Re: New tunnel protocol

"Adrien de Croy" <adrien@qbik.com> Tue, 27 January 2015 01:31 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ietf.org@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D50061A1AE3 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 26 Jan 2015 17:31:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.912
X-Spam-Level:
X-Spam-Status: No, score=-6.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gWmUUIHVw8yH for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 26 Jan 2015 17:31:36 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A63901A046D for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 26 Jan 2015 17:31:36 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1YFuxR-0001JJ-5T for ietf-http-wg-dist@listhub.w3.org; Tue, 27 Jan 2015 01:28:45 +0000
Resent-Date: Tue, 27 Jan 2015 01:28:45 +0000
Resent-Message-Id: <E1YFuxR-0001JJ-5T@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtp (Exim 4.80) (envelope-from <adrien@qbik.com>) id 1YFuxL-0001IW-M0 for ietf-http-wg@listhub.w3.org; Tue, 27 Jan 2015 01:28:39 +0000
Received: from smtp.qbik.com ([122.56.26.1]) by lisa.w3.org with esmtp (Exim 4.72) (envelope-from <adrien@qbik.com>) id 1YFuxI-0006FD-42 for ietf-http-wg@w3.org; Tue, 27 Jan 2015 01:28:39 +0000
Received: From [192.168.1.146] (unverified [192.168.1.146]) by SMTP Server [192.168.1.3] (WinGate SMTP Receiver v8.3.0 (Build 4759)) with SMTP id <0000049135@smtp.qbik.com>; Tue, 27 Jan 2015 14:27:42 +1300
From: Adrien de Croy <adrien@qbik.com>
To: Martin Thomson <martin.thomson@gmail.com>
Cc: Amos Jeffries <squid3@treenet.co.nz>, HTTP Working Group <ietf-http-wg@w3.org>
Date: Tue, 27 Jan 2015 01:27:42 +0000
Message-Id: <eme4cd6624-6d11-45a8-9d3e-6cb9da37f00a@bodybag>
In-Reply-To: <CABkgnnUivsiDJ-wx1fsdT6PSvMQZCSYE1CQn_fn3b1d=oe8_JA@mail.gmail.com>
Reply-To: Adrien de Croy <adrien@qbik.com>
User-Agent: eM_Client/6.0.21372.0
Mime-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Received-SPF: pass client-ip=122.56.26.1; envelope-from=adrien@qbik.com; helo=smtp.qbik.com
X-W3C-Hub-Spam-Status: No, score=-1.8
X-W3C-Hub-Spam-Report: AWL=-1.796, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001
X-W3C-Scan-Sig: lisa.w3.org 1YFuxI-0006FD-42 ffe15ca8940a0cfe799a51e25de6580f
X-Original-To: ietf-http-wg@w3.org
Subject: Re: New tunnel protocol
Archived-At: <http://www.w3.org/mid/eme4cd6624-6d11-45a8-9d3e-6cb9da37f00a@bodybag>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/28663
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

------ Original Message ------
From: "Martin Thomson" <martin.thomson@gmail.com>
To: "Adrien de Croy" <adrien@qbik.com>
Cc: "Amos Jeffries" <squid3@treenet.co.nz>; "HTTP Working Group" 
<ietf-http-wg@w3.org>
Sent: 27/01/2015 2:14:46 p.m.
Subject: Re: New tunnel protocol

>On 26 January 2015 at 17:02, Adrien de Croy <adrien@qbik.com> wrote:
>>  What I would rather do (at least at this stage) is initially trust 
>>the
>>  client's assertion, and break in other ways if they lied, e.g. if 
>>they say
>>  SMTP then pass it to SMTP analyzer, and if it happened to be 
>>something else,
>>  then the SMTP analyzer will complain that it's not SMTP.
>
>Yep, I'd definitely do the same. I'm guessing that anything that
>isn't SMTP won't get very far.
>
>>  For the pathological case where you're tunnelling a secured protocol 
>>over an
>>  additional TLS tunnel. I don't know how you'd describe this in your 
>>draft,
>>  except by requiring people to get new ALPN ids registered for pop3 
>>over TLS
>>  over TLS.
>
>Yep. pop3s, then pop3ss, then pop3sssssssssssssss if you like.
>
>Something more generically decomposable invites a new set of issues.
>Do you identify TCP? Just because CONNECT uses TCP, that doesn't mean
>you can't identify something in ALPN that doesn't (see
>draft-ietf-rtcweb-alpn for example).

I don't really buy that.  We're already over TCP and CONNECT.  We don't 
need to specify layers in the stack lower than where we currently are.

If they want to put pop3 over UDP over a CONNECT tunnel over TCP, then 
sure by all means specify UDP-POP3 as the tunneled protocol, but not 
TCP-CONNECT-UDP-POP3 if you see my point.

IP header doesn't have a field specifying it is over ethernet.  It has a 
protocol field, TCP has ports to achieve a similar effect.  I'm not 
aware of any protocol layer that identifies anything other than the next 
layer, not the one above that.  That's IMO one of the great design 
decisions of the internet.  It allows simple layered processing.

As for TLS1.3 deprecating the possibility of an intermediary verifying a 
server X.509 cert, that is going to annoy a lot of people if that's the 
case, there's a raft of products that protect people from invalid certs, 
and it does this without breaching privacy - just looks at the cert from 
the server, checks expiry and trust etc.


>
>The rtcweb draft actually sealed this for me, would you really want to
>identify that protocol, with all the branches: UDP, or TCP, or TURN
>over either of those (both TURN-UDP and TURN-TCP variants), then a
>mixture of SRTP, DTLS and ICE.

if it's over the CONNECT tunnel, that would be needed.


>On top of DTLS, then there is SCTP
>(with its UDP encapsulation), then on top of that there is a data
>channel protocol, after which there is some other protocol (which we
>do have an identifier for, but we don't trust that, and nor can we
>really police it either, and it might start after the tunnel is
>created). In case you want the whole ugly story:
>https://tools.ietf.org/html/draft-ietf-rtcweb-transports-07

Adrien