Happy Birthday, IETF

ietflogotransThere’s a small group that hosts meetings three times per year, and works mostly via email that you’ve probably not heard of.  They’re called the Internet Engineering Task Force or IETF.  The women and men who participate in the IETF create standards by which computers communicate with one another.  You’re reading this note thanks to several of those standards.  They are collected in documents known as Requests for Comments or RFCs that are available for anyone to read.  In fact, you can write your own if you want.

The IETF became important to me at a time when we were just learning how to manage congestion (more demand than there is bandwidth).  It stayed important when we needed more efficient routing protocols.  Through internationalization efforts at the IETF, the Internet grew from a U.S. government network to a worldwide network of networks that supports people speaking just about any language.

Last week marked the IETF’s 30th birthday.  To the thousands of people who have participated over those thirty years, especially to those who aren’t with us today, I want to say this: Thank you.  Thank you to those who have worked to make TCP/IP-based networking suitable for the way we live, work, and play. Thanks to the people who have done their level best to see that our protocols are safe and secure.  Thanks to those who shared their innovations, so that the best ideas are available for all to use.  Thanks to those who devoted their lives to handling all the administrative aspects of the organization.

So now you know who the IETF is.  You too can participate, as can anyone.  For more information, just go to www.ietf.org and join the party and celebrate with us this anniversary, and the ones in the future.

U.N. renews IGF and World Summit for the Information Society

For those who haven’t been following the party, the United Nations has had an effort for the last decade called the World Summit on the Information Society (WSIS).  This ongoing activity was up for renewal this year.  While the Internet technology provides us so much, many we face many challenges.  They include access to the technology, security, and human rights.  WSIS addresses itself to these challenges.  The UNGA decided to continue this effort for another 10 years.  As part of this renewal process, the mandate of the Internet Governance Forum (IGF) was extended for another 10 years as well.  At the same time, the UNGA is taking a conservative approach toward government involvement by not trying to supplant the enormous efforts of those who do the work today.

As a community, we could have done a lot worse.  ISOC president Kathy Brown and her team, Ambassador Daniel Sepulveda, Marian Gordon, Chip Sharp, Chris Fair, Dominique Lazanski, Avri Doria, Bill Drake, Chris Buckridge, George Sadowsky Veni Markovski, Vint Cerf, Robert Pepper, and many others who were in the room are to be congratulated for their hard work, not only in the room, but beyond.  I personally am very impressed with ISOC’s outreach effort in region, and how that has impacted these sorts of discussions.

Within the industry we need to recognize that women are the exception to the rule at the edge of the technology development cycle.  I want much better for my daughter.  Also, as we head toward over 50 billion devices being connected, the Internet of Things must be secured.  The architecture needs lots more work to do that.  Today many endpoint devices do not have well bound names, even.  At the same time, the quality of code needs to improve, which is a particular challenge in many places.  Human rights is another area on which we are only just scratching the surface.  And yes, we must continue to struggle engage all stakeholders, including governments.  The IGF itself really needs work.  It needs funding, and we need to find a way to meet the challenge set by the UNGA in terms of identifying positive outcomes.

Yes,  we all truly have a lot to do, and yet these challenges present many opportunities for innovation at many levels.  I’m excited to be working in this space now.

Why I don’t Eat Beef

Those of you who know me well know that I don’t serve beef at home and do my best to avoid it on the road.  I don’t normally talk about why; most people assume it’s for religious reasons, because I also avoid pork.  But it’s not for religious reasons, nor is it for health reasons.  It’s for the environment.

Back in 1999 the Union of Concerned Scientists came out with a book entitled The Consumer’s Guide to Effective Environmental Choices.  This was based on a report that was roughly entitled, “Paper or Plastic: Who Cares?”  The number 1 thing that UCS said that one could do for the environment was to drive less and buy an efficient car.  The number 2 thing one could do was to eat less meat, and most specifically beef. Well now CNN has an article about just this.  Borrowing a graph:

Carbon footprint of beef

In that article, the author calculates that eating 1.27 lb of beef has the same carbon footprint as a 70 mile drive in a car that gets 21 mpg.  In other words, that number goes up with a more efficient vehicle. He argues that to help arrest the rate of global warming we need to eat less meat.

Even back in 1996, when the first UCS report came out, the one thing I could do for the environment was eat less beef. (I’ve since curtailed my driving, and Christine and I have reduced to 1 vehicle.)  The bad news is that lamb is probably just about as bad (wah!) and I will probably reduce but not eliminate my lamb consumption.

The above graph only looks at carbon footprint, and probably not all of it.  1 lb of beef requires about 1,800 gallons of water.  When I lived in California, this number seemed unsustainably large, even while we were being hit with El Niño after El Niño.  In addition, cattle also cause grazing damage, although it may be possible to mitigate those effects.

Pigs are a different matter.  I stopped eating pork products when several Colorado counties became awash in pig effluvia.  It wasn’t scientific, but I figured I could do my part by simply reducing demand for the animal.

I’ve refrained from writing this sort of article.  This was a personal choice I made, and I really didn’t push it on anyone.  I’m doing so now – just this once – for my daughter, so that she and her generation have just a little less damage from our generation to repair.

Holiday Shoppers: Don’t Get Phished!

Don’t get phished this holiday season. Here are some common sense reminders.

CybercrimeAs we enter the holiday season, if you order online, fraudsters will be targeting you.  Many people will be easy marks, where their computers will become infected with viruses, and they will be victims of identity theft. Big online vendors such as eBay and Amazon represent big targets, but others will be targets as well.  Phishers will be sending out loads of poisonous messages, just hoping that a few people will mistakenly click on links to malware-laden web sites.  While big mail providers like Google and Yahoo! work hard to filter out such garbage, it’s unavoidable that some of dangerous emails will get through.  Preventing such thefts while shopping online can be tricky because fraudulent and legitimate messages look nearly identical. Fraudsters may know something about you, such as your name, your mother tongue, the region in which you live, and the names of some of your friends.  A competent fraudster will use the logos and have the same look and feel of a legitimate online vendor.

Some of my techie friends are probably snickering, saying “That couldn’t happen to me.”  It probably already has.

Here are a few common sense suggestions to keep you from becoming a victim:

  1. Here’s the obvious one: if you didn’t order something from a vendor, be highly suspicious of the email, especially with messages that claim to have order information or coupon offers.
  2. If you have ordered something, beware any message with a subject that is vague, such as “your order”.  A legitimate online vendor will somehow identify the order, either with an order number or with the name of the product you have ordered.  This may appear in the subject line or in the body of the message.
  3. No legitimate online vendor sends zip files in email.  Don’t open them.  The same largely holds for most other attachments.  If they can’t provide you necessary information in the body of the message, it’s probably not legitimate.
  4. Most online vendors provide you a means to log into their service to track orders.  If you are at all in doubt about whether a message is legitimate, without clicking on a link in the message, visit their web site, and log in to track the order.  If you need help, contact the vendor’s customer service.
  5. While banks may email you alerts of some form, it is still always better to go to their web sites without clicking on links in the messages.
  6. Unless you gave it to them directly shippers such as Federal Express do not have your email address.  No decent online vendor will share your email address with a shipper.

What happens if you do click on something you shouldn’t have?  There is no easy answer.  Unless you are using antivirus, you have to assume the worst.  This means that it’s important to maintain good backups.  That way you can reinstall from scratch.  Sounds painful?  Then don’t carelessly click on email links.

Want some more advice on staying safe?  Check out StaySafeOnline.org.

Closing the Cultural Chasm on Crypto

MercutioI like to say that engineers make lousy politicians and politicians make lousy engineers.  When we each try to do the other one’s job, it’s time to admit that we have a problem.

Even before the Paris attacks, the British Prime Minister David Cameron was already reacting to Apple and Google refusing to hold in escrow encryption keys necessary to decrypt data on their devices.  In the wake of those attacks, the UK, the FBI and CIA directors have increased the drum beating.  At the same time, some members of the technical community have come to conclude that the sun shines out of the posterior of Edward Snowden, and that all government requirements are illegitimate.  This came to a remarkable climax in July when Snowden appeared at an unofficial event at the  Internet Engineering Task Force  (IETF) meeting in Prague.

A lot of the current heat being generated is over the notion of key escrow, where someone holds encryption keys such that private communications can be accessed under some circumstances, such as life or death situations or when a crime has been committed.

Now is the perfect time for both sides to take a deep breath, and to take stock of the current situation.

1. We cannot say whether any sort of encryption rules would have prevented the Paris attacks.

There are conflicting reports about whether or not the terrorists used encryption.  What might have been is impossible to know, especially when we do not intimately know the decision makers, at least some of whom are now dead.  We do know that Osama bin Laden refused to use a cell phone long before any of the Snowden revelations were made.  He knew that he was being watched, and he knew that he had a technical disadvantage as compared to the U.S. eyes in the sky.  It is a sure bet that even if these attackers didn’t use encryption, some attackers in the future will.

On the other hand, we also know that people tend to not secure their communications, even when the ability to do so is freely available.  As a case and point, even though it has been perfectly possible to encrypt voice and email communications for decades, both continue to this day, and have been instrumental in unraveling the Petrobras scandal that rattled the Brazilian government.

2.  Encryption is hard.

We’ve been trying to get encryption right for many decades, and still the best we can say is that we have confidence that for a time, the best encryption approaches are likely to be secure from casual attacks, and that is only when those approaches are flawlessly implemented.  A corollary to this point is that almost all software and hardware programs have vulnerabilities.  The probability of discovery of a vulnerability in any deployed encryption system approaches 100% over time.  Knowing this, one test policy makers can apply regarding key escrow is whether they themselves would be comfortable with the inevitability that their most private personal communications being made public, or whether they would be comfortable knowing that some of their peers at some point in the future will be blackmailed to keep their communications private.

To make matters worse, once a technology is deployed, it may be out there for a very long time.  Windows 95 is still out there, lurking in the corners of the network.  It’s important to recognize  that any risk that legislation introduces may well outlast the policy makers who wrote the rules.  Because we are dealing with the core of Internet security, a “go slow and get it right” approach will be critical.

3.  There are different forms of encryption, and some are easier to “back door” than others.

When we speak of encryption let us talk of two different forms: encryption of data in flight, such as when a web server sends you information or when you and your friends communicate on Skype, and encryption of data at rest, such as the files you save on your disk, or the information stored in your smart phone or tablet.  Many enterprises implement key escrow mechanisms today for data at rest.

Escrowing keys of data in flight introduces substantial risks.  Each communication uses session keys that exist for very short periods of time, perhaps seconds, and then are forgotten or destroyed.  Unlike data at rest, escrowing of keys for encryption of data in flight has not been done at scale, and has barely been done at all.  To retain such keys or any means to regenerate them would risk allowing anyone – bad or good – to reconstruct communications.

4.  Engineers and scientists are both advisers and citizens.  Policy makers represent the People.

It has been perfectly possible for Russia and the United States to destroy the world several times over, and yet to date policy makers have stopped that from happening.  Because something is possible doesn’t necessarily mean it is something we do.  Even for data at rest, any time a private key is required anywhere in the system it becomes a focal point for attack.  But new functionality often introduces fragility.  The question of whether it is worth fragility is inherently political and not technical.

The technical community that consists of scientists and engineers serve a dual role when it comes to deciding on the use of technology for a given purpose.  First, they can advise policy makers as to the limits and tradeoffs of various technology.  Members of the technical community are also citizens who have political views, just like other citizens.  It’s important for that they make clear which voice they are speaking with.

Screen Shot 2015-11-19 at 2.47.37 PMRFC 1984 famously makes the point that there is an inherent challenge with key escrow, that if one country mandates it, then other countries can also mandate it; and that there will be conflicts as to who should hold the keys and when they should be released.  Those questions are important, and they are inherently political as well.  To the left is a Venn diagram of just a handful of countries- the United States, Iran, China, and France.  Imagine what that diagram would look like with 192 countries.

Professor Lawrence Lessig famously wrote that code (as in computer code) is law.  While it is true in a natural sense that those who develop the tools we use can limit their use by their design, it is also the case that, to the extent possible, in a democratic society, it is the People who have the last word on what is law.  Who else should get to decide, for instance, how members of society behave and how that behavior should be monitored and enforced?  Who should get to decide on the value of privacy versus the need to detect bad behavior?  In a democracy the People or their elected representatives make those sorts of decisions.

5.  Perfect isn’t the goal.

Any discussion of security by its very nature involves risk assessment.  How much a person spends on a door lock very much depends on the value of the goods behind the door and the perceived likelihood of attacker trying to open that door.

Some people in the technical community have made the argument that because bad guys can re-encrypt, no escrow solution is appropriate.  But that negates the entire notion of a risk assessment.  I suspect that many law enforcement officials would be quite happy with an approach that worked even half the time.  But if a solution only works half the time, is it worth the risk that is introduced by new components in the system that include new central stores for many millions of keys?  That is a risk assessment that needs to be considered by policy makers.

6.  No one is perfectly good nor perfectly evil.

By highlighting weaknesses in the Internet architecture, Edward Snowden showed theEdward Snowden technical community that we had not properly designed our systems to withstand pervasive surveillance.  Whether we choose to design such a system is up to us.  The IETF is attempting to do so, and there is good reason for that logic: even if you believe that the NSA is full of good people, if the NSA can read your communications, then others can do it as well, and may be doing so right now.  And some of those others are not likely to fit anyone’s definition of “good”.

On the other hand, while it is beyond an open secret that A fallen angelgovernments spy on one another, Snowden’s release of information that demonstrated that we were successfully spying on specific governments did nothing more than embarrass those governments and harm U.S. relations with their leaders.  Also, that the NSA’s capability was made public could have contributed to convincing ISIS to take stronger measures, but as I mentioned above, we will never know.

So What Is To Be Done?

History tells us that policy made in a crisis is bad.  The Patriot Act is a good example of this.  So too was the internment of millions of Americans of Japanese descent in World War II.  The birth of the Cold War gave birth of a new concept: McCarthyism.

And so my first bit of advice is this: let’s consult and not confront one another as we try to find solutions that serve the interests of justice and yet provide confidence in the use of the Internet.  Policy makers should consult the technical community and the technical community should provide clear technical advice in return.

Second, let’s acknowledge each others’ expertise: people in law enforcement understand criminology.  The technical community understands what is both possible and practicable  to implement, and what is not.  Policy makers should take all of this into account as they  work with each of these communities and their constituents to find the right balance of interests.

Third, let’s recognize that this is going to take a while.  When someone asserts that something is impossible or impracticable, we are left with research questions.  Let’s answer them.  Let’s be in it for the long haul and invest in research that tests what is possible and what is not.  While not ultimate proof, researching various approaches will expose their strengths and weaknesses.  Ultimate proof comes in the form of experience, or as my friends in the IETF like to say, running code.  Even if we get beyond the technical issues involved with escrow, policy makers will have to answer the question as to who gets to hold the keys such that people can be reasonably assured that they’re only being released in very limited circumstances.  That’s likely to be a challenging problem in and of itself.

Fourth, the law of unintended consequences applies.  Suppose policy makers find common cause with a specific group of countries.  The other countries are still going to want a solution.  How will businesses cater to one group of countries but not another?  Policy makers need to be aware that any sort of key escrow system may put businesses in an impossible situation.

Finally I would be remiss if I didn’t make clear that everyone has a stake in this game.  Citizens are worried about privacy; governments are worried about security; industry is concerned about delivering products to market in a timely fashion that help the Internet grow and thrive.  Bad guys also have interests.  Sometimes we end up assisting them when we strike balances.  What is important is that we do this consciously, and that when necessary, we correct that balance.