RE: draft-dolson-plus-middlebox-benefits (was RE: Review of draft-mm-wg-effect-encrypt-09)

<mohamed.boucadair@orange.com> Wed, 12 April 2017 06:44 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1471127275 for <ietf@ietfa.amsl.com>; Tue, 11 Apr 2017 23:44:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.62
X-Spam-Level:
X-Spam-Status: No, score=-2.62 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id STj-oYNwGfFL for <ietf@ietfa.amsl.com>; Tue, 11 Apr 2017 23:44:15 -0700 (PDT)
Received: from relais-inet.orange.com (mta240.mail.business.static.orange.com [80.12.66.40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C77C12420B for <ietf@ietf.org>; Tue, 11 Apr 2017 23:44:15 -0700 (PDT)
Received: from opfedar04.francetelecom.fr (unknown [xx.xx.xx.6]) by opfedar21.francetelecom.fr (ESMTP service) with ESMTP id BD0D5100B50; Wed, 12 Apr 2017 08:44:13 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.61]) by opfedar04.francetelecom.fr (ESMTP service) with ESMTP id 9C65640058; Wed, 12 Apr 2017 08:44:13 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7E.corporate.adroot.infra.ftgroup ([fe80::b91c:ea2c:ac8a:7462%19]) with mapi id 14.03.0319.002; Wed, 12 Apr 2017 08:44:13 +0200
From: mohamed.boucadair@orange.com
To: Nico Williams <nico@cryptonector.com>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
CC: Martin Thomson <martin.thomson@gmail.com>, "ietf@ietf.org" <ietf@ietf.org>, "draft-dolson-plus-middlebox-benefits@tools.ietf.org" <draft-dolson-plus-middlebox-benefits@tools.ietf.org>
Subject: RE: draft-dolson-plus-middlebox-benefits (was RE: Review of draft-mm-wg-effect-encrypt-09)
Thread-Topic: draft-dolson-plus-middlebox-benefits (was RE: Review of draft-mm-wg-effect-encrypt-09)
Thread-Index: AQHSsuepcxG3Gt+qPke8vqYsnz4RHKHBQDOw
Date: Wed, 12 Apr 2017 06:44:12 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933009E4C138@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <787AE7BB302AE849A7480A190F8B933009E4B818@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <11843452-d76d-50e3-c162-155f4d1621e2@cs.tcd.ie> <20170411171831.GA23461@localhost>
In-Reply-To: <20170411171831.GA23461@localhost>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.168.234.5]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/7uPEZVW7AX5cn0VMa3Tq064LCLU>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Apr 2017 06:44:18 -0000

Hi Nico, 

Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De : Nico Williams [mailto:nico@cryptonector.com]
> Envoyé : mardi 11 avril 2017 19:19
> À : Stephen Farrell
> Cc : BOUCADAIR Mohamed IMT/OLN; Martin Thomson; ietf@ietf.org; draft-
> dolson-plus-middlebox-benefits@tools.ietf.org
> Objet : Re: draft-dolson-plus-middlebox-benefits (was RE: Review of draft-
> mm-wg-effect-encrypt-09)
> 
> On Tue, Apr 11, 2017 at 09:51:14AM +0100, Stephen Farrell wrote:
> > On 11/04/17 09:15, mohamed.boucadair@orange.com wrote:
> > >> I hope that the IETF never publishes
> > >> draft-dolson-plus-middlebox-benefits; it makes claims about the
> > >> benefits of specific solutions for different use cases with the
> > >> goal of justifying those solutions.
> >
> > > [Med] I'm afraid this is speculating about the intent of
> > > draft-dolson. Assured this is not the purpose of that document. The
> > > motivation is to document current practices without including any
> > > recommendation or claiming these solutions are superior to others.
> >
> > Just to note that I completely agree with Martin's interpretation
> > of the thrust of this draft and I totally fail to see how your
> > argument above can be justified given that draft title, abstract
> > and even filename (and also the content;-). When the abstract
> > says "This document summarizes benefits" then I cannot interpret
> > that as other than being intended to justify the uses described.
> >
> > A fairly thorough re-write to aim to describe the pros and cons
> > would be a different and more useful document. Similarly a draft
> 
> Documenting the good, the bad, and the ugly, would be much better than
> documenting only the good.  Documenting only one half of the story seems
> to me like a bad idea on its face.

[Med] The point is there are RFCs that describe the issues of middleboxes. The initial intent of draft-dolson was to describe the expected functionality (called benefit in the draft) for enabling some of these functions. Superior solutions may exist but these solutions need to understand first what is the expected service; hence the need for a reference (this document) to understand the trade-offs.
 
The draft can be updated with a section that identifies issues but I'm afraid that text won't be original compared to what was already documented in, e.g., RFC3234 or in specific documents such as RFC6269.

> 
> > that strives to neutrally describe existing reality could maybe
> > be useful (*) but one that only describes middlebox friends with
> > "benefits" is not IMO beneficial ;-)
> 
> Agreed.
> 
> I can think of a number of problems with middle boxes:
> 
>  - scalability
> 
>    Middle boxes may need to expend much more computational power in
>    order to do more than forward packets, and they need to do this for
>    as many extant packet flows as will fit on their pipes at full tilt.
> 
>    Middle boxes may also have to be stateful, which quickly turns into a
>    morass.
> 
>  - security
> 
>    Middle boxes can get intrusive and require sharing either more
>    information with the public at large, or more information with
>    "trusted" middle boxes, which in turn requires more complex key
>    management and more failure modes.
> 
>  - reliability
> 
>    More failure modes (see security above).  More middle boxes to
>    inspect for diagnostics.  More middleboxes to fix.
> 
>  - extensibility
> 
>    Want to extend the protocol?  You can't.  You'd have to upgrade all
>    the middle boxes first.  You can only get the extensibility that you
>    can foresee.  If you screw up the first time, the screw up will take
>    15 years to work out of the Internet in the best case, and in the
>    worst case you'll never get it out.
> 

[Med] This is a fair list (even if some of the items are implementation-specific and/or are valid for some middleboxes not every middlebox). I can add another important item for an operator:  their cost. 

The important question then is: Why given the operational hurdles (reliability, diagnostic, ..) and costs to deploy and operate them, these functions are (still) enabled in operational networks? 

> I can probably add more later when I have more time for this thread.
> 
> One could give a lot of advice for design of protocols with "friendly"
> middle boxes.  Merely saying "hey, they are good" is not enough.  We
> might want to revisit end-to-end protocol design as well (e.g., maybe
> ICMP isn't working so well; what can we do?).  Perhaps we can get some
> of the benefits of middle-box-aware protocols without the middle boxes.
> Suppose a secure middle-box quench protocol by which nodes under DDoS
> can enable DDoS counter-measures in upstream routers...  Suppose a
> generic, non-TCP congestion control capable but UDP-like transport with
> a reusable header prefix and ICMP-ish messages for QoS and congestion
> control...  I'm certain we can do more within the end-to-end model with
> minimal middle-box involvement (though never zero; we need at least
> packet forwarding middle boxes).
> 
> IMO the IETF must not publish draft-dolson-plus-middlebox-benefits as it
> is today.

[Med] This is not a frozen document. It can be updated to include comments. Your inputs are more than welcome. 

> 
> Nico
> --