Re: [Dime] Proposed REQ 35 Text

Andrew Booth <lists.abooth@gmail.com> Wed, 27 March 2013 15:01 UTC

Return-Path: <lists.abooth@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1E7121F91BC for <dime@ietfa.amsl.com>; Wed, 27 Mar 2013 08:01:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level:
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1YLJV33v-HyN for <dime@ietfa.amsl.com>; Wed, 27 Mar 2013 08:01:53 -0700 (PDT)
Received: from mail-qe0-f54.google.com (mail-qe0-f54.google.com [209.85.128.54]) by ietfa.amsl.com (Postfix) with ESMTP id BE31121F91C0 for <dime@ietf.org>; Wed, 27 Mar 2013 08:01:53 -0700 (PDT)
Received: by mail-qe0-f54.google.com with SMTP id i11so4591223qej.13 for <dime@ietf.org>; Wed, 27 Mar 2013 08:01:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=Be4zxd6o+m0vO9OdWKjhcG5LNfm9Zw2nV7cu3Fr0IzA=; b=eRG/GUsTnElWKxUeIwn4z63kphBGGRUXtDvBMJ3XFWzVgTDJy2+EV/VXoCd4DfyK3m DhMhnU4UZT2LwOFMT0Q/hS7XI6hxeWtIm0tVziSfl+XvuSKOwMRpecGYI9s+Y4+wSR7i wx1B3CFijR0l1RYb4BTZUlqrriz+fT4c3UKxNUjS6oFGZG5YQwOzPB8azxzJSB6XU9Gt iWQd2OVUlnfwIQ/wNBDzoqmfTqvtXooZgS8b0J4DTVbRSe8U0AEIHWPCjp0CygIva8Il WiSZil4LPYETcxwOo+b8WgF66pwTBgwNYVMXd56O6LDvjiYN0p8bwJqFBHZgKqRBz3a/ GU4Q==
MIME-Version: 1.0
X-Received: by 10.229.62.200 with SMTP id y8mr3670633qch.128.1364396513080; Wed, 27 Mar 2013 08:01:53 -0700 (PDT)
Received: by 10.49.63.163 with HTTP; Wed, 27 Mar 2013 08:01:52 -0700 (PDT)
In-Reply-To: <E11F7859-5062-4FF4-A731-4E5B6E2826C9@nostrum.com>
References: <E11F7859-5062-4FF4-A731-4E5B6E2826C9@nostrum.com>
Date: Wed, 27 Mar 2013 11:01:52 -0400
Message-ID: <CAFMnvyLm+V_LZ2wivW__Si0Yn_XgNJRYUk6w32NWto5T5hkp7g@mail.gmail.com>
From: Andrew Booth <lists.abooth@gmail.com>
To: Ben Campbell <ben@nostrum.com>, Eric McMurry <emcmurry@computer.org>
Content-Type: text/plain; charset="ISO-8859-1"
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Proposed REQ 35 Text
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Mar 2013 15:01:54 -0000

Hi Ben,

If we don't find a solution that supports REQ 35, I would prefer to
have a 95% solution now than scrap such a solution because it fails
the MUST of REQ 35.  Hence, I prefer that REQ 35 be a SHOULD.

There is nothing to prevent multiple different implementations from
being standardized (well, other than the difficulty getting WG
cycles).  I don't see that all of them need to have full support for
REQ 35.  That opens the door for other approaches to be proposed once
end-to-end security in Diameter is standardized.

There is also nothing that prevents interested parties that want
support for REQ 35 to propose a solution that supports it, and to
defend that solution compared to others.

If I recall correctly, the desire to make this a MUST came from an
implementer that wanted to be able to signal handsets about the
congestion.  Is that the motivating statement?  If so, is it worth
taking a closer look at the motivating case to see what information
they really require (is it full information? or will partial
information do?), and whether it should have this much impact on the
potential solutions?
At first glance, signaling handsets about congestion sounds like a
(potentially useful) optimization, but does not sound to me as
important as protecting core network resources (by having some working
implementation of overload control).  Maybe I'm misunderstanding the
motivating case or it's importance, I'm willing to be convinced.

More comments inline.

On Tue, Mar 26, 2013 at 4:30 PM, Ben Campbell <ben@nostrum.com> wrote:
> Hi,
>
> We had a discussion about whether REQ 35 in the
> draft-ietf-dime-overload-reqs should stay a SHOULD or become a MUST.  We
> further discussed that any use of a MUST here would require some caveats
> about what sort of intermediaries could be traversed, and the potential
> security issues. The chairs directed us to take the discussion to the list
> due to time constraints. Here's my attempt to do so.
>
> For reference, here's the original text:
>
> The mechanism SHOULD provide a method for exchanging overload and load
> information between elements that are connected by intermediaries that do
> not support the mechanism.
>
>
> Here's a proposed alternative for changing it to a MUST:
>
> The mechanism MUST provide a method for exchanging overload and load
> information between elements that are connected by intermediaries that do
> not support the mechanism. The mechanism MAY place limitations on the nature
> of the non-supporting intermediaries that may be traversed.

Is there any limit to the limitations?  Currently loophole: a
mechanism can limit the non-supporting intermediaries to the empty
set, and we're back to REQ 35 being a SHOULD.
Is this extra text intended to allow for a new application id (hence
limiting proxies that have not been upgraded to support the
mechanism)?
Is this extra text intended to allow for REQ 35 through "trusted"
intermediaries, hence working around the end-to-end security
requirement (this sounds dodgy to me)?

Thanks,
Andrew

>
> Nothing in this requirement should be construed to relax the
> security-related requirements elsewhere in this document, in particular REQs
> 28, 30, and 31. Maliciously constructed overload information can potentially
> shut down a Diameter network; it's critical that a node be able to confirm
> that received information came unaltered from an authorized source, whether
> the information comes from an immediate peer or crosses an intermediary.
>
>
>
> Which general approach do people prefer? I kept the security aspects
> non-normative, since normative text already exists in 28,30, and 31.
>
> Thanks!
>
> Ben.
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>