Re: [arch-d] draft-iab-m-ten-workshop

Wes Hardaker <wjhns1@hardakers.net> Mon, 14 August 2023 20:21 UTC

Return-Path: <wjhns1@hardakers.net>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCA46C152577 for <architecture-discuss@ietfa.amsl.com>; Mon, 14 Aug 2023 13:21:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hardakers.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YO_FEVUmVLd3 for <architecture-discuss@ietfa.amsl.com>; Mon, 14 Aug 2023 13:21:48 -0700 (PDT)
Received: from mail.hardakers.net (mail.hardakers.net [107.220.113.177]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 27268C1524AC for <architecture-discuss@ietf.org>; Mon, 14 Aug 2023 13:21:48 -0700 (PDT)
Received: from localhost (unknown [10.0.0.9]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mail.hardakers.net (Postfix) with ESMTPSA id B106220693; Mon, 14 Aug 2023 13:21:47 -0700 (PDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 mail.hardakers.net B106220693
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardakers.net; s=default; t=1692044507; bh=m6xlqj29+MTjbeTgkFMmFe19EIN9BGkXX3wT5e9sQv0=; h=From:To:Cc:Subject:References:Date:In-Reply-To:From; b=ou8dz9RioOC9JzVuOK/JpM6MR9UbmHwC84p8BWKFQaD8c1uCWre90SZDf4IVvTG+o G/NSCql1ppztnLR5v2PJi1LlgVUswi+0FB6XdEUbv4sOOAm+zTgE6rMjv6ClFHN9yU NDuYErwQNS9WqlOmoKRTzRo98FxKOjBYEoaQcWk0=
From: Wes Hardaker <wjhns1@hardakers.net>
To: Eliot Lear <lear@lear.ch>
Cc: architecture-discuss@ietf.org
References: <997f6696-dcd9-9d5d-26f2-3b486cee601b@lear.ch>
Date: Mon, 14 Aug 2023 13:21:47 -0700
In-Reply-To: <997f6696-dcd9-9d5d-26f2-3b486cee601b@lear.ch> (Eliot Lear's message of "Tue, 25 Jul 2023 10:08:14 +0200")
Message-ID: <yblfs4ljrxg.fsf@wd.hardakers.net>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/5TGrjq5McvkoEh-dOW5QLdpcWSo>
Subject: Re: [arch-d] draft-iab-m-ten-workshop
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Aug 2023 20:21:51 -0000

Eliot Lear <lear@lear.ch> writes:

> Hi everyone,

Hi Eliot and Arnaud,

I'm responding to the larger point you both had concerned with together
about the nature of the wording and the purpose of the IAB workshop
report.  Thank you both for your extensive comments about the content.

> To begin with, it's nice when a report can seamlessly join various
> workshop components, but this report goes so far as to appear to be
> itself a position paper.  There are a great many unsupported and
> otherwise unattributed assertions made.  Under Chatham House rules one
> might expect such assertions along the lines of, “[one person/several
> people] suggested that...”

I think the general of how best to describe what happens in an IAB
workshop and what the report entails is an interesting one, and I'm
surprised it hasn't been brought up before (well, at least to my
knowledge so it may very much have been in past discussions).  IAB
workshop reports (IMHO) are designed not to assert the veracity of the
statements within, but rather to capture the discussion and the
statements that participants made either in presentations or in ensuing
discussions.  So, to some extent the entire report should be read as
"[one person/several people] suggested that"...  To that end, we [the
IAB] did discuss the best way to represent this and have published a -02
version with a number of changes, including a new section in the
introduction to make this more clear which I'll quote below:

    1.1.  About this workshop report content        
            
       This document is a report on the proceedings of the workshop.  The   
       views and positions documented in this report are those of the       
       expressed during the workshop by participants and do not necessarily 
       reflect IAB views and positions.     
            
       Furthermore, the content of the report comes from presentations given        
       by workshop participants and notes taken during the discussions,     
       without interpretation or validation.  Thus, the content of this     
       report follows the flow and dialog of the workshop but does not      
       attempt to capture a consensus.

The full diff between -01 and -02 can be found here:

  https://author-tools.ietf.org/iddiff?url2=draft-iab-m-ten-workshop-02

Most of the rest of your comments were about specific statements that
you disagreed with, but were made during the course of the workshop by
at least "[one person/several people]".

Note that the full recordings are on the IETF youtube channel as well:

https://www.youtube.com/watch?v=Kizk_QrIc3s
https://www.youtube.com/watch?v=aV1pzuCduLo
https://www.youtube.com/watch?v=p4NlZJlactE

A number of your comments were requesting references:

> Great!  Reference, please?

We did not include references to work, but rather included references to
the individual position papers which themselves often contained
references.  And the youtube presentations also have discussions from
the presenters and comments that will give rise to additional information.

>     Within the IETF, the Manufacturer Usage Description Specification (MUDD) {?RFC8520} specification is one
>     subset of contracts. Note that contracts are likely to only succeed in a constrained, expected environment
>     maintained by operational staff, and may not work in an open internet environment where end users are
>     driving all network connections.
> 
> The initial demonstration implementation of MUD (one D) was
> implemented using a plugin to DNSCAP that itself issued commands to
> iptables.

FYI, fixed the typo in MUD.  Thanks for catching that.

> There are two real questions hiding here:
> 
>  1. Are firewall vendors and telcos have an interest in protecting the user with such contractors?  The user
>     certainly has that interest.
>  2. Can a contract be properly described and maintained in a secure way?
> 
> There has been some academic work on answering the latter
> question.[1,2]  Going further, though, some aspects of MUD (and
> Michael could say a good bit about this, and probably did at the
> workshop), require visibility.   So for instance, rather than making
> use of DNSCAP, a more explicit API between the resolver and the rest
> of network management is something that has been discussed in various
> corners (if memory serves, dnsop just recently).  This very much
> depends on whether the endpoint uses a resolver with that sort of
> binding.  Future work, I suppose.

I've argued recently that half (if not more) of an IAB workshop is to
start the discussion and direction, and rarely should the workshop
actually solve a problem.  The point is to get people in the room so a
conversation starts, even if there isn't agreement at the end.  To that
end, there should *always* (IMHO) be future work after an IAB workshop.
For if there isn't and the problem was actually solved during the
workshop, it probably should have been a working group instead of a
workshop :-)

-- 
Wes Hardaker
USC/ISI