Re: [Apn] Further revised draft Charter

Adrian Farrel <adrian@olddog.co.uk> Fri, 20 January 2023 10:41 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: apn@ietfa.amsl.com
Delivered-To: apn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7512CC1516EB for <apn@ietfa.amsl.com>; Fri, 20 Jan 2023 02:41:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.793
X-Spam-Level:
X-Spam-Status: No, score=-2.793 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=olddog.co.uk
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fu1B8mFwrl8M for <apn@ietfa.amsl.com>; Fri, 20 Jan 2023 02:41:23 -0800 (PST)
Received: from mta6.iomartmail.com (mta6.iomartmail.com [62.128.193.156]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B3C7C15155F for <apn@ietf.org>; Fri, 20 Jan 2023 02:41:18 -0800 (PST)
Received: from vs2.iomartmail.com (vs2.iomartmail.com [10.12.10.123]) by mta6.iomartmail.com (8.14.7/8.14.7) with ESMTP id 30KAfDJe021500; Fri, 20 Jan 2023 10:41:13 GMT
Received: from vs2.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 25EE846050; Fri, 20 Jan 2023 10:41:13 +0000 (GMT)
Received: from vs2.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 199D74604C; Fri, 20 Jan 2023 10:41:13 +0000 (GMT)
Received: from asmtp3.iomartmail.com (unknown [10.12.10.224]) by vs2.iomartmail.com (Postfix) with ESMTPS; Fri, 20 Jan 2023 10:41:13 +0000 (GMT)
Received: from LAPTOPK7AS653V ([148.252.129.177]) (authenticated bits=0) by asmtp3.iomartmail.com (8.14.7/8.14.7) with ESMTP id 30KAfBp4018669 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 20 Jan 2023 10:41:12 GMT
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Ted Hardie' <ted.ietf@gmail.com>, 'Donald Eastlake' <d3e3e3@gmail.com>
Cc: apn@ietf.org
References: <CAF4+nEFHcKBbc7J8v3yj_b6V1==4yUBOOhdazR2yrP75Gcd0mA@mail.gmail.com> <051d01d92b82$73cda4a0$5b68ede0$@olddog.co.uk> <CAF4+nEGj_94YoG330zb5-p6BGaJ5Cce3tuiVDt-eo7E6NaCU5w@mail.gmail.com> <CA+9kkMAQcjd4Xckd9wiQiyUCQe0FxwHaOiZ5efZDHmWvYpThoQ@mail.gmail.com>
In-Reply-To: <CA+9kkMAQcjd4Xckd9wiQiyUCQe0FxwHaOiZ5efZDHmWvYpThoQ@mail.gmail.com>
Date: Fri, 20 Jan 2023 10:41:10 -0000
Organization: Old Dog Consulting
Message-ID: <062101d92cbb$b70ab8e0$25202aa0$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0622_01D92CBB.B70AB8E0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGEgfInFnurhIWzvF1Gqu8rqha5hQHfXx/oAVD6CgUB0ivsk68oXkjQ
Content-Language: en-gb
X-Originating-IP: 148.252.129.177
X-Thinkmail-Auth: adrian@olddog.co.uk
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=olddog.co.uk; h=reply-to :from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:content-type; s=20221128; bh=OvNU7rTC4ot01zQ8gcq5X pB80SyV6FyLkMROk5+GORY=; b=n92JZfgCOCWbZ1z6oCuAsVOqDlH1aoDmtig1h MF7tsclieHnYO3jEJWrP6vS2FD8+3YIpTDS7RLEmrtQblggSZwODViieXelLf1Un bDTrcI5GXYzZmcG1r66nd+M8SGEAO0gQFzzpr/h/3uxF+6aJJyaN51dNgkqqTbPc WE0jDMGsJYPTdcc3RHc9fMGWDPcRor4ZHY1aQO72F5ML5mWgFAk85TQvRozng17x tzZeiZJe5nFiwokVzk0FOmiIkYfb7XibdvhQyG6udSRYyQmXwNYkYgJUJHBCHQ+Q l3RmgLdsAdXruLWkvJuhiKP8MartOeSSZQdpVCodT4z3d1jcA==
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2090-9.0.0.1002-27396.007
X-TM-AS-Result: No--26.840-10.0-31-10
X-imss-scan-details: No--26.840-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2090-9.0.1002-27396.007
X-TMASE-Result: 10--26.839600-10.000000
X-TMASE-MatchedRID: gjZGo2H/wj/xIbpQ8BhdbC+6f/7y7+GzQIh82BfGiLeBAXl9LkPp6c8a vaNw7yisNkzb1b6A+O7HRysWYf09DyAmIgW+RL/xrmLeMrcoM6gejl8XURi8fCEcqonSWvl58p0 MViqPhdGPicpvDb9uaUc4SVhF+nu8gNVHXM3C8e74FqzGb25nh5aFO9XLY12UIxXwf7Xnk/cXo4 6ROIade/CwAYeQ2rzJXpWeL1owpdpEXwnTCGfm3f0peXGEEBlvDvKSaIxu6kpXG3yI9k2vbCpYA mrFxIhiLkTtdgQKNN5Se6rq1H4K1f+z7xWvCPyPzH6d90mb4+KOVGny5q72hiPS9JdK3W4/tAgK 4TtXrP2NA7k11Cii62ZAYNwGoQD1jblrY21oF3xsCltwTmzMU5kShYcLpGH95qOldExPCaP6rA5 sDO02DFTXEHlJoVbTKoWa7+H+3Du7gAzWLdoW9i+PrAd8gbHJnTcLR8+TzEqFTK6KCpk+DC/p/E ilsSmL92grUwQgYZd5OPD8XJFfpB8TzIzimOwPgxsfzkNRlfIDOZGFGsyhFbDszp3K5gqDhUfR2 rvBju4D/dHyT/Xh7Q==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/apn/HKcL1w2qYmbeSZ8lRc9ev0Y4xA0>
Subject: Re: [Apn] Further revised draft Charter
X-BeenThere: apn@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Application-aware Networking <apn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/apn>, <mailto:apn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/apn/>
List-Post: <mailto:apn@ietf.org>
List-Help: <mailto:apn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/apn>, <mailto:apn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jan 2023 10:41:30 -0000

Ted, you beat me to it.

 

Yes, the whole point of “exposure” is not that it is being wilfully displayed, but that an attacker (who finds a way of viewing or copying traffic) can see every non-encrypted field every packet (on a link or at a node).

 

While enterprise networks may consider themselves better protected than service provider networks (where the links are in public spaces), it turns out that enterprises are similarly vulnerable, partly because their traffic may be more valuable.

 

A

 

From: Ted Hardie <ted.ietf@gmail.com> 
Sent: 20 January 2023 08:54
To: Donald Eastlake <d3e3e3@gmail.com>
Cc: adrian@olddog.co.uk; apn@ietf.org
Subject: Re: [Apn] Further revised draft Charter

 

Hi Donald,

 

On Fri, Jan 20, 2023 at 6:05 AM Donald Eastlake <d3e3e3@gmail.com <mailto:d3e3e3@gmail.com> > wrote:


The use of the APNET Field inside an APNET network domain would not
generally expose it to "outside observers" unless all the traffic in
the domain was so exposed 

 

I agree with the statement above and disagree with the statement below.  I think you're entirely right to say that the field would only be exposed if the network traffic were generally exposed.  On the other hand, the lesson of pervasive surveillance is and was that the amount of traffic being hoovered up is always more than you think.  Presuming it will be available to an attacker is a far safer assumption than assuming that this is rare.  Certainly I would expect the security considerations to presume that such attackers were within the threat model.

 

regards,

 

Ted Hardie

 

 

 

which I think is something that would rarely
happen rather than "necessarily" happen. But some more could be said
about privacy and security