Re: [saag] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?

Stewart Bryant <stewart.bryant@gmail.com> Thu, 05 January 2023 09:14 UTC

Return-Path: <stewart.bryant@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B09F8C1524B3; Thu, 5 Jan 2023 01:14:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.095
X-Spam-Level:
X-Spam-Status: No, score=-7.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LZW8sLzStgUm; Thu, 5 Jan 2023 01:14:03 -0800 (PST)
Received: from mail-wm1-x334.google.com (mail-wm1-x334.google.com [IPv6:2a00:1450:4864:20::334]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 03275C14CE24; Thu, 5 Jan 2023 01:14:02 -0800 (PST)
Received: by mail-wm1-x334.google.com with SMTP id z8-20020a05600c220800b003d33b0bda11so2097569wml.0; Thu, 05 Jan 2023 01:14:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=to:references:message-id:content-transfer-encoding:cc:date :in-reply-to:from:subject:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=WhHhO4ON3T0McRuCRVBVhDZkvUZBEGY3ZI8yZkCMSoM=; b=Q3XLIW7PHI45Y1WRguMRfnPZDBOHBcEosCD503qKumW9sihDOKHRrGLeE5YpFuGLlx DBWbjv9qCiwkDJXWGV1Eq/gPljPzZ4EDrUOVYm64Ktz3P+tiN0kUQXdl4TvWE+vR7zn0 oFd8TAHuXzy6rnJBcZCNqSZSWWC7N13/YcxiThZqxAUilzjhMYTlIOMT5QaJtaiaiZVC 7cARutwzzDF68UUnoqXqM8m16qnyQqGZjgO+FvpfneTODD8eZWx+OUOTcL6vVFa/1Jom kWVBzavMRUstScM9/PRRPAVqVTvpkpI4H2LSML2sk09kyn6HWF3tqbfQssmqIarlzU2J YL3g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:references:message-id:content-transfer-encoding:cc:date :in-reply-to:from:subject:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=WhHhO4ON3T0McRuCRVBVhDZkvUZBEGY3ZI8yZkCMSoM=; b=63SabIAJy+XQvleruVplHCsd8Q/z1b39zIVZrPABlXx4V0ioKYZ+pWc9qN7vGp1kWh J8nE6GwZx84eCqzTYvigLVDeke7m3XfzfCQEO5hJSzNzrJg6jUGGi8kHTRDOKi2KhbNh IBnlbRe2t4LQBZir0ZhpqM9W/lApDS3S7+xHiBaj76p8aWGS+Nu1SNhCYNmFCJP70txB KFKcMDx5YKHpMOU4MRgALHN8qzZFlMz/qQ9GnQiDxVXahdhtmWdk3DE3hGTSrkf9rv9D pf66tCG1JAPqo23bCg3s70XDJpXPlk+bwZF+DBcm7J3p0SbxeXm8DnFaa6lpdw4XeQGq RQaQ==
X-Gm-Message-State: AFqh2krFksjtghCI74nJfUq7CeS/mhrWdh0J3VIpi2VENeXb7g/a/qsp SoASfS1j8XnLlag+scOJ1Bo=
X-Google-Smtp-Source: AMrXdXu+Oqq4dS9TQCDqVtPSTlMIB2rY0eHECGGOVgWFr+C/BOUNjXgHNDjw0dwALqHA6JdkK6FqnA==
X-Received: by 2002:a05:600c:4e11:b0:3d3:4012:8da8 with SMTP id b17-20020a05600c4e1100b003d340128da8mr36428283wmq.40.1672910040844; Thu, 05 Jan 2023 01:14:00 -0800 (PST)
Received: from smtpclient.apple ([148.252.129.84]) by smtp.gmail.com with ESMTPSA id p15-20020a1c544f000000b003b4fe03c881sm1618102wmi.48.2023.01.05.01.13.59 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 05 Jan 2023 01:14:00 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.300.101.1.3\))
Subject: Re: [saag] Ten years after Snowden (2013 - 2023), is IETF keeping its promises?
From: Stewart Bryant <stewart.bryant@gmail.com>
In-Reply-To: <5e37bbe7-c785-6f52-7841-6562d8e77fe1@gmail.com>
Date: Thu, 05 Jan 2023 09:13:48 +0000
Cc: Stewart Bryant <stewart.bryant@gmail.com>, George Michaelson <ggm@algebras.org>, Lloyd W <lloyd.wood=40yahoo.co.uk@dmarc.ietf.org>, Antoine FRESSANCOURT <antoine.fressancourt=40huawei.com@dmarc.ietf.org>, IETF Discussion Mailing List <ietf@ietf.org>, pearg@irtf.org, John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org>, saag <saag@ietf.org>, Dino Farinacci <farinacci@gmail.com>, hrpc@irtf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <E8FFCD47-FE30-4154-A370-E26362587253@gmail.com>
References: <3c3230f3783b4ec9a8a9e3bb87cc2a8d@huawei.com> <08C49067-DB4C-41AB-A6F3-B96BDBE0A4BC@yahoo.co.uk> <CAKr6gn0tFXEV-h7LH1_Ts5iQRw_mGEi=TqS7hsyK-SqDFmmY-A@mail.gmail.com> <5e37bbe7-c785-6f52-7841-6562d8e77fe1@gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
X-Mailer: Apple Mail (2.3731.300.101.1.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/Di8fOAjgHxVSuj5NjdNSYmN365k>
X-Mailman-Approved-At: Fri, 06 Jan 2023 08:28:01 -0800
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IETF-Discussion. This is the most general IETF mailing list, intended for discussion of technical, procedural, operational, and other topics for which no dedicated mailing lists exist." <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jan 2023 09:14:06 -0000

That was 2014

MPLS was an old (and widely deployed) protocol by then and is sourceless even in mp2p applications.

Stewart

> On 4 Jan 2023, at 21:24, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
> 
> Credit where it's due: Sourceless Network Architecture was described many years ago:
> 
> https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-849.pdf
> 
> Regards
>   Brian
> 
> On 04-Jan-23 22:35, George Michaelson wrote:
>> Put a nonce source ip in the packet header and the real source as 4-16 bytes of PFS protected payload.
>> Use asymmetric routing. A single point of capture which isn't close to source or destination is occluded.
>> Can't fix a warrant tap, but can at least obfuscate for on-path.
>> G
>