Re: [arch-d] Chaff in protocols
Guntur Wiseno Putra <gsenopu@gmail.com> Sun, 21 July 2019 12:51 UTC
Return-Path: <gsenopu@gmail.com>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D151E12004E for <architecture-discuss@ietfa.amsl.com>; Sun, 21 Jul 2019 05:51:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.738
X-Spam-Level:
X-Spam-Status: No, score=-1.738 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qvWmPNE2pgvN for <architecture-discuss@ietfa.amsl.com>; Sun, 21 Jul 2019 05:51:02 -0700 (PDT)
Received: from mail-ot1-x332.google.com (mail-ot1-x332.google.com [IPv6:2607:f8b0:4864:20::332]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8DE97120020 for <architecture-discuss@ietf.org>; Sun, 21 Jul 2019 05:51:02 -0700 (PDT)
Received: by mail-ot1-x332.google.com with SMTP id y20so21451714otk.7 for <architecture-discuss@ietf.org>; Sun, 21 Jul 2019 05:51:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=KtafaGHuRNaU8n9t54tFRaio2NPkatbMonTpLTolgC8=; b=HAQFxm918XXvlH2VESyz0SksIuBoxvS7HOoOVHg8y6BL6vTMdXLIHoOQtZYREmwci/ /GGKYtfhx+MnLecSlPh2mkx/bvdo8TK8tY5iuihBgNz73OWpZoSJ+3aRR9AKVshp66Ld 1MW6Vo68Acaq7a3JRreXHYjzjYzxcRylVHN6FWITYPgGo8PkxqtdOhW3MmNGdqU0mkHF usyOM4x0IxGrpobVulAcf8BSJMIHfTwJMin4C1syAm9lrbNranDoElZeTqauIdCoj5u8 BCcxqIw0Kv8wKkV+mn21xWFci5EMRdivGRi5XI61RjCcR4d0WFq2YMTfNot90vjSxgey TWiA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=KtafaGHuRNaU8n9t54tFRaio2NPkatbMonTpLTolgC8=; b=PxZyh1JV74aWVy7PYEEtG7tIcGZmfvoTa02QdVFTikqdRxr9InT3J7MM1KVta+8mYE 10tehwFRQUFYwci8FMmovwML/mraPSBojKjmpB5OuNR1iWuTBLx3WXW+uQpOyiStVFBf yaGvyYFOrJDBHBxbWRY3XQH3bbdFU8+qjS20wu4QAe8ySQFW1777C8Cnono02N5yYbA9 Bl8ttCfIGaZw43eDVri/U+KNR4go6HHhKulBP83CoHugqy92uZJULiPuLqOaiVSQg/6c bNXPqRg4MsunAXmF+6HuPSpqavHR3YhKgsJQrF3o8ZWhfU/BsWUMPPeobwst21H8Rpj3 FraQ==
X-Gm-Message-State: APjAAAUFzwfM8rZm63qtkP6xbkEXqGlZSyPmCraEuqbswVX992jAsYRK nnqImbry5hFUu7KzV0UPfukYFzbYR7EWf9ktbVI=
X-Google-Smtp-Source: APXvYqwJ23gE03LFzR+5xLpp143NXWM8D8XYz4Xa/NviY01ER/5olEyCWq+EIFkq9jHbE4QLTEvxWR/QhDS76p4h0Rs=
X-Received: by 2002:a9d:7cd1:: with SMTP id r17mr27209719otn.356.1563713461926; Sun, 21 Jul 2019 05:51:01 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a9d:30d1:0:0:0:0:0 with HTTP; Sun, 21 Jul 2019 05:51:01 -0700 (PDT)
In-Reply-To: <CAKi_AEtkDjLmpd6=bxiX9nCLf6FjaMp-DpdMydONxtMjyHtN8w@mail.gmail.com>
References: <a33aad56-7ca9-4913-98a7-dd96113815e7@www.fastmail.com> <CANMZLAbfkh+cNanqBExWOe=O6TspnufCnQKt=CF_aK__xDC3Mg@mail.gmail.com> <5d84a5a6-41b7-d302-607b-0b0cd7ec554c@gmail.com> <CAKi_AEtkDjLmpd6=bxiX9nCLf6FjaMp-DpdMydONxtMjyHtN8w@mail.gmail.com>
From: Guntur Wiseno Putra <gsenopu@gmail.com>
Date: Sun, 21 Jul 2019 19:51:01 +0700
Message-ID: <CAKi_AEviKJ0FtNMaV4bbeU2xiutVOEdFASk+1TaJH6uB40eW3Q@mail.gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: Martin Thomson <mt@lowentropy.net>, "architecture-discuss@ietf.org" <architecture-discuss@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006dbe4b058e306900"
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/x7t_8_gwAaVaN6J1X7zp0GUtzz4>
Subject: Re: [arch-d] Chaff in protocols
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Jul 2019 12:51:06 -0000
Dear architecture-discuss, Forgive me if I missed things: the paper below supposedly planned a thing more or less similar with the one I mentioned above --with different nuances-- as it concerned with an analytical consideration on "Complex Systems" and "Behaviors of Elements": arXiv:nlin/0312026 <https://arxiv.org/abs/nlin/0312026> [pdf <https://arxiv.org/pdf/nlin/0312026>, ps <https://arxiv.org/ps/nlin/0312026> , other <https://arxiv.org/format/nlin/0312026>] nlin.AO cond-mat.dis-nn doi10.1002/cplx.20045 <https://doi.org/10.1002/cplx.20045> On the emergence of complexsystems on the basis of the coordination of complex behaviors of their elements Authors: Fatihcan M. Atay <https://arxiv.org/search/?searchtype=author&query=Atay%2C+F+M>, Jürgen Jost <https://arxiv.org/search/?searchtype=author&query=Jost%2C+J> Abstract: We argue that the coordination of the activities of individual complex agents enables a system to develop and sustain complexity at a higher level. We exemplify relevant mechanisms through computersimulations of a toy system, a coupled map lattice with transmission delays. The coordination here is achieved through the synchronization of the chaotic operationsof the individual elements, and on the basis of this, regular behavior at a longer temporal scale emerges that is inaccessible to the uncoupled individual dynamics. Regard, Guntur Wiseno Putra Pada Rabu, 17 Juli 2019, Guntur Wiseno Putra <gsenopu@gmail.com> menulis: > Dear architecture-disxuss, > > If it makes an interest: > > The concept of "grease" mentioned in the earlier messages regarded with > situations of protocols --their possibilities, their directions/paths --in > relation with extensions, thus with changed systems. > > In such a matter I find this paper proposed an initiative for situations > of protocols --which was about a practice having a potential to generate > additional value of systems already operating: > > > > 1. > > arXiv:1011.5739 <https://arxiv.org/abs/1011.5739> > > cs.IT cs.NI > > Protocol Coding through Reordering of User Resources: Applications and > Capacity Results > > Authors: Petar Popovski > <https://arxiv.org/search/?searchtype=author&query=Popovski%2C+P>, Zoran > Utkovski > <https://arxiv.org/search/?searchtype=author&query=Utkovski%2C+Z> > > Abstract: While there are continuous efforts to introduce new > communicationsystems and standards, it is legitimate to ask the > question: how can one send additional bits by minimally changing the > systems that are already operating? This is of a significant practical > interest, since it has a potential to generate additional value of the > systems through, for example, introduction of new devices and only a > software update of the access points or base stations, without incurring > additional cost for infrastructure hardware installation. The place to look > for such an opportunity is the communication protocol and we use the term > *protocol coding* to refer to strategies for sending information by using > the degrees of freedom available when one needs to decide the actions taken > by a particular communication protocol. In this paper we consider protocol > coding that gives a rise to *secondary communication channels*, defined by > combinatorial ordering of the user resources (packets, channels) in a > primary (legacy) communication system... > > Submitted 1 February, 2012; v1 submitted 26 November, 2010; originally > announced November 2010. > > Comments: Replaced with a two-part paper > > > > Regard, > Guntur Wiseno Putra > > Pada Minggu, 30 Juni 2019, Brian E Carpenter <brian.e.carpenter@gmail.com> > menulis: > >> On 27-Jun-19 16:13, Martin Thomson wrote: >> >> > Esteemed colleagues, >> > >> > The IAB is looking for historical examples of deliberate additions to >> > a protocol that are added not to enable new behaviour, but to test >> > that the ability to do so remains viable. >> > >> > This comes up in the context of assessing the concept of "grease" (see >> > draft-ietf-tls-grease), a practice of adding meaningless extension >> > points to messages in the hope that it will reveal, and perhaps >> > prevent, intolerance toward real extensions. This is a practice we >> > have seen deployed with some success in TLS. That has produced some >> > enthusiasm about the practice. I think that it would be fair to say >> > that the IAB maintains some reservations about the general >> > applicability of the technique. >> > >> > Are there protocols (in either specification or deployment) that have >> > experimented with this sort of thing in the past? >> >> This isn't exactly what you're describing, but >> https://tools.ietf.org/html/rfc7872 (Observations on the Dropping of >> Packets with IPv6 Extension Headers in the Real World) seems relevant. >> IMHO, IPv6 extension headers are an *unintentional* form of chaff by their >> design. >> >> Recent proposals for piggy-backed OAM options seem to be continue this. >> See draft-ioametal-ippm-6man-ioam-ipv6-options, >> draft-ioametal-ippm-6man-ioam-ipv6-deployment. >> "In order for IOAM to work in IPv6 networks, IOAM MUST be explicitly >> enabled per interface on every node within the IOAM domain. Unless a >> particular interface is explicitly enabled (i.e. explicitly >> configured) for IOAM, a router MUST drop packets which contain >> extension headers carrying IOAM data-fields." >> >> Whoops, there's another limited domain protocol. All limited domain >> protocols become potential chaff outside their domain. >> >> Apart from that, I wonder whether you don't need to dive into the history >> of formal OSI conformance testing to find examples. All I recall personally >> is a converse example: the anecdote of an OSI TP4 implementation that >> passed a conformance test with flying colours because whatever it received, >> it sent back a RESET, which according to the standard was allowed at any >> time. No doubt it would still have passed even in the presence of undefined >> extensions. >> >> Brian >> >> > >> > The concept of fuzzing software isn't new (see >> > https://en.wikipedia.org/wiki/Fuzzing) and testing for resilience to >> > unusual behaviour is similarly well-established (e.g., >> > https://github.com/Netflix/chaosmonkey). But are there cases of this >> > in network protocols prior to its use in TLS? >> > >> > Regards, >> > Martin >> > >> > _______________________________________________ >> > Architecture-discuss mailing list >> > Architecture-discuss@ietf.org >> > https://www.ietf.org/mailman/listinfo/architecture-discuss >> > >> >> _______________________________________________ >> Architecture-discuss mailing list >> Architecture-discuss@ietf.org >> https://www.ietf.org/mailman/listinfo/architecture-discuss >> >
- [arch-d] Chaff in protocols Martin Thomson
- Re: [arch-d] Chaff in protocols Brian E Carpenter
- Re: [arch-d] Chaff in protocols Guntur Wiseno Putra
- Re: [arch-d] Chaff in protocols Guntur Wiseno Putra
- [arch-d] Chaff in protocols Guntur Wiseno Putra