Re: [dtn] BPbis consensus status

"R. Atkinson" <rja.lists@gmail.com> Wed, 16 September 2020 23:36 UTC

Return-Path: <rja.lists@gmail.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C64B03A12F5 for <dtn@ietfa.amsl.com>; Wed, 16 Sep 2020 16:36:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E59_Fgl9sKku for <dtn@ietfa.amsl.com>; Wed, 16 Sep 2020 16:36:33 -0700 (PDT)
Received: from mail-qk1-x741.google.com (mail-qk1-x741.google.com [IPv6:2607:f8b0:4864:20::741]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F13383A12F4 for <dtn@ietf.org>; Wed, 16 Sep 2020 16:36:32 -0700 (PDT)
Received: by mail-qk1-x741.google.com with SMTP id t138so413038qka.0 for <dtn@ietf.org>; Wed, 16 Sep 2020 16:36:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=CCcjNrTkcO/Cj0RblRJGNn2w/P81W7YVkhpx6aHlPGE=; b=KhAej4dKsE4aQmKEO2bsehtgh7hna49fXcDqw79jJ64w+Wi0bxiOKHLjFP3WHN3v+F l1rcvtmm6PBmN/rTeDwf0x6rDMlCd9Laj6/cJ5zhiSVWMUllzW2Q87ekb/v+9rsuOJCp OlBRJYKPdyntw53TGS/DoMtit0CsR0L3uXiuzaRdcGQCu1ztNQ/O0LM41SgrT85EeZBd fNHaLmG4ri02PRK/GOxwYsV+nXF0NsafcVryZ1d9+68r0y9RkIUuC0VeR5uV+KmXow7M Y6xpPlxsGMLX4H7O9p2iM7GEBv2Kf21iaA2NKVNdiJGLHsOfVMmmGnzUGSS3x0a7cQgo l6gw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=CCcjNrTkcO/Cj0RblRJGNn2w/P81W7YVkhpx6aHlPGE=; b=cnotWW2PZNn4s4PwpO1M7ERXLsIIq0jOFmoNRyY2WtrFVZZRYsk64lrGKxMZE/dVRB dA4gDVk8uAFWv/d5pTy/I0ZjfPSXPpCGwCtgZdjeEp+Mw/sDdgHkTEhAYbiZH0VY+DDW HBX+WdTuz7nmLOpFeWzLnWm9iXNWM3arVFrEvXTKlG/MnHK3qdzYZNjEOUceSeqoWigP AjIHlfm+b0nicCH3oyzb+alyu+UG8WLCzfboY26Jc7WVSvTlCXhOBQitZkq+3mlnq62d Li48mQAJy1b4ivk4gDxkmU59LEvxMv89P3EW1NYIJxP2j1NCuh52YLw7uQ6XrYyt3+Lf X0cQ==
X-Gm-Message-State: AOAM533ITeT2RQO8Nptm79u+idSLg4hYkniEW8waBO46APU9rRCTrHLL 3vLJtPOYY4z+9Foz1jv4wDwt3xH77bI=
X-Google-Smtp-Source: ABdhPJxGjIlKfd/jOcMCyw+qjpjsrAIsg5rFR3phSLp6ci0J6p1OhUhBY6NBaCWBUwZtut3fkNUCbQ==
X-Received: by 2002:a05:620a:cf6:: with SMTP id c22mr26124888qkj.190.1600299391699; Wed, 16 Sep 2020 16:36:31 -0700 (PDT)
Received: from [10.30.20.19] (pool-141-156-180-77.washdc.fios.verizon.net. [141.156.180.77]) by smtp.gmail.com with ESMTPSA id i62sm20989461qkf.36.2020.09.16.16.36.30 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 16 Sep 2020 16:36:30 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.15\))
From: "R. Atkinson" <rja.lists@gmail.com>
In-Reply-To: <F2B67324-D3F5-4F28-8CC3-207EB607E6EA@viagenie.ca>
Date: Wed, 16 Sep 2020 19:36:29 -0400
Cc: Randal Atkinson <rja.lists@gmail.com>
Content-Transfer-Encoding: quoted-printable
Message-Id: <ED9CEA8D-3B22-4623-A7F7-F9ACA4C3A071@gmail.com>
References: <34a7886b09d946faa816acbd26700d65@jpl.nasa.gov> <F2B67324-D3F5-4F28-8CC3-207EB607E6EA@viagenie.ca>
To: DTN WG <dtn@ietf.org>
X-Mailer: Apple Mail (2.3445.104.15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/3hmvTGyoC7i_wy5Oowxdm-H6I2w>
Subject: Re: [dtn] BPbis consensus status
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Sep 2020 23:36:35 -0000


> On Sep 16, 2020, at 15:50, Marc Blanchet <marc.blanchet@viagenie.ca> wrote:
> 
> I’m still opposed to have BPSEC be mandatory to implement as I think the security services can be done within the payload. IP is currently not secured on the Internet.

For over 25 years now, IP has had IP-layer security in the form of IPsec (ESP & AH).

See RFC-1825 through RFC-1827 to see just how far back IPsec goes.  My team
demonstrated open-source running code for IPsec in 4.4 BSD in August 1995.[1]

For many years, all IPv6 implementations were required to implement IPsec,
although I believe that constraint has been lifted recently (LONG AFTER IPsec
was nearly universally implemented by IPv6 devices and I believe the exemption
is for tiny IoT devices).

Automated key management (which BPsec does not provide yet) came a bit
later with RFC-2407, RFC-2408 and RFC-2409.

IPsec BOTH supports end-to-end security and also can support VPN access. 
In practice, IPsec is probably used more with VPNs but it does still support
end-to-end security.

Virtually every IP-capable device (laptops, paid OSs, free OSs, smart handphones) 
has implemented IPsec for many years now.  

While the original goal of IPsec was end-to-end (e.g., host-to-host) security

Whether one uses IPsec is a very different question from whether it is widely
implemented, just as whether one uses BPsec for a given session is quite 
separate from whether it should be mandatory to implement.

If security is NOT mandatory-to-implement, then users in practice will not be able
to use it in situations where they would like to use it.  The deployed Internet
has over 35 years experience with this operational reality.

> It is within the IP payload (TLS) that security services are applied.

Security services are offered at MANY layers in the deployed Internet.  

TLS is far from being the only game in town.  I discuss IPsec above,
but there are numerous other mandatory security capabilities both
within TCP and below.

Routing protocols have had built-in cryptographic security (e.g., RFC-2082 et seq
for RIP; RFC-2178 et seq for OSPFv2; RFC-2385 eq seq for BGP) for over 20 years.
Even newer routing protocols such as BABEL have been required to have 
cryptographic authentication (e.g., RFC-7298).

> I want a fully conformant BP implementation to ship without BPSec and without any specific use case (e.g. forwarding vs non-forwarding). However, I expect many use cases to require security, but again, in those cases, it can be accomplished within the payload, not at the BP level.

I am open to hear what you have to say, but right now it is FAR from obvious to me

(a) precisely what you mean by “accomplished within the payload”,

(b) where that specification is documented, 

or (c) how you propose that [hypothetical] security service would be mandated. 

Over 35 years of deployed Internet experience all says that security won’t be
available in practice if it isn’t mandatory to implement.  I doubt BP can get
through the IETF approval processes without mandatory-to-implement security
of some sort in a standards-track RFC.

Yours,

Ran

[1] "https://www.usenix.org/legacy/publications/library/proceedings/sd96/atkinson.html"