Re: [Int-area] WG Adoption Call: IP Fragmentation Considered Fragile

Tom Herbert <tom@herbertland.com> Wed, 29 August 2018 17:38 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 168B6130E71 for <int-area@ietfa.amsl.com>; Wed, 29 Aug 2018 10:38:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1wrRp2udWmQy for <int-area@ietfa.amsl.com>; Wed, 29 Aug 2018 10:38:44 -0700 (PDT)
Received: from mail-qt0-x229.google.com (mail-qt0-x229.google.com [IPv6:2607:f8b0:400d:c0d::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 306D2124C04 for <int-area@ietf.org>; Wed, 29 Aug 2018 10:38:44 -0700 (PDT)
Received: by mail-qt0-x229.google.com with SMTP id t39-v6so6685010qtc.8 for <int-area@ietf.org>; Wed, 29 Aug 2018 10:38:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=oS0sagAhEw9ZUX0qUIOQ0eCzp2BjoNYIVz3UYXF9Pt0=; b=LrVbm1zcsMiO4CotgEmls/eIlZdsaQuiPOhXWASSEkDciC+8LnYMQbPXzjsu7IK5Yv DxGJWILecnMvLg0Om0RgNhBrCXUqd+xJ9FzKnbfI86AP4aZIJhBDkwOyMzZQEiOwSDrU HzYtcH7nLf1cV70RIwPJGwlVGimGrUN7qE/Mb0XS4sssE170SSKUnDHjfnc0LJZH6baD czLjuTv0UddYGBjAD9TXljV1RxUiovSbLNeNt5/hRp3CGlBcjCJcKv/5//EOYG9FeZZK gLj4fgcp6DTRaDy9GpUHHLvCaKoDGt/CtYpxW7u+leJ50sU3eq7+9TRdqzY9321Je36K OvYw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=oS0sagAhEw9ZUX0qUIOQ0eCzp2BjoNYIVz3UYXF9Pt0=; b=XLa5+TARU9L0Hqypus5eLp6Yy5NsMsC85+ZwBsqcsES+OgRkn2aHxrhuFTbT1KFqum s8mzqxjNdkJpFcSLHXj/rrWELYsAX1YOjReCDp9xgBJ4wJa8hsz62aU3V7bIIV+4PKQ7 +El8mZRDpoNFsSE+ccVXeYEo1j1foaMXpXMOuNO9/izIa1KtIf1D0xSlYsZ1tzaST4d2 sIcCBGaY7biCpZVSAVDMtGom2TRJ2K5L9eqodhdvP7MODRFs7w6Y7GwQsJLaTJVcgdUW Jv/1g5r+NAOo4qiLzujd62gsKhm8HvbXL9/pjJlYibjdX0bmzRf5xmQUE6Ob15dBh2RP JZlQ==
X-Gm-Message-State: APzg51B+DQjc4t7uGEPk1AljpNpa74/0YJx0IOd+kKLTkv/bKs3cSSjP /hBwRk/lsKI9461q5jxXbgnn8y0NPV8khh/FnFCcJqyZJ2KI5A==
X-Google-Smtp-Source: ANB0Vdb+NqG6GOFZ2YEu3ke4Cnt1Yu8t/lMeqAfu0piaBMvhV2EAZ6Vg5duMxSCNsPK47n4lx3OtOGXzTTcVzsodFxU=
X-Received: by 2002:a0c:bd0e:: with SMTP id m14-v6mr7493958qvg.168.1535564323123; Wed, 29 Aug 2018 10:38:43 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ac8:3312:0:0:0:0:0 with HTTP; Wed, 29 Aug 2018 10:38:42 -0700 (PDT)
In-Reply-To: <2b6dd7006cca65525ac6240a8edffabb@strayalpha.com>
References: <CAF493D3-37A2-4A89-BA88-81567E5B88F1@huitema.net> <538A6193-2BD7-4E72-BD28-736B81F97B33@strayalpha.com> <20180826215558.6hzff2povrxuis3y@faui48f.informatik.uni-erlangen.de> <0A065EE6-463C-4C71-BF12-C0E5A1C51680@strayalpha.com> <20180826233350.kz3q6gzqbq36nn4r@faui48f.informatik.uni-erlangen.de> <810cea0d-809f-040d-bc79-7c7413cd99f2@strayalpha.com> <20180827023513.2bxjrk335al2lbvz@faui48f.informatik.uni-erlangen.de> <E02F3C36-ECE6-419E-A219-08A15AD98D13@strayalpha.com> <20180828220915.fpx5hi7nhl46ou6r@faui48f.informatik.uni-erlangen.de> <CALx6S35vbtYOiEx2opqSh1uq9rfgG5QHEQcb+ccWLMcwWZA-uQ@mail.gmail.com> <20180829002430.fojlqonvnqdrhw4z@faui48f.informatik.uni-erlangen.de> <af424b4b449c4a1459b69ed01a984e48@strayalpha.com> <CALx6S3563g___ZP03dD5+sV++ZH7U5yudqRX0Bf2744BbBxGgQ@mail.gmail.com> <2b6dd7006cca65525ac6240a8edffabb@strayalpha.com>
From: Tom Herbert <tom@herbertland.com>
Date: Wed, 29 Aug 2018 10:38:42 -0700
Message-ID: <CALx6S37EiFo8C4K7fO=O0hNpStoaS6wBvM8jVowmJTQHW2=DHw@mail.gmail.com>
To: Joe Touch <touch@strayalpha.com>
Cc: Toerless Eckert <tte@cs.fau.de>, Christian Huitema <huitema@huitema.net>, int-area <int-area@ietf.org>, intarea-chairs@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/IaGotLAASUFFxR-gGiTsOQIF3Rk>
Subject: Re: [Int-area] WG Adoption Call: IP Fragmentation Considered Fragile
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Aug 2018 17:38:46 -0000

On Wed, Aug 29, 2018 at 10:10 AM, Joe Touch <touch@strayalpha.com> wrote:
> Tom,
>
>
>
>
> On 2018-08-29 09:53, tom wrote:
>
> On Wed, Aug 29, 2018 at 8:11 AM, Joe Touch <touch@strayalpha.com> wrote:
>
>
>
>
>
> On 2018-08-28 17:24, Toerless Eckert wrote:
>
> ...Sure, i meant to imply that port-numbers are useful pragmatically,
> but other context identifiers would long term be better.
> Demux-Identifiers at the granualarity of a subscriber or
> application wold be a lot more scalable than flow identifiers.
>
>
> There are many problems with this issue.
>
> First, the reason that port numbers would be needed is that they are
> *currently* how NATs demux, firewalls enforce policy, and routers manage
>
>
> There is no requirement in IP that all packets have a transport layer
> header that with port numbers. ...
>
>
> Yes, we agree. It's not the only way they SHOULD or COULD work, but it is
> how they DO work.
>
>
>
>
>
> Ultimately, we have to admit that a device that acts on behalf of a host IS
> a host and costs what a host costs.
>
>
> That in turn breaks the the end-to-end model.
>
>
>
> Acting like what you are doesn't break anything; it lets you act to the
> fullest extent possible.
>
> Relaying info through hosts inside a network path is what breaks the E2E
> model - agreed.
>
> All I am saying is that:
> - IF you deploy a middle box, THEN it MUST act as a host and reassemble (or
> do the equivalent)
>
> I wasn't endorsing the IF.

I don't think you need the part about acting as a host, that would
have other implications. Also, the reassembly requirement might be
specific to NAT and not other middlebox functionality. For instance,
it would be sufficient for a firewall that is dropping UDP packets to
some port to only drop the first fragment that has UDP port numbers
and let the other fragments pass. Without the first fragment
reassembly at the destination will simply timeout and the whole packet
is dropped.

>
>
>
>
> Middleboxes that attempt
> to participate transport protocols, like a host, inevitably break
> things and hence is another source of ossification. This is readily
> evident apparent in that they can't participate in end-to-end crypto.
>
>
> They can* participate in crypto, but then the definition of E2E ends where
> it should - at the middlebox.
>
> * = only if they somehow are given the key, of course
>
>
>
> Of course they have tried to insert themselves into that realm, but
> then we get abominations such as the forced MITM attacks of SSL
> inspection. IMO, real end-to-end security is a core requirement that
> outweighs any tradeoffs we might make for the security benefits of
> firewalls.
>
>
> I would argue that it is OK to give a middlebox the key if that's OK for a
> given trust model, e.g., it would make sense inside an enterprise to offload
> security to the ingress of that enterprise. But not elsewhere;
>
Sure enterprises can do that. But I'm more worried about the five
billion mobile devices that may connect to random WIFI or mobile
networks over the course of a day. For them there is simply no concept
that the network will provide any level of security.

Tom

>
>
>
>
> We can't keep believing there is magic dust that can establish a solution
> otherwise.
>
> As they say, the answer to ossification is encryption.
>
>
> It's not an answer; it renders the question irrelevant, as it should.
>
> Not all questions necessarily have answers. As Rocket will tell you (ref:
> end scenes, Guardians of the Galaxy), wanting something does not make it so.
>
> Joe