Xchange
Intended status: Informational                            4 January 2022
Expires: 8 July 2022


               Everything But The User Is An Intermediary
                draft-bertola-everything-but-the-user-00

Abstract

   This document provides the author's perspective on the shortcomings
   of the Internet threat model defined in RFC 3552 and currently in use
   at the IETF.  It then proposes the basic conceptual framework for an
   additional model, the "holistic threat model", describing how it
   could be used to broaden the analysis of non-technical protocol
   impacts in the design phase.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 8 July 2022.

Copyright Notice

   Copyright (c) 2022 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.



Bertola                    Expires 8 July 2022                  [Page 1]

Internet-Draft           Everything But The User            January 2022


Table of Contents

   1.  Introduction and Background . . . . . . . . . . . . . . . . .   2
     1.1.  The End-to-End Principle  . . . . . . . . . . . . . . . .   2
     1.2.  Intermediaries in Today's Internet  . . . . . . . . . . .   2
     1.3.  The Current Internet Threat Model . . . . . . . . . . . .   3
   2.  Shortcomings of the Current Threat Model  . . . . . . . . . .   4
     2.1.  Shortcomings in the Scope of Attackers  . . . . . . . . .   4
     2.2.  Shortcomings in the Scope of Threats  . . . . . . . . . .   6
   3.  The Holistic Threat Model . . . . . . . . . . . . . . . . . .   7
     3.1.  Applicability of the Holistic Threat Model  . . . . . . .   8
   4.  Security Considerations . . . . . . . . . . . . . . . . . . .   8
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   9
   6.  Informative References  . . . . . . . . . . . . . . . . . . .   9
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   9

1.  Introduction and Background

1.1.  The End-to-End Principle

   The architecture and design of Internet protocols traditionally stems
   from the "end-to-end principle" - the choice of concentrating the
   intelligence and the complexity of the services of a network at its
   edges, reducing to the minimum possible level the functions and the
   prerogatives of the inner nodes of the network.  When the
   implementation of a network's functions is built as a set of layers
   relying on each other, the intelligence and the complexity are pushed
   upwards, to the layers nearer to the end-user, minimizing the
   activities of the lower layers [Salzer].

   Under this principle, application-level protocols are designed as a
   communication between two endpoints sitting at the edge of the
   network, directly interacting with the respective end-users, or, for
   human-to-server communication, with the physical or juridical entity
   providing the service at the endpoint.  While in some cases
   communications can be directed to more than one endpoint, in-network
   intermediaries to these communications simply do not exist; all
   parties involved in the communication sit at the network's edge.

1.2.  Intermediaries in Today's Internet

   Over time, throughout the technical development of the Internet, it
   has not always been possible to upkeep the end-to-end principle in
   full.  There now are services and functions that involve
   intermediaries, that is, entities other than the endpoints, sitting
   on the network path between them and performing higher-level
   functions.




Bertola                    Expires 8 July 2022                  [Page 2]

Internet-Draft           Everything But The User            January 2022


   For example, the relative scarcity of IPv4 addresses prompted the
   introduction of nodes that would encapsulate the end-user's traffic
   and pretend to be the actual endpoint of the Internet connection,
   then passing back the packets received in response.  Security checks
   have been implemented by having intermediate network nodes examine
   all the traffic, sometimes up to content at the highest application
   level, and determine whether such traffic should be allowed to reach
   the other endpoint or not.

   Some functionalities also require the involvement of third parties
   acting as "side intermediaries", that is, additional parties to the
   communication that sit elsewhere than on the network path between the
   endpoints, and are brought into the communication as an endpoint to a
   separate network connection.  An example is the DNS resolution
   process, as the network stack setting up a connection to the endpoint
   must establish a separate connection to a separate service, the DNS
   resolver, to discover the IP address of the endpoint from its name.

   Given the general recognition of the end-to-end principle, the role
   of intermediaries in the design of Internet protocols has generally
   been controversial.  As added parties into a communication,
   intermediaries can be used as a point of surveillance and control
   over traffic that the end-user did not mean them to see.  On the
   other hand, intermediaries can also be used to provide valuable
   services, such as enabling the user to identify network destinations
   by name rather than by IP address, or such as increased security for
   users that would not be able to identify threats directly (e.g.
   against phishing websites).

1.3.  The Current Internet Threat Model

   The threat model used when evaluating the safety of Internet
   protocols has generally assumed that endpoint behaviour and risks are
   out of scope, only focusing on the communication itself.  Thus, in
   the last decade, the increased attention to the privacy and security
   of the end-user's network activities led to the progressive
   elimination of intermediaries, especially those that were deployed by
   network operators halfway on the path of Internet communications.

   Frequently, the instrument used to this purpose has been the
   encryption and disguise of communications between the two network
   endpoints; sometimes, protocol changes, including high-level routing
   changes and traffic aggregation, have also been conceived to reduce
   opportunities for discriminating or tracking traffic.

   In some cases, however, these instruments have been claimed to
   produce effects that actually endanger the user's privacy and
   security - among these, the aggregation and centralisation of traffic



Bertola                    Expires 8 July 2022                  [Page 3]

Internet-Draft           Everything But The User            January 2022


   into the infrastructure of a limited number of operators, and the
   elimination of any possibility for positive intermediation, such as
   in-network security checks.

   As the overall privacy of the end-user's communication is determined
   both by the privacy during the transport of the information and by
   the privacy of the processing that happens within the endpoints, an
   increase in the former could be compensated by a decrease in the
   latter, with a negative net effect.  At the IETF and elsewhere,
   discussions are ongoing on how Internet protocol design could also
   take into account this risk.

   Since many of these threats are related to endpoint behaviour, or to
   a combination of protocol features and non-technical endpoint
   decisions such as the model, timeframe and policies for their
   deployment, they cannot be caught by a threat model that declares
   endpoints to be out of scope.

   As a contribution to this discussion, this document proposes a
   different and more general approach to the assessment of potential
   risks, considering both in-network and endpoint actors as
   intermediaries, and extending the analysis to non-technical issues.
   This model could be used whenever a broader impact analysis is
   considered useful.

2.  Shortcomings of the Current Threat Model

   The current Internet threat model is formalized in RFC 3552
   [RFC3552].  While the goals described in section 2 of that document
   are still generally valid, in today's Internet environment the threat
   model described in section 3 sometimes fails to capture all the
   relevant threats that could affect the accomplishment of those goals.

2.1.  Shortcomings in the Scope of Attackers

   The first shortcoming of the current Internet threat model is that it
   attempts to evaluate the impact on the properties of a communication
   between human beings (or between a human and a computer service) by
   only assessing the properties of the communication between the
   protocol endpoints, assuming for the purpose of protocol design that
   no attacks can happen during the processing of communications between
   the protocol endpoint and the end-user, or that these attacks can be
   effectively pre-empted and countered by the end-user.

   Section 3 of RFC 3552 supplies a justification for this assumption;
   it states that "Protecting against an attack when one of the end-
   systems has been compromised is extraordinarily difficult."  Indeed,
   under this assumption the protocol designer can conflate two separate



Bertola                    Expires 8 July 2022                  [Page 4]

Internet-Draft           Everything But The User            January 2022


   communication layers, the protocol one - an exchange of information
   between two software or hardware elements acting as protocol
   endpoints at the edges of the network - and the end-user one - an
   exchange of information between human beings.  This assumption is
   quite helpful for protocol design, as it reduces the quantity and
   quality of threats that have to be examined.  However, it inevitably
   excludes other relevant threats from the analysis, giving users no
   protection from them.

   This assumption could have been justified under a number of external
   conditions that were mostly true when the original Internet threat
   model was conceived, such as:

   1.  The end-user has full control over the device that they are
       using.

   2.  The end-user is freely able to choose the application and the
       operating system that they are using, picking some that they can
       trust.

   3.  The end-user is sufficiently competent in technology to be able
       to assess the risks of misbehaviour by the endpoint elements of
       their communication, and to judge whether to entrust them with
       data and information.

   However, in today's Internet, these conditions are generally false.
   Internet end-users are in average much less tech-literate than they
   were in 2003, when RFC 3552 was written; even more so if we consider
   the Internet of 1984, when the end-to-end principle as we know it
   today was formalized.

   Over the last decade, network services based on open, federated
   protocols - like e-mail or the Web - have increasingly been
   complemented or replaced by newer services - like instant messaging
   or social media - based on a single-operator, single-implementation
   "walled garden" model, thus giving the user much more limited
   choices, or no choice at all, over which application to use.  Most
   users now access the Internet from smartphones, almost entirely
   running on one of two dominant operating systems.  To account for the
   more limited technical competence of end-users, newer devices and
   applications often give them limited configuration choices.  The
   advent of the cloud computing model has brought forth a vast range of
   home appliances and software applications that only communicate with
   the servers of their own makers, often with no opportunity for the
   user to verify or alter their network communications.






Bertola                    Expires 8 July 2022                  [Page 5]

Internet-Draft           Everything But The User            January 2022


   While useful in technical terms, this assumption in today's scenario
   - at least in some cases - leaves too many threats out of scope to be
   still acceptable.

2.2.  Shortcomings in the Scope of Threats

   Another shortcoming of the current Internet threat model derives from
   its limited technical focus.  When it was designed, the threat model
   focused only on the security of the communication; from the end-
   user's viewpoint, communication security was defined in section 2.1
   of RFC 3552 as the union of three more specific goals -
   confidentiality, data integrity and peer entity authentication.

   In 2013, the IETF deemed it necessary to add a separate, specific
   focus on potential threats to the user's privacy, releasing RFC 6973
   [RFC6973].  While building on the original goal of confidentiality,
   this document moved the analysis to a higher, less technical level,
   bringing into scope the non-technical consequences of technical
   communication breaches.  To protect the user's privacy effectively,
   it was deemed necessary to consider the non-technical purposes and
   motivations that could prompt an attacker to exploit any flaws and
   weaknesses in communication protocols.  Moreover, in section 4 RFC
   6973 already questioned the validity of RFC 3552's assumption of non-
   compromised endpoints.

   In 2017, the scope of the suggested analysis was further broadened by
   RFC 8280 [RFC8280].  While still being a proposal subject to further
   research, this document codified an even broader range of non-
   technical threats to social, economical and political rights, such as
   freedom of expression, non-discrimination, freedom of assembly and so
   on; it then suggested how to consider potential adverse effects to
   these rights when designing protocols.

   In the last twenty years, the IETF appears to have followed the
   societal trend that, in parallel with the increased usage and
   pervasiveness of the Internet in the everyday life of all human
   beings, brought the non-technical consequences of technical design
   choices by the Internet's technical community and industry to the
   attention of the public opinion and of the policymakers.  It is now
   expected that a sense of social and corporate responsibility, and
   policy objectives defined outside of the technical community,
   contribute to shaping the choices that will determine the future
   evolution of the Internet.

   However, the analysis of non-technical consequences of technical
   design choices does not just require technical skills, but also
   competence in fields like business administration, economy, policy,
   law and social sciences.  The efforts of protocol engineers to take



Bertola                    Expires 8 July 2022                  [Page 6]

Internet-Draft           Everything But The User            January 2022


   into account the dynamics and the effects in these other fields are
   commendable, but there is the need to bring the appropriate
   competences into the discussion, while avoiding mission creep for
   technical standards organizations.  Any attempt to address this
   shortcoming should also consider this issue.

3.  The Holistic Threat Model

   As a consequence of the shortcomings that have been identified above,
   to perform a complete evaluation of the risks to the security and
   privacy of end-users and to their rights in general, it would be
   necessary to expand the scope of the threat analysis in two
   directions.

   First, it would be necessary to consider all elements that have
   access to the end-user's information, data, metadata and content,
   independently from whether they sit within the network or within the
   endpoint devices; any element located anywhere between the fingers
   (or other human-machine interface) of the sending end-user and the
   eyes of the receiving end-user (or the operator of the application-
   level Internet service) is in scope.  In short, "everything but the
   user is an intermediary"; since both the endpoint devices and any in-
   network intermediaries have access to user information, all of them
   should be considered as third parties that could potentially attack
   the end-user.

   Secondly, to understand how these elements might realistically
   behave, it would be necessary to consider not just the technical
   building blocks, but the physical or juridical entities that operate
   or control them, and the non-technical motivations that could push
   them to attack or constrain the user, such as economic advantages,
   the accumulation and preservation of power, the desire to surveil or
   stalk another person and many others.

   Under this extended threat model, no claim should be made over the
   privacy, security or any other property of Internet communications
   from the end-user's perspective, unless all parties different from
   the user(s) that take part in the communication, and all their
   possible motivations, have been considered: hence the "holistic"
   threat model.











Bertola                    Expires 8 July 2022                  [Page 7]

Internet-Draft           Everything But The User            January 2022


3.1.  Applicability of the Holistic Threat Model

   In theory, the holistic threat model is a necessary response to the
   shortcomings identified above.  The more limited analysis performed
   under the RFC 3552 threat model could not only lead to incomplete
   results, failing to identify significant threats, but could even lead
   to counterproductive results.  Architectural choices that are
   assessed as increasing the user's privacy could, under a broader
   analysis of likely non-technical dynamics, actually cause new threats
   to the user's privacy, for example by promoting business models based
   on data monetization or the centralization of user information into
   fewer hands.

   However, the skillsets and research necessary to conduct such a
   multidisciplinary analysis, and the sheer amount of actors and
   possible behaviours, could make the effort too heavy and practically
   unfeasible, or simply excessive for specifications of limited impact.

   As an initial experiment, the holistic threat model could be applied
   as a second step for selected documents, after performing a security
   and privacy analysis under the current threat model, whenever the
   initial examination of the properties of a new specification raises
   concerns on potential broader impacts.

   It is important to note that even the assessment on whether a
   specification could have impacts on non-technical issues and
   stakeholders requires in principle the broader skillset necessary to
   perform the full analysis.  In other words, to determine whether a
   holistic assessment would be necessary, it is necessary to consult
   the non-technical stakeholders that could be affected by the new
   specification, letting them do a preliminary analysis and raise any
   potential concerns before the specification is finalized.

   In the end, the need identified by this document calls for a stronger
   and more effective interaction between the IETF and other parts of
   the Internet's industry, policy and user communities on a global
   scale.  Efforts to establish such an interaction should be made
   jointly by the IETF and by the other relevant stakeholders; how to do
   that in practice could be the subject of a separate discussion.

4.  Security Considerations

   This document discusses the assumptions under which security
   considerations should be developed in the future.  It is meant to
   contribute to the ongoing discussion over a possible revision of RFC
   3552 [RFC3552], which specifies how to write security considerations.





Bertola                    Expires 8 July 2022                  [Page 8]

Internet-Draft           Everything But The User            January 2022


5.  IANA Considerations

   This document has no IANA actions.

6.  Informative References

   [RFC3552]  Rescorla, E. and B. Korver, "Guidelines for Writing RFC
              Text on Security Considerations", BCP 72, RFC 3552,
              DOI 10.17487/RFC3552, July 2003,
              <https://www.rfc-editor.org/info/rfc3552>.

   [RFC6973]  Cooper, A., Tschofenig, H., Aboba, B., Peterson, J.,
              Morris, J., Hansen, M., and R. Smith, "Privacy
              Considerations for Internet Protocols", RFC 6973,
              DOI 10.17487/RFC6973, July 2013,
              <https://www.rfc-editor.org/info/rfc6973>.

   [RFC8280]  ten Oever, N. and C. Cath, "Research into Human Rights
              Protocol Considerations", RFC 8280, DOI 10.17487/RFC8280,
              October 2017, <https://www.rfc-editor.org/info/rfc8280>.

   [Salzer]   Salzer, J. H., Reed, D. P., and D. D. Clark, "End-to-end
              arguments in system design", 1 November 1984,
              <https://dl.acm.org/doi/10.1145/357401.357402>.

Author's Address

   Vittorio Bertola
   Open-Xchange Srl
   Via Treviso 12
   10144 Torino
   Italy

   Email: vittorio.bertola@open-xchange.com
   URI:   https://www.open-xchange.com/
















Bertola                    Expires 8 July 2022                  [Page 9]