Re: Last Call: <draft-hardie-privsec-metadata-insertion-05.txt> (Design considerations for Metadata Insertion) to Informational RFC

Ted Hardie <ted.ietf@gmail.com> Fri, 03 March 2017 23:49 UTC

Return-Path: <ted.ietf@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6814B127071; Fri, 3 Mar 2017 15:49:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sqjS9Ltk3mSR; Fri, 3 Mar 2017 15:49:20 -0800 (PST)
Received: from mail-ot0-x229.google.com (mail-ot0-x229.google.com [IPv6:2607:f8b0:4003:c0f::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D271126D73; Fri, 3 Mar 2017 15:49:20 -0800 (PST)
Received: by mail-ot0-x229.google.com with SMTP id x37so39388133ota.2; Fri, 03 Mar 2017 15:49:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=kaW2VGy8CCwf9Z3GdFzN+eSg9HwxBL/fZNKOkuNa9k0=; b=P/QwJ4zuBrH8OH4K3ZqDzDJK4WWrOCj9NGBoMFpu9Cwsyyt9oLTbmbNKChoWuB/MrL UqGWGogQrTbkurMJBEZZGUrJf9cPtLpoBj6hRkgek44LvmtCZ/e2epX+6TE1UhtEYJVo FR76lHbIUoikBf5pppFZNTgymE1NVKXaUHafA77aE46wOiA1Qv0284Vj60VyFEL8KnbD bZZiJj4gCVQp3xHTfa+ytS/6N+57npqObeJni0qdzzToCE7JbVJaKM1YKOppLw9Y2XBN HotifeO8V8HOARo6Ht/WclVOVNcGAGgkoXEsA2iWRqI0fKMCFbmXzp/NcrWTlpF+ti/O gcPQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=kaW2VGy8CCwf9Z3GdFzN+eSg9HwxBL/fZNKOkuNa9k0=; b=OfLiLJR3Fz/+dsuWv77stf+zX9o0Xd3pea348vFeXApviGnpqpfjODHbxKhg5Gvh3H VWyVKjENlfbFyTeU/f8whXgPSXl443/dxLb8m1AmBrOoM9kmnA7IFHEtxW/V5yQGUpiY q6e5motHV1dlQG978kQ3r4/wgRInf41ij29uDv1EFQ6D6PJlpHN15wOU5I6mmSKoYKpa lXxxnXsoWNDMcJSu+0RSuGBlwVfqKO71E6R3UYriMAdbvsshb9lYsPoPMWTnIb0L8Yka +a9GA9rPtYafLwrtJsLuTV5NXKiaXq9GewxA4Ytr/gYQ9oDuu2brZ7WT2qqqfM5IZfRU rljw==
X-Gm-Message-State: AMke39kx3r+fr0Jv04G6xGiMBjZfjFbfwGRy8YYocdrt7puJVZT28Pwv73YOkx++yGe8JsLTbZh5qHoLhQGcfQ==
X-Received: by 10.157.63.145 with SMTP id r17mr2546566otc.47.1488584959356; Fri, 03 Mar 2017 15:49:19 -0800 (PST)
MIME-Version: 1.0
Received: by 10.74.142.85 with HTTP; Fri, 3 Mar 2017 15:48:48 -0800 (PST)
In-Reply-To: <787AE7BB302AE849A7480A190F8B933009E1BDA0@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <148527996733.12573.15522530300481191993.idtracker@ietfa.amsl.com> <787AE7BB302AE849A7480A190F8B933009DEB0B5@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <CA+9kkMC8d9dRGA0mYm-ALbZOnnq6LTLE=56imUFqK9JZ0wC=pw@mail.gmail.com> <787AE7BB302AE849A7480A190F8B933009E16627@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <CA+9kkMBw-QbaDzDanWs6sH-z7rEteofCvp8-d-qSf9J31zJykA@mail.gmail.com> <787AE7BB302AE849A7480A190F8B933009E183CF@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <CA+9kkMC4-e=HXSa=QX4m1GgKFA1y-PmKsHkwQTg-ckEM2tGUbw@mail.gmail.com> <787AE7BB302AE849A7480A190F8B933009E1B2E6@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <CA+9kkMBATNM9VAAoRVzAPrvshqeAkNjL_VA_Bwz_JhU75DTRiA@mail.gmail.com> <787AE7BB302AE849A7480A190F8B933009E1BDA0@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: Ted Hardie <ted.ietf@gmail.com>
Date: Fri, 03 Mar 2017 15:48:48 -0800
Message-ID: <CA+9kkMAMBaq7p4t88T=Rvkg3Qr+wRaGxfPHnKAj7eReWq2Unkw@mail.gmail.com>
Subject: Re: Last Call: <draft-hardie-privsec-metadata-insertion-05.txt> (Design considerations for Metadata Insertion) to Informational RFC
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Content-Type: multipart/alternative; boundary="001a11c01770b875ee0549dc31ca"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/mR0JADFGAgq2IYxW_8NNd1Kf9_0>
Cc: "draft-hardie-privsec-metadata-insertion@ietf.org" <draft-hardie-privsec-metadata-insertion@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Mar 2017 23:49:22 -0000

Hi Mohamed,

I've updated the draft and posted -07.  I believe it includes all of the
elements on which we have already agreed.  Some additional comments
in-line, once again with some snippage for readability.

On Fri, Mar 3, 2017 at 1:23 AM, <mohamed.boucadair@orange.com> wrote:

>
>
>
> The intent is that it is information useful to those considering whether
> restoring metadata lost to encryption in mid-network is the right way to go.
>
> [Med] This is another assumption in the document that I disagree with: It
> seems that you assume that an on-path device, that inserts metadata, is
> necessarily RESTORING back that information. This is not true for many
> efforts:
>
·         A Forward-For header inserted by a proxy does not restore any
> data; it does only reveal data that is already present in the packet issued
> by the client itself.
>
That's what restore means here.  If the information is present as metadata
in the packet sent to the proxy but would be absent as metadata under
normal operation of the proxy, adding it back in somewhere else restores
the metadata.  So origin IP address starts out in the IP header of the
original packet but gets pushed from that slot when the proxy constructs
the onward IP packet to the server.  For it to reach the server, it has to
be placed somewhere else in the onward packet, restoring the lost metadata.

Had it been present in the packet as header value in the HTTP exchange, it
would not have been stripped by normal operation.  There proxy operation
forwarding it on would be simply preserving it.




> ·         An address sharing device, under for example DS-Lite (RFC6333),
> that inserts the source IPv6 prefix in the TCP HOST_ID option (RFC7974) is
> not RESTORING any data. The content of that TCP option is already visible
> in the packet sent by the host.
>
I agree with the IESG analysis of RFC7974.  It does restore information by
taking information which normal operation would have elided and restores it.


> ·         Service Function Chaining WG (https://datatracker.ietf.org/
> wg/sfc/about/) is defining an architecture to communicate metadata by
> on-path devices; that metadata is inserted at the network side. Border
> nodes will make sure that data is stripped before forwarding packets to the
> ultimate destinations. The metadata can be a subscriber-id, a policy-id,
> etc.
>
>
>

I'm afraid I don't have enough context to know what border node operations
are here, so this is difficult for me to comment on, but I hope the two
examples above clarify my thinking.

> So when draft-hardie-* says: “Do not add metadata to flows at intermediary devices unless
>
>    a positive affirmation of approval for restoration has been received
>
>    from the actor whose data will be added.”
>
>
>
> (1) Do you assume that the sample examples I listed above fall under your
> advice?
>
> (2) How an on-path device will know the data it intends to insert is a
> “restoration”?
>

If the data is taken from a portion of the packet that would not normally
be forwarded to an upstream host and added to a portion that is forwarded
to an upstream host, then the device adding the data back in should know it
is a restoration.



> (3) Does it mean that for new data (i.e., that are not restoration),
> on-path devices are free to do whatever they want? For me, this is
> undesirable. There is a void there. A statement to require those networks
> to avoid leaking privacy information must be included.
>
>
Brian Trammell has an ever growing list of side channels attacks, and this
document doesn't mean to cover that entire ground.  It's advice for
protocol designers on what the privacy implications are of making the
choice to use network elements to carry this data.



>
>
> Another assumption is made here:
>
>
>
>    Instead, design the protocol so that the actor can add such metadata
>
>    themselves so that it flows end-to-end, rather than requiring the
>
>    action of other parties.  In addition to improving privacy, this
>
>    approach ensures consistent availability between the communicating
>
>    parties, no matter what path is taken.
>
>
>
> This text claims that providing data by the endpoint ensures a “consistent
> availability” of that information. This is broken for a multi-homed host
> that uses for example Forward-For header: Obviously, the content of the
> header if injected by the endpoint will depend on the path.
>

If the endpoint sends the data, data will be consistently available in that
header.  The data changes, of course.



>
> [Med] Resources may not be restricted to CPU or disk but may be granting
> access to the service (e.g., download a file when a quota per source
> address is enforced). It can be whatever the servers consider to be
> critical for them; it is up to the taste of the service design to
> characterize it. The NEW wording proposed above is technically correct.
> Please reconsider adding it to the draft.
>
>
>

I did consider it, but I continue to believe that it moves the needle too
far into simple server preference.  I retained the original PSAP language
in -07 as a result.

I also added a note about your extensive review.  While you and I clearly
have some differences of view, the document has gotten better from your
engagement with it, and I appreciate your efforts.

regards,

Ted