Re: [arch-d] ETSI launches new group on Non-IP Networking addressing 5G new services

Brian E Carpenter <brian.e.carpenter@gmail.com> Thu, 16 April 2020 21:17 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1995F3A116B for <architecture-discuss@ietfa.amsl.com>; Thu, 16 Apr 2020 14:17:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FJaOY6s7spFX for <architecture-discuss@ietfa.amsl.com>; Thu, 16 Apr 2020 14:17:11 -0700 (PDT)
Received: from mail-pf1-x444.google.com (mail-pf1-x444.google.com [IPv6:2607:f8b0:4864:20::444]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B8AF3A1132 for <architecture-discuss@ietf.org>; Thu, 16 Apr 2020 14:17:11 -0700 (PDT)
Received: by mail-pf1-x444.google.com with SMTP id b8so2240418pfp.8 for <architecture-discuss@ietf.org>; Thu, 16 Apr 2020 14:17:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=EfTGXBUCGzz4eD7oREZhez1olPIQ3UMaSLNmCTdF7Qo=; b=uZrBo6uACyXT2hCSEfNVarikZDQwCd4pv9E+xtcAdIKSKLIa8SZ1ngR1k0LULkyB4u vEqVfcCVe0sYvx/FE+eZUJ82Z2H5iyD+pD8l74kDA5pwkEOqd6WSRqcSddTAn7slRm7P VTF2KDrTyQi6dV83gxX15Lk4vsCNNV68Gpj6OmURlLkt5rYEvAkVbxuOwZQB9Cc6ytv+ GPYuEmzhHnfSnIwJEZq7EnyeQypoJDnfD7YUgBhBeMalCIy0qrIXfeveN8do6JZpuFiu MQEsEuyEElXKTy1NrCLFeaITyvbjo3wwDNV6KAh3OzuNDsmfRfT1fwFfuz/fzqwOmWUg IXvg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=EfTGXBUCGzz4eD7oREZhez1olPIQ3UMaSLNmCTdF7Qo=; b=IiGeB8NYTEajUawIAQPsXUTvp85+URIc8A/azuBIPxkNhKtTDHfHsLiBw1lttHl0mE x/7qs8hkOeFLZJNuFmIBw7whx0nH/X1XprhcV32qqtf4qyoAG6R+XZI4EBHWkXIP7P1O KwDvwdHLyn9Om6lWDRoNlNASelE9neHyueNciTCQ23Tu86FNhQm+i+AD0x2Lu51FX2mQ SmBl7dF7YHHVoq0m58/CEpqlrLRjUrjKqHaJq/LqW2Dx+mwyb8WV0Upw6ksCkOvh++LR TxbjMOtHGz3iRGfUA/CoWspPm2UcNiCZBw3Ul6WnXD1syiecQLn8qqRiCMj9Le1H6yc0 Z0jA==
X-Gm-Message-State: AGi0PubK6TESkRD38j/g1WbX1NmIKDn6Y0St5yFWyS75nuNmxMkEhm6H OlQI3Y0y5vKOv7MAm0kk8IPHFmCV
X-Google-Smtp-Source: APiQypKPx7mfxFjqdDDxiSxZQ2wBO9Xw4eDwHqCyR3SeuPMs78CW/9G8OzfYwq0HQcXJJq2xIdN7ug==
X-Received: by 2002:a63:1853:: with SMTP id 19mr26035085pgy.108.1587071829390; Thu, 16 Apr 2020 14:17:09 -0700 (PDT)
Received: from [192.168.178.30] ([165.84.25.143]) by smtp.gmail.com with ESMTPSA id j24sm3471199pji.20.2020.04.16.14.17.06 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 16 Apr 2020 14:17:08 -0700 (PDT)
To: Toerless Eckert <tte@cs.fau.de>, John C Klensin <john-ietf@jck.com>
Cc: Christian Huitema <huitema@huitema.net>, architecture-discuss@ietf.org
References: <20200408054204.GA6005@nic.fr> <6C2A3533-7F75-45B1-9B51-19938597174B@tzi.org> <20200408194154.GJ28965@faui48f.informatik.uni-erlangen.de> <4200C5F8-9F56-4FFF-90F4-7AD76A9F4FC8@eggert.org> <20200409121941.GZ28965@faui48f.informatik.uni-erlangen.de> <C758BDF2-8CD6-4C22-90CA-6ED98DACD740@eggert.org> <20200409175431.GF28965@faui48f.informatik.uni-erlangen.de> <1e89795e-6bd9-2318-aa81-27f8327e1226@gmail.com> <4ac9e9fc-41a3-f458-566e-f0a68d26d9ea@huitema.net> <E029AEC023B1A60E3E956641@PSB> <20200416174840.GL41264@faui48f.informatik.uni-erlangen.de>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <96ea575b-78d5-019d-15b2-abc8e5c8b22e@gmail.com>
Date: Fri, 17 Apr 2020 09:17:05 +1200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <20200416174840.GL41264@faui48f.informatik.uni-erlangen.de>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/u0m8Rd0Sbkq-_6hdZJXP21G2tuE>
Subject: Re: [arch-d] ETSI launches new group on Non-IP Networking addressing 5G new services
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2020 21:17:19 -0000

On 17-Apr-20 05:48, Toerless Eckert wrote:
> On Mon, Apr 13, 2020 at 02:56:30PM -0400, John C Klensin wrote:
>> It may also be worth noting that a, perhaps the, major add-on
>> change in IPv6 --much touted in its early days-- was supposed to
>> be ubiquitous lP-level encryption.

Not touted by the IPv6 protagonists, however. Yes, there was an intention
to make IPsec mandatory-to-implement, but there was never a claim from the
IETF that IPv6 with IPsec was intrinsically more secure than IPv4 with IPsec.

The claim that IPv6 was intrinsically secure was indeed touted; if I'm
not mistaken it orginated in an industry white paper, was picked up and
exagerrated by the IPv6 Forum, and got into draft-ietf-iab-case-for-ipv6-00,
(which led to draft-iab-case-for-ipv6-06 and was then scrapped). But it
also featured in various lists of IPv6 Myths over many years.

    Brian

> Indeed. It is almost puzzling to think that end-to-end
> encryption at IP(sec) level was presumed to be a good
> architectural choice. Besides the obvious beneeit of being
> agnostic to transport protocol choices but then failing on
> ever getting a host stack model that would allow applications
> to leverage it easily. Of couse, luckily we have it (IPsec)
> as there are a lot of other good use cases for it.
> Maybe a bit too much of the "one size fits all" syndrom that
> new technologies by sheer self interest always come to presume ?
> 
>>  That post-2013 encryption
>> deployment, at least AFAICT, relies on methods much closer to
>> the applications layer, sometimes ones that are at least
>> partially specific to particular applications and applications
>> protocols.  If there is a message in those things, I think it is
>> either that we are not good at predicting which of our
>> innovations will be successful and which will not or that, when
>> the IETF says "go forth and do X", thee are no guarantees that
>> the world will listen.
> 
> Well, i think IPsec was an example of things working well in IETF.
> They may have overexpected on the range of where it best
> fits (and can be completed by host stack/APIs, which always is
> the worst dependency of any IETF work), but they (IPsec) folks
> AFAIK never tried to stop TLS with arguments like "we must only
> have one protocol" or the like, one of the negative syndroms we
> have IMHO seen for othre protocols in the IETF. But nothing
> the IETF can really do. Just comes when its participants develop
> a particular protocol religion or know how their jobs may depend
> on a specific protocol.
> 
>> And I expect it will be some years more before we actually know
>> whether our more recent push toward encryption has helped the
>> Internet and its users by increasing privacy or whether pushback
>> and reactions from the political and law enforcement sectors
>> ultimately result in fragmentation, large-scale interconnection
>> problems, and the either development of a lot of ad hoc
>> solutions or movement of work to other SDOs because the IETF was
>> too stuck on the importance of encryption no matter what.   I
>> don't predict that outcome and definitely don't wish for it, but
>> I think our architectural work would be improved by more
>> recognition of the possibility.
> 
> If i limit your "encryption to "(TLS) end-to-end encryption", then
> i think there are already a lot of people that have opinions about
> the results even visible today.
> 
> IMHO, TLS has two main neglected consequences: It has become the
> key component of a strategy for revenue supremacy from one part of
> the industry, and it has moved the bad behavior (perpass and its
> revenue tail) into a layer of the solution (application) where it
> is out of the control of the IETF. Or at least out of the scope
> of interest of the companies shaping the IETF standards in that
> space because they are the beneficiaries of this evolution.
> 
> So, the next round of privacy discussion as we already see will
> mostly be happening outside the IETF. For better or worse.
> 
> This is of course non-withstanding the basic necessities to use
> TLS and its benefits.
> 
> Cheers
>     Toerless
> 
>> best,
>>      john
>>
>> _______________________________________________
>> Architecture-discuss mailing list
>> Architecture-discuss@ietf.org
>> https://www.ietf.org/mailman/listinfo/architecture-discuss
>