[Accord] Cross-layer Cooperation for Encrypted Traffic

Natasha Rooney <nrooney@gsma.com> Tue, 29 March 2016 09:27 UTC

Return-Path: <nrooney@gsma.com>
X-Original-To: accord@ietfa.amsl.com
Delivered-To: accord@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CA1A12D5B9 for <accord@ietfa.amsl.com>; Tue, 29 Mar 2016 02:27:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.921
X-Spam-Level:
X-Spam-Status: No, score=-1.921 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gsmasso.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tAEdUcxXfSNG for <accord@ietfa.amsl.com>; Tue, 29 Mar 2016 02:27:51 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0053.outbound.protection.outlook.com [104.47.0.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5BC712D128 for <accord@ietf.org>; Tue, 29 Mar 2016 02:27:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=GSMASSO.onmicrosoft.com; s=selector1-gsma-com; h=From:To:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=cDhePfbJuusS0iCfye9NMGrjvwD5s0tYcx4eujil+zY=; b=DDeP3b5RL2SGsvWvfSgWDI4B3u+tPUp0gGg/5GtxJRzPxptScX7qyqn2tAmCe5x//LoOcWtbbQ9xWY8Eq3HxxKi/radt8uCJvv3Z/iTNcxBjZwiI3WFlmjVfwCJsVEq2jxPLUWtLFPvcpChaXiPdp5WAuf/gQexDni7Q8v2S6h0=
Received: from HE1PR04MB1033.eurprd04.prod.outlook.com (10.162.26.142) by HE1PR04MB1033.eurprd04.prod.outlook.com (10.162.26.142) with Microsoft SMTP Server (TLS) id 15.1.447.15; Tue, 29 Mar 2016 09:27:47 +0000
Received: from HE1PR04MB1033.eurprd04.prod.outlook.com ([10.162.26.142]) by HE1PR04MB1033.eurprd04.prod.outlook.com ([10.162.26.142]) with mapi id 15.01.0447.023; Tue, 29 Mar 2016 09:27:47 +0000
From: Natasha Rooney <nrooney@gsma.com>
To: "accord@ietf.org" <accord@ietf.org>
Thread-Topic: Cross-layer Cooperation for Encrypted Traffic
Thread-Index: AQHRiZ1BXaaeTzo9fUKUSfDUW1ecgg==
Date: Tue, 29 Mar 2016 09:27:47 +0000
Message-ID: <4957A25F-671C-4EC2-B8BF-29AA90B576EB@gsma.com>
References: <mailman.55.1459105216.27435.tsvwg@ietf.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3112)
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=gsma.com;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [87.112.202.8]
x-ms-office365-filtering-correlation-id: f130f48d-7705-4c83-b58a-08d357b46405
x-microsoft-exchange-diagnostics: 1; HE1PR04MB1033; 5:4ZvPHupTSOZWhcqVPf8y0YOUr48aIIA6nvA8zN+6rGoslqR1oiedydIGq4xw3gjSE4XjWssznA4W3M+ULFRtwpa/oSim3+IZQFRknRD/X43Y+rdpBpvzez3mELhhLFjkA9H4GHBJ+HxnO9vszCmMqw==; 24:KUnGbTc5ufjczIqrxKONac4lCBc6jA/YWXp862ba7afVoFdLQphuymRCLv+X//YHrHs/vpa4rVfnWfNTivrinPDu2fOgQds8YyPNh934s8U=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:HE1PR04MB1033;
x-microsoft-antispam-prvs: <HE1PR04MB1033AFA8346B6C642463E13EC3870@HE1PR04MB1033.eurprd04.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046); SRVR:HE1PR04MB1033; BCL:0; PCL:0; RULEID:; SRVR:HE1PR04MB1033;
x-forefront-prvs: 0896BFCE6C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(52314003)(377424004)(53754006)(450100001)(2501003)(15975445007)(5890100001)(50986999)(122556002)(76176999)(57306001)(189998001)(10400500002)(86362001)(33656002)(5640700001)(1096002)(77096005)(19617315012)(1220700001)(3846002)(6116002)(102836003)(586003)(19580395003)(19580405001)(66066001)(16236675004)(92566002)(2351001)(1730700002)(5002640100001)(2900100001)(3660700001)(36756003)(3280700002)(82746002)(83716003)(110136002)(107886002)(50226001)(81166005)(2906002)(106116001)(5008740100001)(229853001)(5004730100002)(11100500001)(104396002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR04MB1033; H:HE1PR04MB1033.eurprd04.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_4957A25F671C4EC2B8BF29AA90B576EBgsmacom_"
MIME-Version: 1.0
X-OriginatorOrg: gsma.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Mar 2016 09:27:47.1947 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72a4ff82-fec3-469d-aafb-ac8276216699
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR04MB1033
X-MS-Exchange-CrossPremises-AuthAs: Internal
X-MS-Exchange-CrossPremises-AuthMechanism: 04
X-MS-Exchange-CrossPremises-AuthSource: HE1PR04MB1033.eurprd04.prod.outlook.com
X-MS-Exchange-CrossPremises-SCL: 1
X-MS-Exchange-CrossPremises-messagesource: StoreDriver
X-MS-Exchange-CrossPremises-BCC:
X-MS-Exchange-CrossPremises-originalclientipaddress: 87.112.202.8
X-MS-Exchange-CrossPremises-avstamp-service: 1.0
X-MS-Exchange-CrossPremises-disclaimer-hash: 78ca8040c6722e32c2f5b0a45bf37e74b9409d645a53be96aa19958e0cee0f00
X-MS-Exchange-CrossPremises-antispam-scancontext: DIR:Originating; SFV:NSPM; SKIP:0;
X-MS-Exchange-CrossPremises-processed-by-journaling: Journal Agent
X-OrganizationHeadersPreserved: HE1PR04MB1033.eurprd04.prod.outlook.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/accord/MNNB-_otzr5yGssIhT94XtxSONo>
Subject: [Accord] Cross-layer Cooperation for Encrypted Traffic
X-BeenThere: accord@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Alternatives to Content Classification for Operator Resource Deployment <accord.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/accord>, <mailto:accord-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/accord/>
List-Post: <mailto:accord@ietf.org>
List-Help: <mailto:accord-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/accord>, <mailto:accord-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2016 09:27:54 -0000

Hi all,

You may be interested to read this "Cross-layer Cooperation for Encrypted Traffic" draft which was submitted to TSVWG this week.

https://datatracker.ietf.org/doc/draft-chen-tsvwg-crosslayer-cooperation/

Thanks!

Natasha


Natasha Rooney | Technologist, Web and Internet, W3C & IETF | GSMA | nrooney@gsma.com | +44 (0) 7730 219 765 | @thisNatasha | Skype: nrooney@gsm.org






A new version of I-D, draft-chen-tsvwg-crosslayer-cooperation-00.txt

has been successfully submitted by Hao Chen and posted to the IETF repository.



Name:               draft-chen-tsvwg-crosslayer-cooperation

Revision:  00

Title:                  Cross-layer Cooperation for Encrypted Traffic

Document date:       2016-03-20

Group:               Individual Submission

Pages:               7

URL:            https://www.ietf.org/internet-drafts/draft-chen-tsvwg-crosslayer-cooperation-00.txt

Status:         https://datatracker.ietf.org/doc/draft-chen-tsvwg-crosslayer-cooperation/

Htmlized:       https://tools.ietf.org/html/draft-chen-tsvwg-crosslayer-cooperation-00





Abstract:

  This memo mainly considers the requirement and feasibility of cross-

  layer design in the encrypted traffic scenario.



  By permitting the interaction between the encrypted application layer

  and non-encrypted transport/network layer, the network layer may

  schedule service flow more properly and the application layer may

  know the network status information well, which actually optimize the

  network bandwidth.









Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.



The IETF Secretariat


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailarchive.ietf.org/arch/browse/tsvwg/attachments/20160327/231492e7/attachment.html>

------------------------------

Message: 2
Date: Sat, 26 Mar 2016 20:30:02 -0800
From: Melinda Shore <melinda.shore@gmail.com>
To: tsvwg@ietf.org
Subject: Re: [tsvwg] FW: New Version Notification for
draft-chen-tsvwg-crosslayer-cooperation-00.txt
Message-ID: <56F761CA.7030502@gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed

This draft addresses an extremely interesting problem without
giving sufficient detail to understand exactly what's being
proposed.  For example, it's not clear whether you're proposing
protocol modification (replicating header data in adjacent layers)
or an implementation modification.  If it's an implementation
modification, then you'll be able to avoid developing new headers
for the entire protocol stack (ahem) but you won't be able to
do much about middleboxes which perform any kind of traffic
inspection.  I can't even tell if what you're proposing involves
key sharing (please don't) or exposing encrypted information
(please don't).

As an aside, I'm always sorry when a document that proposes something
with profound implications for security and privacy has an empty
security considerations section.

Anyway, as I wrote earlier I really cannot tell from the draft what's
actually being proposed.  I have a strong bias towards solving this
sort of problem with explicit signaling, which is something that's
come up quite a bit in the past (and in the present, with PCP).  It's
a good problem to work on but would benefit from a much greater
level of detail in the discussion.

Melinda



End of tsvwg Digest, Vol 143, Issue 35
**************************************


This email and its attachments are intended for the above named only and may be confidential. If they have come to you in error you must take no action based on them, nor must you copy or show them to anyone; please reply to this email or call +44 207 356 0600 and highlight the error.