Why Do I See the NSA Behind This Sh%$?

The Internet Engineering Task Force has proposed a way to speed up encrypted connections that works by removing the encryption for part of the journey. Rather unsurprisingly it looks like a way allow the NSA, FBI, etc. to crawl up your ass into your encrypted data:

A draft put forward at the Internet Engineering Task Force has drawn the ire of prominent privacy activist Lauren Weinstein as “one of the most alarming Internet proposals” he’s ever seen.

The document that’s upset Weinstein is this one, out of the HTTPBis Working Group and posted as an Internet Draft on 14 February 2014.

Entitled Explicit Trusted Proxy in HTTP/2.0, the standard proposes a mechanism by which an upstream provider – say an ISP – could get permission to snoop on decrypt user traffic for the purposes of caching.

Using proxies to cache traffic in the service provider network is unremarkable and uncontroversial: it’s been normal practice for a long time. The end user benefit is better performance; the service provider benefit is a reduction in traffic over their upstream transit network links.

From that point of view, encryption is a pain in the neck: the service provider can’t see into the encrypted traffic, which reduces the effectiveness of its caching strategy.

The Internet Draft has this to say:

“To distinguish between an HTTP2 connection meant to transport “https” URIs resources and an HTTP2 connection meant to transport “http” URIs resource, the draft proposes to ‘register a new value in the Application Layer Protocol negotiation (ALPN) Protocol IDs registry specific to signal the usage of HTTP2 to transport “http” URIs resources: h2clr.’”

In essence, to try and protect their ability to cache, the authors of the standard propose that providers seek their customers’ permission to decrypt their traffic (solely for the purposes of offering a better customer experience, naturally).

For some reason, Weinstein finds this proposal outrageous: “The proposal expects Internet users to provide ‘informed consent’ that they ‘trust’ intermediate sites (e.g. Verizon, AT&T, etc.) to decode their encrypted data, process it in some manner for ‘presumably’ innocent purposes, re-encrypt it, then pass the re-encrypted data along to its original destination,” he writes.

Considering that AT&T proposed this, and that AT&T’s record vis a vis illegal surveillance is pretty horrific, I do not see this as a positive proposal.

Leave a Reply