Deutsch   English   Français   Italiano  
<20240929.040919.c3b01cec@remailer.frell.eu.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Message-Id: <20240929.040919.c3b01cec@remailer.frell.eu.org>
Date: Sun, 29 Sep 2024 04:09:19 +0200
References: <1f19a554-8a81-ce8c-8ac6-7ab1e053a632@isc.org>
 <20240928175855.53dO95Q78HGZ@sewer.dizum.com>
Subject: Re: ISC will likely be shutting down FTP access to ftp.isc.org soon
 (https will remain)
Content-Transfer-Encoding: 7bit
From: D <J@M>
Newsgroups: news.software.nntp
Path: ...!news.mixmin.net!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
Bytes: 11368
Lines: 192

On Sat, 28 Sep 2024 17:58:55 -0000, Timothy C. May <tcmay@netcom.com> wrote:
>On Thu, 26 Sep 2024 22:17:36 +0000
>Dan Mahoney <dmahoney@isc.org> wrote:
>> All,
>> ISC is the operator of the F-root DNS server as well as the makers of
>> BIND, ISC DHCP, Kea, as well as historic other pieces of software.  We
>> also have had a long relationship with the team that makes INN.  For
>> largely historical reasons, ISC also works with those same authors to
>> publish a canonical list of newsgroups over at ftp.isc.org.
>
>Keep being historical. This is Usenet, after all. First if you abandon FTP, how
>long will it be before we see a similar letter from you abandoning NNTP in favor
>of Mastodon or some other newfangled, censorship-friendly, rent-seeking protocol
>because of misguided client security concerns?
>
>> However, as ISC also offers support contracts for BIND and Kea, and those
>> customers have their own due diligence policies, we are often subject to
>> scrutiny and audits about how our network runs, and even for a venerable
>> URL like ftp.isc.org, we get questions from auditors like "did you know
>> you have a public FTP server on your network!  Why!?"
>
>It's not your fault they don't understand how FTP works. And I am skeptical of
>this explanation for reasons I will elaborate below.
>
>> FTP is also unencrypted, (ftps really never gained any traction as a url
>> scheme), and in the modern internet, a push for SSL everywhere feels
>> reasonable as well.  The days of hosting mirrors of other FTP sites seem
>> to belong to a bygone era, and I've disabled the generation of old-school
>> files like MIRRORED.BY and ls-lr.gz.
>
>It doesn't need to be a bygone era. You could make the same argument for NNTP
>and Usenet. You might as well just pull the plug now and abolish the Big 8. The
>Big 8 and Usenet are from the bygone era FTP hails from, so why not just drop it
>all at once and enjoy the advertising-driven modern web with its HTTPS cabal
>tightening the noose around everything? If the rationale is that FTP is
>outdated, then the same logic should apply to the Big 8 and all of Usenet, the C
>programming language, the Perl programming language, and canvas sneakers.
>
>> We also no longer live in the world where a copy of curl/wget that
>> supports modern ciphers is not available everywhere.
>
>This is comparing apples and oranges. Curl and wget don't facilitate directory
>browsing and FTP/SFTP uploading, downloading, and batch commands in the simple
>and interactive way facilitated by FTP.
>
>> Ergo, it seems to be a simple enough matter to tell people who fetch
>> those usenet control files via anonymous FTP to simply switch to HTTPS.
>
>Simple, it may be. But is it necessary or optimal? That depends on where the
>censorship goblins embed their controls and peddle pullers in the HTTPS
>ecosystem. Because that _is_ a thing right now.
>
>> As a benefit, this also allows us to use the CDN provider we already use
>> for downloads.isc.org.  The url would remain ftp.isc.org, and the pathing
>> would remain the same.  We'd still sync the data from Russ as we already
>> do).
>
>Better yet, why not demand the CDN support unauthenticated FTP? It would
>probably take one of their programmers about three hours to have a working alpha
>implementation.
>
>> We do not have a specific date yet (this depends on specific feedback from
>> the community), but on the order of a month or two sounds reasonable.  If
>> any software, such as INN, ships with the "ftp" protocol baked-in, this
>> gives enough time for people to put out new releases and docs that point
>> at the change, or at least add the change to their README's, and the like.
>
>Perhaps you might be referring to 'simpleftp' or 'actsync' used with INN? This
>speaks to my point above about outdating being ubiquitious rather than
>selective. FTP is part of NNTP management and this has been so for decades.
>Slicing out FTP is like amputating a hand or foot from the ecosystem.
>
>> If/when this happens I'd likely also make a quick post to a few other
>> network operator places, and suggestions as to where to do so are welcome.
>> If there are objections or considerations, please feel free to reply here
>> or contact me directly.
>
>You could proxy the HTTPS site to a external FTP server that just translates
>the requests. This would move the FTP target off your network. Anyone trying to
>call it a security risk would be admitting that every browser connection to your
>HTTPS site is also a security risk.
>
>> Regards,
>> -Dan
>
>I have more thoughts on why FTP is actually not outdated but is actually being
>underrated in favor of centralized control schemes that are highly overrated and
>present massive attack surfaces and censorship mechanisms (looking at you, HTTPS
>cabal).
>
>One can serve digitally signed and even encrypted files via ftp, removing the
>need for SSL and certificate authorities. Encryption can be handled on user,
>event, and file basis rather than connection streams negotiated with certificate
>lookups. It is actually simpler and leaves both sysop and client in control of
>their mutual interactions. Cryptography and authentication then occurs on a per-
>object basis rather than a per-connection basis. The 3rd party certificate
>authority in the middle _is_ the proverbial 'man-in-the-middle'.
>
>The push for SSL, TLS, and HTTPS on everything is a push to give certificate
>authorities defacto control over accessibility to all networked hosts, including
>a centralized veto. I dont't trust the rationales given for this. Had people
>understood the power being ceded to these scheming Poindexters and their pocket-
>protector clout companies, they likely would have called for heads and pounds of
>flesh.
>
>It looks like the censorship infrastructure is being pushed via centralized
>control of cryptography, specifically signatures and authentication.
>
>Step 1: Force everyone to use SSL.
>
>        - Require certificate authorities.
>        - Require browser pre-configuration.
>        - Require exploitable attack surface in server and browser handshakes.
>
>Result: defacto 3rd party power to blacklist resources or insert backdoors.
>
>Step 2: Force everyone to use 2FA and passkeys.
>
>        - Your SMS number is blacklisted, you can't connect.
>        - Your SMS number is linked to a bad social credit score and so you are
>          punished.
>        - Your passkeys are identifiable and revokable by 3rd parties.
>
>Result: defacto blacklisting ability of user authentication.
>
>Step 3: Require active monitoring of dissidents based upon installed or
>registered certificates and passkeys.
>
>        - Down-chain subkey signing can be used to insert cipher keys that
>          allow transparent MITM proxying.
>        - The government or corporations can then substitute man-in-the middle
>          certificates for selected connections.
>        - The government or corporations can then block individual connections
>          and authentication.
>        - The user is completely oblivious if being monitored.
>        - The user is completely helpless without remedy if being censored or
>          blocked.
>
>Use the The Onion Network as a syllogism for this. It would not be much work to
>alter the TOR protocol from a mixnet to a key-based authentication network.
>Currently TOR is open. With subtle changes, it can be converted to a access
>control ecosystem. Whoever then registers and verifies the keys then has the
>power to grant or deny access. Extapolate that to the larger Internet for
>comparison.
>
>If the files on a FTP server are digitally signed with the downloader verifying
>signatures then the connection is technically secure even if plaintext. None of
>these hazards presented by certificate authorities exist in the simpler scheme
>of per-object cryptography. The government would need to cut the pipe at the ISP
>and the affected parties would know immediately and have recourse. Certificate
>schemes offer sneakier ways to fiddle around with these liberties.
>
>Moreover, authenticated FTP can present unique cipher keys for encryption and
>decryption based on user and server preferences, and plug in any algorithm
>desired or allowed by the mutual parties. It's not really outdated. It is just
>under-used, underrated, and not fully explored in its potential.
>
>In other words, the only substantial thing SSL / TLS / HTTPS do that FTP
>doesn't do is farm out control over user cryptography to 3rd parties. Thus the
>security protocol can be remotely transformed into the censorship protocol with
>the flip of a switch or click of a mouse. Many a hacker working on the source
>code would unflinchingly accept a bribe to insert a back door bug. Any
>government can secretly mandate insertion of backdoor bugs or MITM keys with gag
>orders. What is being done with 'security' is contrary to the stated purposes of
>the Internet--free and open access to information while retaining privacy of the
>user and data.
>
>Don't bore me with lame arguments that the bean counters don't realize this is
>the infrustructure being layered over the data. That is what it is. It is
>centralized, fragile, exploitable and unnecessary. The pocket-protector
>praetorians are solving every problem we didn't know we had, making things
>vastly more complex and exploitable in the process. At least all this complexity
>boondoggle keeps racking up the billable hours, right?
>
>Simpler schemes would have been more fitting while allowing control to remain
>exclusively between the negotiating parties. If it were up to me I would let the
>banks and online shoppers use their certificate authorities, and let everyone
>else alone with better alternatives instead of trying to shoehorn the whole
>world into a Chinese finger puzzle buried in a jello mold. This way the CA only
>has power to try censoring those with deep pockets, who would then get into the
>CA pockets to teach them a lesson.
>
>Theoretically, dropping FTP would allow CAs to shut down or inconvenience a
>Usenet peer. Although not likely now, circumstances and motives have a way of
========== REMAINDER OF ARTICLE TRUNCATED ==========