<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="no"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="info" docName="draft-mm-wg-effect-encrypt-04" ipr="trust200902"
     updates="">
  <front>
    <title abbrev="Effect of Encryption">Effect of Ubiquitous
    Encryption</title>

    <author fullname="Kathleen Moriarty" initials="K." surname="Moriarty">
      <organization>EMC Corporation</organization>

      <address>
        <postal>
          <street>176 South St</street>

          <city>Hopkinton</city>

          <region>MA</region>

          <code/>

          <country>USA</country>
        </postal>

        <phone>+1</phone>

        <facsimile/>

        <email>Kathleen.Moriarty@emc.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Al Morton" initials="A." surname="Morton">
      <organization>AT&amp;T Labs</organization>

      <address>
        <postal>
          <street>200 Laurel Avenue South</street>

          <city>Middletown,</city>

          <region>NJ</region>

          <code>07748</code>

          <country>USA</country>
        </postal>

        <phone>+1 732 420 1571</phone>

        <facsimile>+1 732 368 1192</facsimile>

        <email>acmorton@att.com</email>

        <uri>http://home.comcast.net/~acmacm/</uri>
      </address>
    </author>

    <date day="30" month="October" year="2016"/>

    <abstract>
      <t>Increased use of encryption will impact operations for security and
      network management causing a shift in how these functions are performed.
      In some cases, new methods to both monitor and protect data will evolve.
      In more drastic circumstances, the ability to monitor and troubleshoot
      may be eliminated. This draft includes a collection of current security
      and network management functions that may be impacted by the shift to
      increased use of encryption. This draft does not attempt to solve these
      problems, but rather document the current state to assist in the
      development of alternate options to achieve the intended purpose of the
      documented practices.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>In response to pervasive monitoring revelations and the IETF
      consensus that Pervasive Monitoring is an Attack <xref
      target="RFC7258"/>, efforts are underway to increase encryption of
      Internet traffic. Session encryption helps to prevent both passive and
      active attacks on transport protocols, with pervasive monitoring being
      primarily a passive attack. The Internet Architecture Board (IAB)
      released a statement advocating for increased use of encryption in
      November 2014. Views on acceptable encryption have also shifted and are
      documented in "Opportunistic Security" (OS) <xref target="RFC7435"/>,
      where cleartext sessions should be upgraded to unauthenticated session
      encryption, rather than no encryption. OS encourages upgrading from
      cleartext, but cannot require or guarantee such upgrades. Once OS is
      used, it allows for an upgrade to authenticated encryption. These
      efforts are necessary to improve end user's expectation of privacy,
      making pervasive monitoring cost prohibitive. Active attacks are still
      possible on sessions where unauthenticated sessions are in use.</t>

      <t>The push for ubiquitous encryption via OS is specific to improving
      privacy for everyday users of the Internet. Many attackers and those
      that pose a greater threat are already using strong encryption and tools
      like TOR <xref target="TOR"/> to prevent active attacks on their data
      streams.</t>

      <t>Although there is a push for OS, there is also work being done to
      improve implementation development and configuration flaws of TLS and
      DTLS sessions to prevent active attacks used to monitor or intercept
      session data. The (UTA) working group is in process of publishing
      documentation to improve the security of TLS and DTLS sessions. They
      have documented the known attack vectors in <xref
      target="I-D.ietf-uta-tls-attacks"/> and have documented Best Practices
      for TLS and DTLS in <xref target="I-D.ietf-uta-tls-bcp"/>.</t>

      <t>Current estimates of session encryption approximate that about 30% of
      web sites have session encryption enabled, according to the Electronic
      Frontier Foundation <xref target="EFF"/>. The Mozilla Foundation
      maintains statistics on SSL/TLS usage and as of March 2015, 64% of HTTP
      transactions are encrypted. Enterprise networks such as EMC observe that
      about 78% of outbound employee traffic was encrypted in June 2014.
      Although the actual number of sites may only be around 30%, they include
      some of the most visited sites on the Internet for corporate users.</t>

      <t>In addition to encrypted web site access (TLS over HTTP), other
      application level transport encryption efforts are underway. This
      includes a push to encrypt session transport for mail (SMTP - gateway to
      gateway) and other protocols such as instant messaging (TLS over XMPP).
      Although this does provide protection from passive wiretapping <xref
      target="RFC4949"/> attacks, the servers could be a point of
      vulnerability if user-to-user encryption is not provided for these
      messaging protocols. User-to-user content encryption schemes, such as
      S/MIME and PGP for email and Off-the-Record (OTR) for Extensible
      Messaging and Presence Protocol (XMPP) are used by those interested to
      protect their data as it crosses intermediary servers, preventing the
      vulnerability described by providing an end-to-end solution.
      User-to-user schemes are under review and additional options will emerge
      to ease the configuration requirements, making this type of option more
      accessible to non-technical users interested in protecting their
      privacy.</t>

      <t>Increased use of encryption (either opportunistic or authenticated)
      will impact operations for security and network management causing a
      shift in how these functions are performed. In some cases new methods to
      monitor and protect data will evolve, for other cases the need may be
      eliminated. This draft includes a collection of current security and
      network management functions that may be impacted by this shift to
      increased use of encryption. This draft does not attempt to solve these
      problems, but rather document the current state to assist in the
      development of alternate options to achieve the intended purpose of the
      documented practices.</t>

      <t>In this document we consider several different forms of service
      providers, so we distinguish between them with adjectives. For example,
      network service providers (or network operators) provide IP-packet
      transport primarily, though they may bundle other services with packet
      transport. Alternatively, application service providers primarily offer
      systems that participate as an end-point in communications with the
      application user, and hosting service providers lease computing,
      storage, and communications systems in datacenters. In practice, many
      companies perform two or more service provider roles, but may be
      historically associated with one.</t>
    </section>

    <section title="Network Service Provider Monitoring">
      <t>Network Service Providers (SP) are responding to encryption on the
      Internet, some helping to increase the use of encryption and others
      preventing its use. Network SPs for this definition include the backbone
      Internet Service providers as well as those providing infrastructure at
      scale for core Internet use (hosted infrastructure and services such as
      email).</t>

      <t>Following the Snowden revelations, application service providers
      responded by encrypting traffic between their data centers to prevent
      passive monitoring from taking place unbeknownst to the providers
      (Yahoo, Google, etc.). Large mail service providers also began to
      encrypt session transport to hosted mail services. This had an immediate
      impact to help protect the privacy of users data, but created a problem
      for network operators. They could no longer gain access to session
      streams resulting in actions by several to regain their operational
      practices that require cleartext data sessions.</t>

      <t>The EFF reported several network service providers taking steps to
      prevent the use of TLS over SMTP by breaking StartTLS, preventing the
      negotiation process resulting in fallback to the use of clear text. The
      use of encryption prevents middle boxes from performing functions that
      range from load balancing to monitoring for attacks or enabling "lawful
      intercept", such that described in <xref target="ETSI101331"/> and <xref
      target="CALEA"/> in the US. Some of these practices may be on the
      decline now that they are exposed through the media, but they are
      representative of the struggles administrators will have with changes in
      their ability to monitor and manage traffic.</t>

      <section title="Middlebox Monitoring">
        <t>Network service providers use various monitoring techniques for
        security and operational purposes. The following subsections detail
        the purpose of each type of monitoring and what protocol fields are
        used to accomplish the task.</t>

        <section title="Traffic Analysis Fingerprinting">
          <t>Fingerprinting is used in traffic analysis and monitoring to
          identify traffic streams that match certain patterns. This technique
          may be used with clear text or encrypted sessions. Some Distributed
          Denial of Service (DDoS) prevention techniques at the Network SP
          level rely on the ability to fingerprint traffic in order to
          mitigate the effect of this type of attack. Thus, fingerprinting may
          be an aspect of an attack or part of attack countermeasures.</t>

          <t>The first/obvious trigger for DDoS mitigation is uncharacteristic
          traffic volume and/or congestion at various points associated with
          the attackee's communications. One approach to mitigate such an
          attack involves distinguishing attacker traffic from legitimate user
          traffic through analysis. The ability to examine layers and payloads
          above transport provides a new range of filtering opportunities at
          each layer in the clear. Fewer layers are in the clear means reduced
          filtering opportunities to mitigate attacks.</t>

          <t>Traffic analysis fingerprinting could also be used on web traffic
          to perform passive monitoring and invade privacy.</t>

          <t>For example, browser fingerprints are comprised of many
          characteristics, including User Agent, HTTP Accept headers, browser
          plug-in details, screen size and color details, system fonts and
          time zone. <xref target="PANO"/> will audit these details for users.
          A monitoring system could easily identify a specific browser, and by
          correlating other information, identify a specific user.</t>
        </section>

        <section title="Traffic Surveys">
          <t>Internet traffic surveys are useful in many well-intentioned
          pursuits, such as CAIDA data <xref target="CAIDA"/> and SP network
          design and optimization. Tracking the trends in Internet traffic
          growth, from earlier peer-to-peer communication to the extensive
          adoption of unicast video streaming applications, has required a
          view of traffic composition and reports with acceptable accuracy. As
          application designers and network operators both continue to seek
          optimizations, the role of traffic surveys from passive monitoring
          grows in importance.</t>

          <t>Passive monitoring makes inferences about observed traffic using
          the maximal information available, and is subject to inaccuracies
          stemming from incomplete sampling (of packets in a stream) or loss
          due to monitoring system overload. When encryption conceals more
          layers in each packet, reliance on pattern inferences and other
          heuristics grows, and accuracy suffers. For example, the traffic
          patterns between server and browser are dependent on browser
          supplier and version, even when the sessions use the same server
          application (e.g., web e-mail access). It remains to be seen whether
          more complex inferences can be mastered to produce the same
          monitoring accuracy.</t>
        </section>

        <section title="Deep Packet Inspection (DPI)">
          <t>The features and efficiency of some Internet services can be
          augmented through analysis of user flows and the applications they
          provide. For example, network caching of popular content at a
          location close to the requesting user can improve delivery
          efficiency, and authorized parties use DPI in combination with
          content distribution networks to determine if they can intervene
          effectively. Encryption of packet contents at a given protocol layer
          usually makes inspection of that layer and higher layers impossible,
          as well as DPI processing at the formerly clear text layers.</t>

          <t>Data transfer capacity resources in cellular radio networks tend
          to be more constrained than in fixed networks. This is a result of
          variance in radio signal strength as a user moves around a cell, the
          rapid ingress and egress of connections as users hand-off between
          adjacent cells, and temporary congestion at a cell. Mobile networks
          alleviate this by queuing traffic according to its required
          bandwidth and acceptable latency: for example, a user is unlikely to
          notice a 20ms delay when receiving a simple Web page or email, or an
          instant message response, but will certainly notice a re-buffering
          pause in a video playback or a VoIP call de-jitter buffer. Ideally,
          the scheduler manages the queue so that each user has an acceptable
          experience as conditions vary, but the traffic type must be known.
          Application and transport layer encryption make the traffic type
          detection less accurate, and affect queue management.</t>
        </section>

        <section title="Connection to Proxy for Compression">
          <t>In contrast to DPI, various applications exist to provide data
          compression in order to conserve the life of the user's mobile data
          plan and optimize delivery over the mobile link. The compression
          proxy access can be built into a specific user level application,
          such as a browser, or it can be available to all applications using
          a system level application. The primary method is for the mobile
          application to connect to a centralized server as a proxy, with the
          data channel between the client application and the server using
          compression to minimize bandwidth utilization. The effectiveness of
          such systems depends on the server having access to unencrypted data
          flows. As the percentage of connections using encryption increases,
          these data compression services will be rendered less effective, or
          worse, they will adopt undesirable security practices in order to
          gain access to the unencrypted data flows.</t>
        </section>

        <section title="Mobility Middlebox Content Filtering">
          <t>Service Providers may, from time to time, be requested by law
          agencies to block access to particular sites such as online betting
          and gambling, sites promoting anorexia, or access to dating sites.
          Content Filtering can also happen at the endpoints or at the edge of
          enterprise networks. This section is intended to merely document
          this current practice by operators and the effects of encryption on
          the practice.</t>

          <t>Content filtering in the mobile network usually occurs in the
          core network. A proxy is installed which analyses the transport
          metadata of the content users are viewing and either filters content
          based on a blacklist of sites or based on the user's pre-defined
          profile (e.g. for age sensitive content). Although filtering can be
          done by many methods one common method occurs when a DNS lookup
          reveals a URL which appears on a government or recognized
          block-list. The subsequent requests to that domain will be re-routed
          to a proxy which checks whether the full URL matches a blocked URL
          on the list, and will return a 404 if a match is found. All other
          requests should complete.</t>

          <t>Even with encrypted connections, transport and lower layer
          metadata is able to be viewed. As such, systems content filtering
          should be able to continue in most applications. Cases when they may
          not work include when TLS proxies are being used which obscure
          metadata with the proxy metadata, and future versions of HTTP and
          TCP that may encrypt metadata, preventing content filtering software
          from working (this is currently not the case and has not been
          standardized).</t>

          <t>Another form of content filtering is called parental control,
          where some users are deliberately denied access to age-sensitive
          content as a feature to the service subscriber. Some sites involve a
          mixture of universal and age-sensitive content and filtering
          software. In these cases, more granular (application layer) metadata
          may be used to analyze and block traffic, which will not work on
          encrypted content.</t>

          <t>See the Appendix for more information on "Encryption Impact on
          Mobility Network Optimizations and New Services".</t>
        </section>

        <section title="Access and Policy Enforcement">
          <section title="Server load balancing">
            <t>Where network load balancers have been configured to route
            according to application-layer semantics, an encrypted payload is
            effectively invisible. This has resulted in practices of
            intercepting TLS in front of load balancers to regain that
            visibility, but at a cost to security and privacy.</t>
          </section>

          <section title="Network Access">
            <t>Approved access to a network is a prerequisite to requests for
            Internet traffic - hence network access, including any
            authentication and authorization, is not impacted by
            encryption.</t>

            <t>Cellular networks often sell tariffs that allow free-data
            access to certain sites, known as 'zero rating'. A session to
            visit such a site incurs no additional cost or data usage to the
            user. This feature may be impacted if encryption hides the domain
            from the network. This topic and related material are described
            further in the Appendix.</t>
          </section>

          <section title="Regulation and policy enforcement">
            <t>Mobile networks (and usually ISPs) operate under the
            regulations of their licensing government authority. These
            regulations include Lawful Intercept, adherence to Codes of
            Practice on content filtering, and application of court order
            filters.</t>

            <t>These functions are impacted by encryption, typically by
            allowing a less granular means of implementation. The enforcement
            of any Net Neutrality regulations is unlikely to be affected by
            content being encrypted.</t>
          </section>

          <section title="SPAM and malware filtering">
            <t>This has typically required full access to application data to
            filter various keywords, fraudulent headers and virus attachments.
            Additional details for SPAM and malware filtering can be found in
            Section 5.</t>
          </section>
        </section>
      </section>

      <section title="Network Monitoring for Performance Management and Troubleshooting">
        <t>Similar to DPI, the performance of some services can be more
        efficiently managed and repaired when information on user transactions
        is available to the service provider. It may be possible to continue
        such monitoring activities without clear text access to the
        application layers of interest, but inaccuracy will increase and
        efficiency of repair activities will decrease. Also, there may be more
        cases of user communication failures when the additional encryption
        processes are introduced, leading to more customer service contacts
        and (at the same time) less information available to network
        operations repair teams.</t>

        <t>With the growing use of WebSockets <xref target="RFC6455"/>, many
        forms of communications (from isochronous/real-time to bulk/elastic
        file transfer) will take place over HTTP port 80, so only the messages
        and higher-layer data will make application differentiation possible.
        If the monitoring systems sees only "HTTP port 443", it cannot
        distinguish application streams that would benefit from priority
        queueing from others that would not. In short, systems that invoked
        policies for the user's benefit are rendered less-effective (or
        in-effective) by encryption of information they once viewed
        easily.</t>
      </section>

      <section title="Inter Data Center Encryption">
        <t>The use of encryption at an IP-level between data centers of large
        application service providers has increased as a result of revelations
        that governments were passively monitoring these connections. [How has
        security and operations monitoring of these session been impacted or
        has that been fully addressed and how? Storage section contains one
        example that fits this scenario.]</t>

        <section title="new section">
          <t>[Needs for monitoring from an operational perspective could be in
          subsections to this bullet, contributions welcome to understand and
          document the struggle to determine alternate approaches in
          subsequent efforts. This should include specific monitoring goals as
          well as what is currently used to achieve those goals - how and
          why.]</t>
        </section>
      </section>
    </section>

    <section title="Encryption in Hosting SP Environments">
      <t>Hosted environments have had varied requirements in the past for
      encryption, with many businesses choosing to use these services
      primarily for data and applications that are not business or privacy
      sensitive. A shift prior to the revelations on surveillance/passive
      monitoring began where businesses were asking for hosted environments to
      provide higher levels of security so that additional applications and
      service could be hosted externally. Businesses understanding the threats
      of monitoring in hosted environments only increased that pressure to
      provide more secure access and session encryption to protect the
      management of hosted environments as well as for the data and
      applications.</t>

      <section title="Management Access Security">
        <t>Hosted environments may have multiple levels of management access,
        where some may be strictly for the Hosting SP (infrastructure that may
        be shared among customers) and some may be accessed by a specific
        customer for application management. In some cases, there are multiple
        levels of hosting service providers, further complicating the security
        of management infrastructure and the associated requirements.</t>

        <t>Hosting service provider management access is typically segregated
        from other traffic with a control channel and may or may not be
        encrypted depending upon the isolation characteristics of the
        management session. Customer access may be through a dedicated
        connection, but this is becoming less common with newer hosted service
        models leveraging the Internet.</t>

        <section title="Customer Access Monitoring">
          <t>Hosted applications that allow some level of customer management
          access may also require monitoring by the hosting service provider.
          The monitoring needs could include access control restrictions such
          as authentication, authorization, and accounting for filtering and
          firewall rules to ensure they are continuously met. Customer access
          may occur on multiple levels, including user-level and
          administrative access. The hosting service provider may need to
          monitor access either through session monitoring or log evaluation
          to ensure security service level agreements (SLA) for access
          management are met. The use of session encryption to access hosted
          environments will limit the ability to use session data to ensure
          access restrictions are maintained. Monitoring and filtering may
          occur at an: <list style="hanging">
              <t hangText="2-tuple">IP-level with source and destination IP
              addresses alone, or</t>

              <t hangText="5-tuple">IP and protocol-level with source IP
              address, destination IP address, protocol number, source port
              number, and destination port number.</t>
            </list></t>

          <t>Session encryption at the application level, TLS for example,
          currently allows access to the 5-tuple. IP-level encryption, such as
          IPsec in tunnel mode prevents access to the 5-tuple and may limit
          the ability to restrict traffic via filtering techniques. This shift
          may not impact all hosting service provider solutions as alternate
          controls may be used to authenticate sessions or access may require
          that mobile clients access such services by first connecting to the
          organization before accessing the hosted application. Shifts in
          access may be required to maintain equivalent access control
          management. Logs may also be used for monitoring access control
          restrictions are met, but would be limited to the data that could be
          observed due to encryption at the point of log generation. Log
          analysis is out of scope for this document.</t>
        </section>

        <section title="Application SP Content Monitoring">
          <t>The following observations apply to any IT organization that is
          responsible for delivering services, whether to third-parties, for
          example as a web based service, or to internal customers in an
          Enterprise, e.g. a data processing system that forms a part of the
          Enterprise&rsquo;s business.</t>

          <t>Organizations responsible for the operation of a data center have
          many processes which access the contents of IP packets. These
          processes are typically for service assurance or cyber-security
          purposes and form an integral and mission-critical part of data
          center operations.</t>

          <t>Examples include:</t>

          <t><list style="empty">
              <t>- Network Performance Monitoring/Application Performance
              Monitoring</t>

              <t>- Intrusion defense/prevention systems</t>

              <t>- Malware detection/explosion</t>

              <t>- Fraud Monitoring</t>

              <t>- Application DDOS protection</t>

              <t>- Cyber-attack investigation</t>

              <t>- Proof of regulatory compliance</t>
            </list>Many application service providers simply terminate
          sessions to/from the Internet at the edge of the data center in the
          form of SSL/TLS offload in the load balancer. Not only does this
          reduce the load on application servers, it simplifies the processes
          listed above.</t>

          <t>However, in some situations, encryption deeper in the data center
          may be necessary to protect personal information or in order to meet
          industry regulations, e.g. those set out by the Payment Card
          Industry (PCI). In such situations, various methods can be used to
          allow trusted service assurance and cyber-security processes to
          access unencrypted data. These include SSL/TLS decryption in
          dedicated units, which then forward packets to trusted tools, or by
          real-time or post-capture decryption in the tools themselves.</t>

          <t>Data center operators may also maintain packet recordings in
          order to be able to investigate cyber attacks, breach of internal
          processes, etc. In some industries, organizations may be legally
          required to maintain such information for compliance purposes.
          Investigations of this nature require access to the unencrypted
          contents of the packet.</t>

          <t>Application Service Providers may offer content-level monitoring
          options to detect intellectual property leakage, or other attacks.
          The use of session encryption will prevent Data Leakage Protection
          (DLP) used on the session streams from accessing content to search
          on keywords or phases to detect such leakage. DLP is often used to
          prevent the leakage of Personally Identifiable Information (PII) as
          well as financial account information, Personal Health Information
          (PHI), and Payment Card Information (PCI). If session encryption is
          terminated at a gateway prior to accessing these services, DLP on
          session data can still be performed. The decision of where to
          terminate encryption to hosted environments will be a risk decision
          made between the application service provider and customer
          organization according to their priorities. DLP can be performed at
          the server for the hosted application and on an end users system in
          an organization as alternate or additional monitoring points of
          content, however is not frequently done in a service provider
          environment.</t>

          <t>Secure overlay networks may be used in multi-tenancy scenarios to
          provide isolation assurance and thwart some active attacks. Section
          7 of <xref target="RFC7348"/> describes some of the security issues
          possible when deploying VXLAN on Layer 2 networks. Rogue endpoints
          can join the multicast groups that carry broadcast traffic, for
          example. Tunneled traffic on VXLAN can be secured by using IPsec,
          but this adds the requirement for authentication infrastructure and
          may reduce packet transfer performance. Deployment of data path
          acceleration technologies can help to mitigate the performance
          issues, but they also bring more complex networking and
          management.</t>
        </section>
      </section>

      <section title="Hosted Applications">
        <t>Organizations are increasingly using hosted applications rather
        than in house solutions that require maintenance of equipment and
        software. Examples include Enterprise Resource Planning (ERP)
        solutions, payroll service, time and attendance, travel and expense
        reporting among others. Organizations may require some level of
        management access to these hosted applications and will typically
        require session encryption or a dedicated channel for this
        activity.</t>

        <t>In other cases, hosted applications may be fully managed by a
        hosting service provider with service level agreement expectations for
        availability and performance as well as for security functions
        including malware detection.</t>

        <section title="Monitoring needs for Managed Applications">
          <t>Performance, availability, and other aspects of a SLA are often
          collected through passive monitoring. For example:<list
              style="symbols">
              <t>Availability: ability to establish connections with hosts to
              access applications, and discern the difference between network
              or host-related causes of unavailability.</t>

              <t>Performance: ability to complete transactions within a target
              response time, and discern the difference between network or
              host-related causes of excess response time.</t>
            </list></t>

          <t>Here, as with all passive monitoring, the accuracy of inferences
          are dependent on the cleartext information available, and encryption
          would tend to reduce the information and therefore, the accuracy of
          each inference.</t>
        </section>

        <section title="Mail Service Providers">
          <t>Mail (application) service providers vary in what services they
          offer. Options may include a fully hosted solution where mail is
          stored external to an organization's environment on mail service
          provider equipment or the service offering may be limited to monitor
          incoming mail to remove SPAM [Section 5.1], malware [Section 5.6],
          and phishing attacks [Section 5.3] before mail is directed to the
          organization's equipment. In both of these cases, content of the
          messages and headers is monitored to detect SPAM, malware, phishing,
          and other messages that may be considered an attack.</t>

          <t>In addition to the monitoring needs for specific attack types
          discussed in Section 6, mail service providers [Need descriptions
          for other types of monitoring performed. What is used now in their
          monitoring? How will use of TLS between servers impact their ability
          to monitor for security or operations? Users have no idea if the TLS
          covers their entire session stream or if it's left in clear text
          over some of the hops in this hop-by-hop protection - does this
          matter and how does it impact monitoring or do monitoring needs lead
          to this problem (broken STARTTLS negotiations)?</t>

          <t>Many efforts are emerging to improve user-to-user encryption to
          protect end user's privacy. Some of these efforts involve encryption
          of email header information such as the message subject. Mail system
          operators could still find enough helpful information in the rest of
          the header fields if the subject was no longer accessible, however
          it could reduce effectiveness of administrators. In some cases,
          administrators may search on mail systems for known subject fields
          of abuse messages from inboxes or mail queues to remove phishing or
          other messages that contain malware or links to malware. Their
          ability to perform prevention may be more limited with full
          deployment of end-to-end mail encryption with header fields
          inaccessible. The header fields <xref target="RFC2822"/> used most
          often in their operational work include:<list style="symbols">
              <t>Subject: - may be considered privacy sensitive</t>

              <t>To:/From: - may be considered privacy sensitive</t>

              <t>Received: from</t>

              <t>Date:</t>

              <t>Sent:</t>
            </list></t>
        </section>
      </section>

      <section title="Data Storage">
        <t>Numerous service offerings exist that provide hosted storage
        solutions. This section describes the various offerings and details
        the monitoring for each type of service and how encryption may impact
        the operational and security monitoring performed.</t>

        <t>Trends in data storage encryption for hosted environments include a
        range of options. The following list is intentionally high-level to
        describe the types of encryption used in coordination with data
        storage that may be hosted remotely, meaning the storage is physically
        located in an external data center requiring transport over the
        Internet. Options for monitoring will vary with both approaches from
        what may be done today.</t>

        <section title="Host-level Encryption">
          <t>For higher security and/or privacy of data and applications,
          options that provide end-to-end encryption of the data from the
          users desktop or server to the storage platform may be preferred.
          With this description, host level encryption includes any solution
          that encrypts data at the object level, not transport. Encryption of
          data may be performed with libraries on the system or at the
          application level, which includes file encryption services via a
          file manager. Host-level encryption is useful when data storage is
          hosted or when in scenarios when storage location is determined
          based on capacity or based on a set of parameters to automate
          decisions. This could mean that large data sets accessed
          infrequently could be sent to an off-site storage platform at an
          external hosting service, data accessed frequently may be stored
          locally, or decision could be based on the transaction type.
          Host-level encryption is grouped separately for the purpose of this
          document as the monitoring needs as this data is bursted to off-site
          storage platforms, where traffic crosses the Internet, are similar.
          If session encryption is used, the protocol is likely to be TLS.</t>

          <section title="Monitoring for Hosted Storage">
            <t>The general monitoring needs of hosted storage solutions that
            use host-level (object) encryption is described in this
            subsection. Solutions might include backup services and external
            storage services, such as those that burst data that exceeds
            internal limits on occasion to external storage platforms operated
            by a third party.</t>

            <t>Monitoring of data flows to hosted storage solutions is
            performed for security and operational purposes. The security
            monitoring may be to detect anomalies in the data flows that could
            include changes to destination, the amount of data transferred, or
            alterations in the size and frequency of flows. Operational
            considerations include capacity and availability monitoring.</t>
          </section>
        </section>

        <section title="Disk Encryption, Data at Rest">
          <t>There are multiple ways to achieve full disk encryption for
          stored data. Encryption may be performed on data to be stored while
          in transit close to the storage media with solutions like Controller
          Based Encryption (CBE) or in the drive system with Self-Encrypting
          Drives (SED). Session encryption is typically coupled with
          encryption of these data at rest (DAR) solutions to also protect
          data in transit. Transport encryption is likely via TLS.</t>

          <section title="Monitoring Session Flows for DAR Solutions">
            <t>The general monitoring needs for transport of data to storage
            platforms, where object level encryption is performed close to or
            on the storage platform are similar to those described in the
            section on Monitoring for Hosted Storage. The primary difference
            for these solutions is the possible exposure of sensitive
            information, which could include privacy related data, financial
            information, or intellectual property if session encryption via
            TLS is not deployed. Session encryption is typically used with
            these solutions, but that decision would be based on a risk
            assessment. There are use cases where DAR or disk-level encryption
            is required. Examples include preventing exposure of data if
            physical disks are stolen or lost as data is decrypted upon access
            when that access is from the expected and configured application
            or service.</t>
          </section>
        </section>

        <section title="Cross Data Center Replication Services">
          <t>Storage services also include data replication which may occur
          between data centers and may leverage Internet connections to tunnel
          traffic. The traffic may use iSCSI <xref target="RFC7143"/> or FC/IP
          <xref target="RFC7146"/> encapsulated in IPsec. Either transport or
          tunnel mode may be used for IPsec depending upon the termination
          points of the IPsec session, if it is from the storage platform
          itself or from a gateway device at the edge of the data center
          respectively.</t>

          <section title="Monitoring Of IPSec for Data Replication Services">
            <t>The general monitoring needs for data replication are described
            in this subsection.</t>

            <t>Monitoring of data flows between data centers may be performed
            for security and operational purposes and would typically
            concentrate more on the operational needs since these flows are
            essentially virtual private networks (VPN) between data centers.
            Operational considerations include capacity and availability
            monitoring. The security monitoring may be to detect anomalies in
            the data flows, similar to what was described in the "Monitoring
            for Hosted Storage Section".</t>
          </section>
        </section>
      </section>
    </section>

    <section title="Encryption for Enterprise Users">
      <t>Encryption of network traffic within the private enterprise is a
      growing trend, particularly in industries with audit and regulatory
      requirements. Some enterprise internal networks are almost completely
      TLS and/or IPsec encrypted.</t>

      <t>For each type of monitoring, different techniques and access to parts
      of the data stream are part of current practice. As we transition to an
      increased use of encryption that is increasingly harder to break,
      alternate methods of monitoring for operational purposes may be
      necessary to prevent the need to break encryption and thus privacy of
      users (other policies may apply in some enterprise settings).</t>

      <section title="Monitoring Needs of the Enterprise">
        <t>Large corporate enterprises are the owners of the platforms, data,
        and network infrastructure that provide critical business services to
        their user communities. As such, these enterprises are responsible for
        all aspects of the performance, availability, security, and quality of
        experience for all user sessions. These responsibilities break down
        into three basic areas:<list style="numbers">
            <t>Security Monitoring and Control</t>

            <t>Application Performance Monitoring and Reporting</t>

            <t>Network Diagnostics and Troubleshooting</t>
          </list></t>

        <t>In each of the above areas, technical support teams utilize
        collection, monitoring, and diagnostic systems. Some organizations
        currently use attack methods such as static RSA private keys to
        decrypt passively monitored copies of encrypted TLS packet
        streams.</t>

        <t>For an enterprise to avoid costly application down time and deliver
        expected levels of performance, protection, and availability, some
        forms of traffic analysis sometimes including examination of packet
        payloads are currently used.</t>

        <section title="Security Monitoring in the Enterprise">
          <t>Enterprise users are subject to the policies of their
          organization. As such, proxies may be in use to:<list
              style="numbers">
              <t>intercept outbound session traffic to monitor for
              intellectual property leakage (by users or more likely these
              days through malware and trojans),</t>

              <t>detect viruses/malware entering the network via email or web
              traffic,</t>

              <t>detect malware/Trojans in action, possibly connecting to
              remote hosts,</t>

              <t>detect attacks (Cross site scripting and other common web
              related attacks),</t>

              <t>track misuse and abuse by employees,</t>

              <t>restrict the types of protocols permitted to/from the
              corporate environment,</t>

              <t>detect and defend against Internet DDoS attacks, including
              both volumetric and layer 7 attacks.</t>
            </list>A significant portion of malware hides its activity within
          TLS or other encrypted protocols. This includes lateral movement,
          Command and Control, and Data Exfiltration. These functions are
          critical to security and fraud monitoring.</t>
        </section>

        <section title="Application Performance Monitoring in teh Enterprise">
          <t>There are two main goals of monitoring:</t>

          <t><list style="numbers">
              <t>Assess traffic volume on a per-application basis, for
              billing, capacity planning, optimization of geographical
              location for servers or proxies, and other needs.</t>

              <t>Assess performance in terms of application response time and
              user perceived response time.</t>
            </list>Network-based Application Performance Monitoring tracks
          application response time by user and by URL, which is the
          information that the application owners and the lines of business
          need. Content Delivery Networks (CDNs) add complexity in determining
          the ultimate endpoint destination. By their very nature, such
          information is obscured by CDNs and encrypted protocols -- adding a
          new challenge for troubleshooting network and application problems.
          URL identification allows the application support team to do
          granular, code level troubleshooting at multiple tiers of an
          application.</t>

          <t>New methodologies to monitor user perceived response time and to
          separate network from server time are evolving. For example, the
          IPv6 Destination Option implementation of Performance and Diagnostic
          Metrics (PDM) will provide this.
          [draft-ietf-ippm-6man-pdm-option-06]</t>
        </section>

        <section title="Enterprise Network Diagnostics and Troubleshooting">
          <t>One primary key to network troubleshooting is the ability to
          follow a transaction through the various tiers of an application in
          order to isolate the fault domain. A variety of factors relating to
          the structure of the modern data center and the modern multi-tiered
          application have made it impossible to follow a transaction in
          network traces without the ability to examine some of the packet
          payload.</t>

          <section title="NAT">
            <t>Content Delivery Networks (CDNs) and NATs obscure the ultimate
            endpoint designation. Troubleshooting a problem for a specific end
            user requires finding information such as the IP address and other
            identifying information so that their problem can be resolved in a
            timely manner.</t>

            <t>NAT is also frequently used by lower layers of the data center
            infrastructure. Firewalls, Load Balancers, Web Servers, App
            Servers, and Middleware servers all regularly NAT the source IP of
            packets. Combine this with the fact that users are often allocated
            randomly by load balancers to all these devices, the network
            troubleshooter is often left with no option in today's environment
            except to trace all packets at a particular layer, decrypt them
            all, and look at the payload to find a user session.</t>

            <t>This kind of bulk packet capture and bulk decryption is
            frequently used when troubleshooting a large and complex
            application. Endpoints typically don't have the capacity to handle
            this level of network packet capture, so out-of-band networks of
            robust packet brokers and network sniffers that depend on static
            RSA private keys accomplish this task today.</t>
          </section>

          <section title="TCP Pipelining/Session Multiplexing">
            <t>When TCP Pipelining/Session Multiplexing is used, usually by
            Middle boxes today, multiple end user sessions share the same TCP
            connection. Today's network troubleshooter often relies upon
            session decryption to tell which packet belongs to which end
            user.</t>

            <t>With the advent of HTTP2, session multiplexing will be used
            ubiquitously, both on the Internet and in the private data
            center.</t>
          </section>

          <section title="HTTP Service Calls">
            <t>When an application server makes an HTTP service call to back
            end services on behalf of a user session, it uses a completely
            different URL and a completely different TCP connection. It must
            be possible to match up the user request above with the HTTP
            service call below. Today, this is done by decrypting the TLS
            packet and inspecting the payload.</t>
          </section>

          <section title="Application Layer Data">
            <t>Modern applications often use XML structures in the payload of
            the data to store application level information. When the network
            and application teams must work together, each has a different
            view of the transaction failure. It is important to be able to
            correlate the network packet with the actual problem experienced
            by an application.</t>
          </section>
        </section>
      </section>

      <section title="Techniques for Monitoring Internet Session Traffic">
        <t>Corporate networks commonly monitor outbound session traffic to
        detect or prevent attacks as well as to guarantee service level
        expectations. In some cases, alternate options are available when
        encryption is in use, but techniques like that of data leakage
        prevention tools at a proxy would not be possible if encrypted traffic
        can not be intercepted, thus creating a gap and encouraging alternate
        options.</t>

        <t>Data leakage detection prevention (DLP) tools intercept traffic at
        the Internet gateway or proxy services with the ability to
        man-in-the-middle (MiTM) encrypted session traffic (HTTP/TLS). These
        tools may use key words important to the enterprise including business
        sensitive information such as trade secrets, financial data,
        personally identifiable information (PII), or personal health
        information (PHI). Various techniques are used to intercept HTTP/TLS
        sessions for DLP and other purposes, and are described in "Summarizing
        Known Attacks on TLS and DTLS" <xref
        target="I-D.ietf-uta-tls-attacks"/>. Note: many corporate policies
        allow access to personal financial and other sites for users without
        interception.</t>

        <t>Monitoring traffic patterns for anomalous behavior such as
        increased flows of traffic that could be bursty at odd times or flows
        to unusual destinations (small or large amounts of traffic). This
        traffic may or may not be encrypted and various methods of encryption
        or just obfuscation may be used.</t>

        <t>Restrictions on traffic to approved sites: Web proxies are
        sometimes used to filter traffic, allowing only access to well-known
        sites known to be legitimate and free of malware on last check by a
        proxy service company. This type of restriction is usually not
        noticeable in a corporate setting, but may be to those in research who
        could access colleagues individual sites or new web sites that have
        not yet been screened. In situations where new sites are required for
        access, they can typically be added after notification by the user or
        proxy log alerts and review. Home mail account access may be blocked
        in corporate settings to prevent another vector for malware to enter
        as well as for intellectual property to leak out of the network. This
        method remains functional with increased use of encryption and may be
        more effective at preventing malware from entering the network. Web
        proxy solutions monitor and potentially restrict access based on the
        destination URL or the DNS name. A complete URL may be used in cases
        where access restrictions vary for content on a particular site or for
        the sites hosted on a particular server.</t>

        <t>Desktop DLP tools are used in some corporate environments as well.
        Since these tools reside on the desktop, they can intercept traffic
        before it is encrypted and may provide a continued method of
        monitoring intellectual property leakage from the desktop to the
        Internet or attached devices.</t>

        <t>DLP tools can also be deployed by Network Service providers, as
        they have the unique and efficient vantage point of monitoring all
        traffic paired with destinations off the enterprise network. This
        makes an effective solution for enterprises that allow "bring-you-own"
        devices and devices that do not fit the desktop category, but are used
        on corporate networks nonetheless.</t>

        <t>Enterprises may wish to reduce the traffic on their Internet access
        facilities by monitoring requests for within-policy content and
        caching it. In this case, repeated requests for Internet content
        spawned by URLs in e-mail trade newsletters or other sources can be
        served within the enterprise network. Gradual deployment of end to end
        encryption would tend to reduce the cacheable content over time, owing
        to concealment of critical headers and payloads. Many forms of
        enterprise performance management and optimization based on monitoring
        (DPI) would suffer the same fate.</t>
      </section>
    </section>

    <section title="Security Monitoring for Specific Attack Types">
      <t>Effective incident response today requires collaboration at Internet
      scale. This section will only focus on efforts of collaboration at
      Internet scale that are dedicated to specific attack types. They may
      require new monitoring and detection techniques in an increasingly
      encrypted Internet. As mentioned previously, some service providers have
      been interfering with STARTTLS to prevent session encryption to be able
      to perform functions they are used to (injecting ads, monitoring, etc.).
      By detailing the current monitoring methods used for attack detection
      and response, this information can be used to devise new monitoring
      methods that will be effective in the changed Internet via collaboration
      and innovation.</t>

      <section title="Mail Abuse and SPAM ">
        <t>The largest operational effort to prevent mail abuse is through the
        Messaging, Malware, Mobile Anti-Abuse Working Group (M3AAWG)<xref
        target="M3AAWG"/>. Mail abuse is combated directly with mail
        administrators who can shut down or stop continued mail abuse
        originating from large scale providers that participate in using the
        Abuse Reporting Format (ARF) agents standardized in the IETF <xref
        target="RFC5965"/>, <xref target="RFC6430"/>, <xref
        target="RFC6590"/>, <xref target="RFC6591"/>, <xref
        target="RFC6650"/>, <xref target="RFC6651"/>, and <xref
        target="RFC6652"/>. The ARF agent directly reports abuse messages to
        the appropriate service provider who can take action to stop or
        mitigate the abuse. Since this technique uses the actual message, the
        use of TLS over SMTP between mail gateways will not effect its
        usefulness. As mentioned previously, TLS over SMTP only protects data
        while in transit and the messages may be exposed on mail servers or
        mail gateways if a user-to-user encryption method is not used. Current
        user-to-user message encryption methods on email (S/MIME and PGP) do
        not encrypt the email header information used by ARF and the service
        provider operators in their abuse mitigation efforts.</t>
      </section>

      <section title="Denial of Service">
        <t>Response to Denial of Service (DoS) attacks are typically
        coordinated by the SP community with a few key vendors who have tools
        to assist in the mitigation efforts. Traffic patterns are determined
        from each DoS attack to stop or rate limit the traffic flows with
        patterns unique to that DoS attack.</t>

        <t>Data types used in monitoring traffic for DDoS are described in
        Open Threat Signaling using RPC API over HTTPS and IPFIX
        (DDoSMitigation: <xref
        target="I-D.teague-open-threat-signaling"/>).</t>

        <t>Data types used in DDoS attacks have been detailed in the IODEF
        Guidance draft <xref target="I-D.ietf-mile-iodef-guidance"/>, Appendix
        A.2, with the help of several members of the service provider
        community. The examples provided are intended to help identify the
        useful data in detecting and mitigating these attacks independent of
        the transport and protocol descriptions in the drafts.</t>
      </section>

      <section title="Phishing">
        <t>Investigations and response to phishing attacks follow well-known
        patterns, requiring access to specific fields in email headers as well
        as content from the body of the message. When reporting phishing
        attacks, the recipient has access to each field as well as the body to
        make content reporting possible, even when end-to-end encryption is
        used. The email header information is useful to identify the mail
        servers and accounts used to generate or relay the attack messages in
        order to take the appropriate actions. The content of the message
        often contains an embedded attack that may be in an infected file or
        may be a link that results in the download of malware to the users
        system.</t>

        <t>Administrators often find it helpful to use header information to
        track down similar message in their mail queue or users inboxes to
        prevent further infection. Combinations of To:, From:, Subject:,
        Received: from header information might be used for this purpose.
        Administrators may also search for document attachments of the same
        name, size, or containing a file with a matching hash to a known
        phishing attack. Administrators might also add URLs contained in
        messages to block lists locally or this may also be done by browser
        vendors through larger scales efforts like that of the Anti-Phishing
        Working Group (APWG).</t>

        <t>A full list of the fields used in phishing attack incident response
        can be found in RFC5901. Future plans to increase privacy protections
        may limit some of these capabilities if some email header fields are
        encrypted, such as To:, From:, and Subject: header fields. This does
        not mean that those fields should not be encrypted, only that we
        should be aware of how they are currently used. Alternate options to
        detect and prevent phishing attacks may be needed. More recent
        examples of data exchanged in spear phishing attacks has been detailed
        in the IODEF Guidance draft <xref
        target="I-D.ietf-mile-iodef-guidance"/>, Appendix A.3.</t>
      </section>

      <section title="Botnets">
        <t>Botnet detection and mitigation is complex and may involve hundreds
        or thousands of hosts with numerous Command and Control (C&amp;C)
        servers. The techniques and data used to monitor and detect each may
        vary. Connections to C&amp;C servers are typically encrypted,
        therefore a move to an increasingly encrypted Internet may not affect
        the detection and sharing methods used.</t>
      </section>

      <section title="Malware">
        <t>Malware monitoring and detection techniques vary. As mentioned in
        the enterprise section, malware monitoring may occur at gateways to
        the organization analyzing email and web traffic. These services can
        also be provided by service providers, changing the scale and location
        of this type of monitoring. Additionally, incident responders may
        identify attributes unique to types of malware to help track down
        instances by their communication patterns on the Internet or by
        alterations to hosts and servers.</t>

        <t>Data types used in malware investigations have been summarized in
        an example of the IODEF Guidance draft <xref
        target="I-D.ietf-mile-iodef-guidance"/>, Appendix A.1.</t>
      </section>

      <section title="Spoofed Source IP Address Protection ">
        <t>The IETF has quickly reacted to spoofed source IP address-based
        attacks, recommending the use of network ingress filtering <xref
        target="RFC2827"/> and the unicast Reverse Path Forwarding (uRPF)
        mechanism [not BCP84]<xref target="RFC2504"/>. But uRPF suffers from
        limitations regarding its granularity: a malicious node can still use
        a spoofed IP address included inside the prefix assigned to its link.
        The Source Address Validation Improvements (SAVI) mechanisms try to
        solve this issue. Basically, a SAVI mechanism is based on the
        monitoring of a specific address assignment/management protocol (e.g.,
        SLAAC <xref target="RFC4682"/>, SEND <xref target="RFC3791"/>,
        DHCPv4/v6 <xref target="RFC2131"/><xref target="RFC3315"/>) and,
        according to this monitoring, set-up a filtering policy allowing only
        the IP flows with a correct source IP address (i.e., any packet with a
        source IP address, from a node not owning it, is dropped). The
        encryption of parts of the address assignment/management protocols,
        critical for SAVI mechanisms, can result in a dysfunction of the SAVI
        mechanisms.</t>
      </section>

      <section title="Further work">
        <t>Although incident response work will continue, new methods to
        prevent system compromise through security automation and continuous
        monitoring [SACM] may provide alternate approaches where system
        security is maintained as a preventative measure.</t>
      </section>
    </section>

    <section title="Application-based Flow Information Visible to a Network">
      <t>This section describes specific techniques used in monitoring
      applications that may apply to various network types.</t>

      <section title="TLS Server Name Indication">
        <t>When initiating the TLS handshake, the Client may provide an
        extension field (server_name) which indicates the server to which it
        is attempting a secure connection. TLS SNI was standardized in 2003 to
        enable servers to present the "correct TLS certificate" to clients in
        a deployment of multiple virtual servers hosted by the same server
        infrastructure and IP-address. Although this is an optional extension,
        it is today supported by all modern browsers, web servers and
        developer libraries. Notable exceptions are Android 2.2 and Internet
        Explorer 6 on Windows XP. It should be noted that HTTP/2 introduces
        the Alt-SVC method for upgrading the connection from HTTP/1 to either
        unencrypted or encrypted HTTP/2. If the initial HTTP/1 request is
        unencrypted, the destination alternate service name can be identified
        before the communication is potentially upgraded to encrypted HTTP/2
        transport. HTTP/2 implementations MUST support the Server Name
        Indication (SNI) extension.</t>

        <t>This information is only visible if the client is populating the
        Server Name Indication extension. This need not be done, but may be
        done as per TLS standard. Therefore, even if existing network filters
        look out for seeing a Server Name Indication extension, they may not
        find one. The per-domain nature of SNI may not reveal the specific
        service or media type being accessed, especially where the domain is
        of a provider offering a range of email, video, Web pages etc. For
        example, certain blog or social network feeds may be deemed 'adult
        content', but the Server Name Indication will only indicate the server
        domain rather than a URL path to be blocked.</t>
      </section>

      <section title="Application Layer Protocol Negotiation (ALPN)">
        <t>ALPN is a TLS extension which may be used to indicate the
        application protocol within the TLS session. This is likely to be of
        more value to the network where it indicates a protocol dedicated to a
        particular traffic type (such as video streaming) rather than a
        multi-use protocol. ALPN is used as part of HTTP/2 'h2', but will not
        indicate the traffic types which may make up streams within an HTTP/2
        multiplex.</t>
      </section>

      <section title="Content Length, BitRate and Pacing">
        <t>The content length of encrypted traffic is effectively the same as
        the cleartext. Although block ciphers utilise padding this makes a
        negligible difference. Bitrate and pacing are generally application
        specific, and do not change much when the content is encrypted.
        Multiplexed formats (such as HTTP/2 and QUIC) may however incorporate
        several application streams over one connection, which makes the
        bitrate/pacing no longer application-specific.</t>
      </section>
    </section>

    <section title="Response to Increased Encryption and Looking Forward ">
      <t>As the use of encryption continues to increase, efforts to prevent it
      will continue to emerge. In the best case scenario, engineers and other
      innovators would work to solve the problems at hand in new ways rather
      than prevent the use of encryption. It will take time to devise
      alternate approaches to achieve similar goals.</t>

      <t>There has already been documented cases of service providers
      preventing STARTTLS <xref target="NoEncrypt"/> to prevent session
      encryption negotiation on some session to inject a super cookie. There
      are other service providers who have been injecting Java Script into
      sessions <xref target="Net-Neutral"/>, which has obvious security
      implications as well as threatens Net-Neutrality. The use of session
      encryption will help to prevent possible discrimination to maintain net
      neutrality, but a backlash should be expected.</t>

      <t>National surveillance programs have a clear need for monitoring
      terrorism <xref target="CharlieHebdo"/> as do Internet security
      practitioners for cyber criminal activities. The UK prime minister,
      David Cameron, emphasized the need for monitoring <xref
      target="UKMonitor"/> at the expense of user privacy and protection of
      data and assets. This approach ignores the real need to protect users
      identity, financial transactions and intellectual property, which
      requires security and encryption to prevent cyber crime. A clear
      understanding of technology, encryption, and monitoring needs will aid
      in the development of solutions to appropriately balance the need of
      privacy and avoid the fears of terrorism. As this understanding
      increases, hopefully the discussions will improve and this draft is
      meant to help further the discussion.</t>

      <t>Terrorists and cyber criminals have been using encryption for many
      years. The current push to increase encryption is aimed at increasing
      users privacy. There is already protection in place for purchases,
      financial transactions, systems management infrastructure, and
      intellectual property although this too can be improved. The
      Opportunistic Security (OS) <xref target="RFC7435"/> efforts aim to
      increase the costs of monitoring through the use of encryption that can
      be subject to active attacks, but make passive monitoring broadly cost
      prohibitive. This is meant to restrict monitoring to sessions where
      there is reason to have suspicion.</t>

      <t>As the use of encryption increases, does passive monitoring become
      limited to metadata analysis? What metadata should be left in protocols
      as they evolve to also protect users privacy? Can we make changes to
      protocols and message exchanges to alter the current monitoring needs at
      least for operations and security practitioners?</t>

      <t>Options are on the technology horizon that will help to end the
      struggle between the need to monitor by operators, security teams, and
      nations and those seeking to protect users privacy. The solutions are
      very interesting, but are several years out and include homomorphic
      encrypt, functional encryption, and filterable decryption <xref
      target="homomorphic"/>. This technology will allow for searching and
      pattern matching on encrypted data, but is still several years out.</t>
    </section>

    <section anchor="Security" title="Security Considerations">
      <t>There are no additional security considerations as this is a summary
      and does not include a new protocol or functionality.</t>
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <t>This memo makes no requests of IANA.</t>
    </section>

    <section anchor="Acknowledgements" title="Acknowledgements">
      <t>Thanks to our reviewers, Natasha Rooney, Kevin Smith, Ashutosh Dutta,
      Brandon Williams, Jean-Michel Combes, Nalini Elkins and Paul Barrett for
      their editorial and content suggestions. Surya K. Kovvali provided
      material for the Appendix.</t>
    </section>

    <section title="Appendix: Impact on Mobility Network Optimizations and New Services"
             toc="default">
      <t>This Appendix considers the effects of transport level encryption on
      existing forms of mobile network optimization techniques, as well as
      potential new services.</t>

      <section title="Effect of Encypted ACKs">
        <t>When the ACK stream is encrypted, it prevents the following mobile
        network features from operating:<list style="letters">
            <t>Measurement of Network Segment (Sector, eNodeB (eNB) etc.)
            characterization KPIs (Retransmissions, packet drops, Sector
            Utilization Level etc.), estimation of User/Service KQIs at
            network edges for circuit emulation (CEM), and mitigation methods.
            The active services per user and per sector are not visible to a
            server that only services Internet Access Point Names (APN), and
            thus could not perform mitigation functions based on network
            segment view.</t>

            <t>Retransmissions by trusted proxies at network edges that
            improve live transmission over long delay, capacity-varying
            networks.</t>

            <t>Content replication near the network edge (for example live
            video, DRM protected content) to maximize QOE. Replicating every
            stream through the transit network increases backhaul cost for
            live TV.</t>

            <t>Ability to deploy trusted proxies that reduce control
            round-trip time (RTT) between the TCP transmitter and receiver.
            The RTT determines how quickly a user&rsquo;s attempt to cancel a
            video is recognized (how quickly the traffic is stopped, thus
            keeping un-wanted video packets from entering the radio scheduler
            queue).</t>

            <t>Trusted proxy with low RTT determines the responsiveness of TCP
            flow control, and enables faster adaptation in a delay &amp;
            capacity varying network due to user mobility. Low RTT permits use
            of a smaller send window, which makes the flow control loop more
            responsive to changing mobile network conditions.</t>

            <t>Opportunistic RAN-Aware pacing, acceleration, and deferral of
            high volume content such as video or software updates.</t>
          </list></t>

        <t/>
      </section>

      <section title="Effect of Encrypted Transport Headers">
        <t>When the Transport Header is encrypted, it prevents the following
        mobile network features from operating:<list style="letters">
            <t>Application-type-aware network edge (middlebox) that could
            control pacing, limit simultaneous HD videos, prioritize active
            videos against new videos, etc.</t>

            <t>For the Access Network Discovery and Selection Function
            (3GPP-ANDSF), it Impedes content-aware network selection for
            steering users or specific flows to appropriate Networks.</t>

            <t>For Self Organizing Networks (3GPP SON) &ndash; intelligent SON
            workflows such as content-ware MLB (Mobility Load Balancing)</t>

            <t>For User Plane Congestion Management (3GPP UPCON) &ndash;
            ability to understand content and manage network during
            congestion. Mitigating techniques such as deferred download,
            off-peak acceleration, and outbound roamers.</t>

            <t>Reduces the benefits IP/DSCP-based transit network delivery
            optimizations; since the multiple applications are multiplexed
            within the same 5-tuple transport connection, the DSCP markings
            would not correspond to an application flow.</t>

            <t>Advance notification for dense data usages &ndash; If the
            application types are visible, transit network element could warn
            (ahead of usage) that the requested service consumes user plan
            limits, and transmission could be terminated. Without such
            visibility the network might have to continue the operation and
            stop the operation after the limit, because partially loaded
            content wastes resources and may not be usable by the client thus
            increasing customer complaints. Content publisher will not know
            user-service plans, and Network Edge would not know data transfer
            lengths before large object is requested.</t>
          </list></t>

        <t/>
      </section>

      <section title="Effect of Encryption on New Services">
        <t>This section describes some new mobile services and how they might
        be affected with transport encryption:<list style="numbers">
            <t>Flow-based charging allowing zero-rated and monetized traffic;
            for example operators may charge nothing, or charge based on
            domain/URLs.</t>

            <t>Content/Application based Prioritization of Over-the-Top (OTT)
            services &ndash; each application-type or service has different
            delay/loss/throughput expectations, and each type of stream will
            be unknown to an edge device if encrypted; this impedes
            dynamic-QoS adaptation.</t>

            <t>Rich Communication Services (3GPP-RCS) using different Quality
            Class Indicators (QCIs in LTE) &ndash; Operators offer different
            QoS classes for value-added services. The QCI type is visible in
            RAN control plane and invisible in user plane, thus the QCI cannot
            be set properly when the application -type is unknown.</t>

            <t>Enhanced Multimedia Broadcast/Multicast Services (3GPP eMBMS)
            &ndash; trusted edge proxies facilitate delivering same stream to
            different users, using either unicast or multicast depending on
            channel conditions to the user.</t>

            <t>Transport level protection is unnecessary for already protected
            content (such as content with Digital Rights Management, DRM). It
            prevents multi-user replication, and tandem encryption stages
            increase required processing cycles.</t>
          </list></t>

        <t/>
      </section>

      <section title="Effect of Encryption on Mobile Network Evolution">
        <t>The transport header encryption prevents trusted transit proxies.
        It may be that the benefits of such proxies could be achieved by end
        to end client &amp; server optimizations and distribution using CDNs,
        plus the ability to continue connections across different access
        technologies (across dynamic user IP addresses). The following aspects
        need to be considered in this approach:<list style="numbers">
            <t>In a wireless mobile network, the delay and channel capacity
            per user and sector varies due to coverage, contention, user
            mobility, and scheduling balances fairness, capacity and service
            QoE. If most users are at the cell edge, the controller cannot use
            more complex QAM, thus reducing total cell capacity; similarly if
            a UMTS edge is serving some number of CS-Voice Calls, the
            remaining capacity for packet services is reduced.</t>

            <t>Inbound Roamers: Mobile wireless networks service in-bound
            roamers (Users of Operator A in a foreign operator Network B) by
            backhauling their traffic though Operator B&rsquo;s network to
            Operator A&rsquo;s Network and then serving through the P-Gateway
            (PGW), General GPRS Support Node (GGSN), Content Distribution
            Network (CDN) etc., of Operator A (User&rsquo;s Home Operator).
            Increasing window sizes to compensate for the path RTT will have
            the limitations outlined earlier for TCP.</t>

            <t>Outbound Roamers: Similar to inbound roamers, users accessing
            different Core/Content network, for example domains not serviced
            via local CDNs are carried through operator network via different
            APN or GW to remote networks which increases path RTT &amp;
            control loop.</t>

            <t>Issues in deploying CDNs in RAN: Decreasing Client-Server
            control loop requires deploying CDNs/Cloud functions that
            terminate encryption closer to the edge. In Cellular RAN, the user
            IP traffic is encapsulated into GPSR Tunneling Protocol-User Plane
            (GTP-U in UMTS and LTE) tunnels to handle user mobility; the
            tunnels terminate in APN/GGSN/PGW that are in central locations.
            One user's traffic may flow through one or more APN&rsquo;s (for
            example Internet APN, Roaming APN for Operator X, Video-Service
            APN, OnDeckAPN etc.). The scope of operator private IP addresses
            may be limited to specific APN. Since CDNs generally operate on
            user IP flows, deploying them would require enhancing them with
            tunnel translation, etc., tunnel management functions.</t>

            <t>While CDNs that de-encrypt flows or split-connection proxy
            (similar to split-tcp) could be deployed closer to the edges to
            reduce control loop RTT, with transport header encryption, such
            CDNs perform optimization functions only for partner client flows;
            thus content from Small-Medium Businesses (SMBs) would not get
            such CDN benefits.</t>

            <t>Mobile Edge Computing (MEC) initiative to push latency
            sensitive functions to the edge of the network; for example a
            trusted proxy could facilitate services between two devices in RAN
            without requiring content flow through the WebServer.</t>
          </list></t>

        <t/>
      </section>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <?rfc include="reference.RFC.4949"?>

      <?rfc ?>

      <?rfc ?>

      <?rfc ?>
    </references>

    <references title="Informative References">
      <reference anchor="TOR">
        <front>
          <title>TOR ...</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="EFF">
        <front>
          <title>Electronic Frontier Foundation https://www.eff.org/</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="PANO">
        <front>
          <title>Panopticlick [https://panopticlick.eff.org/]</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="CAIDA">
        <front>
          <title>CAIDA [http://www.caida.org/data/overview/]</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="CALEA">
        <front>
          <title>Communications Assistance for Law Enforcement Act
          (CALEA)</title>

          <author>
            <organization>Pub. L. No. 103-414, 108 Stat. 4279, codified at 47
            USC 1001-1010</organization>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="ETSI101331">
        <front>
          <title>Telecommunications security; Lawful Interception (LI);
          Requirements of Law Enforcement Agencies</title>

          <author fullname="http://www.etsi.org/">
            <organization>ETSI TS 101 331 V1.1.1 (2001-08)</organization>
          </author>

          <date month="August" year="2001"/>
        </front>
      </reference>

      <reference anchor="M3AAWG">
        <front>
          <title>Messaging, Malware, Mobile Anti-Abuse Working Group (M3AAWG)
          https://www.maawg.org/</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="NoEncrypt">
        <front>
          <title>ISPs Removing their Customers EMail Encryption
          https://www.eff.org/deeplinks/2014/11/starttls-downgrade-attacks/</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="Net-Neutral">
        <front>
          <title>Comcast Wifi serving self-promotional ads via JavaScript
          injection
          http://arstechnica.com/tech-policy/2014/09/why-comcasts-javascript-ad-injections-threaten-security-net-neutrality/</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="CharlieHebdo">
        <front>
          <title>Europe Considers Surveillance Expansion After Deady Attacks
          https://firstlook.org/theintercept/2015/01/20/europe-considers-surveillance-expansion/</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="UKMonitor">
        <front>
          <title>Cameron wants to ban encryption
          http://www.theguardian.com/commentisfree/2015/jan/13/cameron-ban-encryption-digital-britain-online-shopping-banking-messaging-terror</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="homomorphic">
        <front>
          <title>Securing the Cloud
          http://newsoffice.mit.edu/2013/algorithm-solves-homomorphic-encryption-problem-0610</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <?rfc include='reference.RFC.2822'?>

      <?rfc include='reference.RFC.2131'?>

      <?rfc include='reference.RFC.2504'?>

      <?rfc include='reference.RFC.2827'?>

      <?rfc include='reference.RFC.3315'?>

      <?rfc include='reference.RFC.3791'?>

      <?rfc include='reference.RFC.4682'?>

      <?rfc include='reference.RFC.5965'?>

      <?rfc include='reference.RFC.6455'?>

      <?rfc include='reference.RFC.6591'?>

      <?rfc include='reference.RFC.6650'?>

      <?rfc include='reference.RFC.6651'?>

      <?rfc include='reference.RFC.6652'?>

      <?rfc include="reference.RFC.7258"?>

      <?rfc include='reference.RFC.6590'?>

      <?rfc include='reference.RFC.6430'?>

      <?rfc include="reference.RFC.7143"?>

      <?rfc include="reference.RFC.7146"?>

      <?rfc include='reference.RFC.7348'?>

      <?rfc include="reference.RFC.7435"?>

      <?rfc include='reference.I-D.teague-open-threat-signaling'?>

      <?rfc include='reference.I-D.ietf-uta-tls-bcp'?>

      <?rfc include='reference.I-D.ietf-uta-tls-attacks'?>

      <?rfc include='reference.I-D.ietf-mile-iodef-guidance'?>
    </references>
  </back>
</rfc>
