Re: [Int-area] [saag] 3rd WGLC (limited-scope): draft-ietf-tsvwg-transport-encrypt-15, closes 29 June 2020

Dirk.von-Hugo@telekom.de Wed, 01 July 2020 14:11 UTC

Return-Path: <Dirk.von-Hugo@telekom.de>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F7B83A0B1B; Wed, 1 Jul 2020 07:11:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZDMrS0SsqQGi; Wed, 1 Jul 2020 07:11:22 -0700 (PDT)
Received: from mailout31.telekom.de (mailout31.telekom.de [194.25.225.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B0BD93A0849; Wed, 1 Jul 2020 07:11:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1593612681; x=1625148681; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=kv8QEDhJIqfQwSZMVjbmU83WpKuGDrp2SA3dTIjS5+0=; b=0W6z8GXvKvWKZ8tAw1IWwNyRaVtxGy0wZ4SkoflEPNRix8z/AZcUohCm ncT/KGPgOHo6qPQVqO72toiDzbOLmJU/GhcuoAAnEkcL07gxG8lJ7iNru JOsfAt/HF6U7oAJsruO9RDDR/aFswiLZ2JNyj7PVJK44bv/a7OL3eenbO 7ZtQYfilcAB5mDKXPizypwUJKssrGy5h4Uew18cSonjoO7dtdpdbiKATX WTkZYF6Pz0uVh3YoLQzOeXWEX+PRXYQvoI+cLbqvH1XL33c/Lnjo/Giim sk1+OiJ4oVyguDHplEh/HhQGhBe4wkQ1E9pBDBFpQXVpxXfoYLcDK0Sqa A==;
IronPort-SDR: O01xHtBJxJzXNqEWQLrmJ1fMegvNQlRZySeq0pKAhBTJ7nx5tv6Ko7OP7d5I9TC3vnuyRzqkKE JnF3rJGm6hcA==
Received: from qde9xy.de.t-internal.com ([10.171.254.32]) by MAILOUT31.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Jul 2020 16:11:18 +0200
IronPort-SDR: dHcX60qnhCX4jdvkUUJtG02lVSTMQZrQ7zUl4nuRPG3tTE4O4UnsGgiOtp6/v9VWbslXMgJIY3 hAFbWVjs2o6M32nkCr+4B3sM2ToDs7qjw=
X-IronPort-AV: E=Sophos;i="5.75,300,1589234400"; d="scan'208,217";a="131263765"
X-MGA-submission: MDFU+dIAeBpnfVu5yyKKYZ2RelaOHPIW6X+sKcVT/Shbr8tarf0vNxuOSoLNw6F6HeEY8CwE2CARP+T0L8F3ka6PsJSh+RHr+Ll2tOWUFtnqZWOd22sythsqinEEGCYXsUnae/7dzEkID2x2lAeKnRYvJbhH6p7Ixin8rFc5TtNNWw==
Received: from he105867.emea1.cds.t-internal.com ([10.169.119.44]) by QDE9Y1.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES256-SHA384; 01 Jul 2020 16:11:18 +0200
Received: from HE199743.EMEA1.cds.t-internal.com (10.169.119.51) by HE105867.emea1.cds.t-internal.com (10.169.119.44) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 1 Jul 2020 16:11:18 +0200
Received: from HE104163.emea1.cds.t-internal.com (10.171.40.38) by HE199743.EMEA1.cds.t-internal.com (10.169.119.51) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Wed, 1 Jul 2020 16:11:17 +0200
Received: from GER01-FRA-obe.outbound.protection.outlook.de (51.4.80.17) by O365mail05.telekom.de (172.30.0.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 1 Jul 2020 16:11:17 +0200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kFOE07pwygyu/9DkJ/p+eg8SIDWczFJZ02Lf25SeR6OSnR2tjbw+4SMWrtkQqW6UmTJS5EIEoWAivF1tNHwDIeZHspqRrakJKcRvR1mAc6ypX34tcj9k2ioaLk41Iinc23IYdMrc9ybmfZrTMWsg4LnhbO9hktMH6s6OkIo1rc2QbGdUiw1dHsVYnK39hQxepx+l52pSR7ePfCJGxzEuvEpPIqcxol+jTj8g3Do1UwNOfR6SkoQuf+o9M7O5jirsnJWcsK++p6FpubiJwkRxD2svTqSxHgxcyh6+9Kr9adOnX+Y+o1cpgthPsG/3huvzDnaWVcaaNsvfHLhIDys3Og==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kv8QEDhJIqfQwSZMVjbmU83WpKuGDrp2SA3dTIjS5+0=; b=UW0Am1SoJPj3yWqkIGlI7y+61WKFbdOnZ7pzCgtGy02EXqJ77maj+HOog7898ugmcAfkyjvK01oFgdWGzYTW6R5MQDeM/avmEj3ImnTUFYYP733NffFoVUw4a9Sn1W45u2DaSfubq07FEGhAjEJFaEUjAljVL/RkZjV3+wIMfDjBnHqe8+89sIVmiLzfid1CFP8BEb49ADhMso5HqRIq9Y+dzwXPazJ2f3QrvzRlSbnRd8ad+IPa4cZr+ux4fv25cfCJoZSvPn/XmA8GFiG2PqxjmHp/QMQz5+tOwwiRw89x+3YwlTQw7JvFXPlOH+vJnA9BPaTjEyKSRiVd40j4Tg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from FRAPR01MB0401.DEUPRD01.PROD.OUTLOOK.DE (2a01:4180:c010:9::10) by FRAPR01MB0739.DEUPRD01.PROD.OUTLOOK.DE (2a01:4180:c010:a::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3131.25; Wed, 1 Jul 2020 14:11:16 +0000
Received: from FRAPR01MB0401.DEUPRD01.PROD.OUTLOOK.DE ([fe80::8943:6cde:8869:8ba6]) by FRAPR01MB0401.DEUPRD01.PROD.OUTLOOK.DE ([fe80::8943:6cde:8869:8ba6%6]) with mapi id 15.20.3131.030; Wed, 1 Jul 2020 14:11:16 +0000
From: Dirk.von-Hugo@telekom.de
To: krose@krose.org, Hannes.Tschofenig@arm.com
CC: int-area@ietf.org, tsvwg@ietf.org, saag@ietf.org
Thread-Topic: [Int-area] [saag] 3rd WGLC (limited-scope): draft-ietf-tsvwg-transport-encrypt-15, closes 29 June 2020
Thread-Index: AQHWTqJcCWNk2zpnpUqWBMHRx3E5oKjysTeAgAAGS4CAAApUgIAAA75A
Date: Wed, 01 Jul 2020 14:11:16 +0000
Message-ID: <FRAPR01MB04015215AF32FC06B8A7184BD16C0@FRAPR01MB0401.DEUPRD01.PROD.OUTLOOK.DE>
References: <MN2PR19MB40450EE357BEECD723AB06F183820@MN2PR19MB4045.namprd19.prod.outlook.com> <CABcZeBM9A1RxOiHGZdBznTb7zzArG5GTQs=bhNtBy90tSXs3Pg@mail.gmail.com> <AM0PR08MB3716528B48BCF9447002B551FA6F0@AM0PR08MB3716.eurprd08.prod.outlook.com> <21886_1593608278_5EFC8856_21886_470_1_787AE7BB302AE849A7480A190F8B9330314EBA5C@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <AM0PR08MB371604E04179C212341100EEFA6C0@AM0PR08MB3716.eurprd08.prod.outlook.com> <CAJU8_nXR_FOhNrSatf_pHke7QRrzGjEKjeFvUAeH9ijgLzJnpw@mail.gmail.com>
In-Reply-To: <CAJU8_nXR_FOhNrSatf_pHke7QRrzGjEKjeFvUAeH9ijgLzJnpw@mail.gmail.com>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: krose.org; dkim=none (message not signed) header.d=none;krose.org; dmarc=none action=none header.from=telekom.de;
x-originating-ip: [212.201.104.11]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0010014c-ed37-4cb1-8ad6-08d81dc89eba
x-ms-traffictypediagnostic: FRAPR01MB0739:
x-microsoft-antispam-prvs: <FRAPR01MB0739872EAE0EDB5F0FAF2ECED16C0@FRAPR01MB0739.DEUPRD01.PROD.OUTLOOK.DE>
x-ms-oob-tlc-oobclassifiers: OLM:4502;
x-forefront-prvs: 04519BA941
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: le6nFQBYltxje6upOufFfTanmXrrNUiARbzZPHX2QV0DTJTaUhx6VG3OtLuAWqGSjk05NneHlPlWHmOiJY3roIYFvquQY+RjzOIJe9DJm5ktNNal0vpmT9Kq1Hz5grLVweAUOPqkStYIVuXKcW9IDk0315MdcQo8f2VbUs8gU13D3/NU6ypjKNeos+grWcSHUJH14qcSbbUZaYGbEaPkxqakZC1aRIAe+RxPcPt1uNlvJ6l2T3RHEeKQmFCFEEeUqRPy5l8xarDfjMZv6bHuZ1zDyG6HszZBomCz14ScIHCzpCArhEUuz8SqFNJZ7/MG7loOMjZBKxsPX8ISwPjjhQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FRAPR01MB0401.DEUPRD01.PROD.OUTLOOK.DE; PTR:; CAT:NONE; SFTY:; SFS:(39860400002)(136003)(376002)(396003)(346002)(366004)(8676002)(478600001)(33656002)(66476007)(8936002)(26005)(66946007)(76116006)(186003)(5660300002)(66556008)(2906002)(53546011)(64756008)(66446008)(4326008)(54906003)(7696005)(86362001)(316002)(9686003)(83380400001)(110136005)(55016002)(71200400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_FRAPR01MB04015215AF32FC06B8A7184BD16C0FRAPR01MB0401DEUP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: FRAPR01MB0401.DEUPRD01.PROD.OUTLOOK.DE
X-MS-Exchange-CrossTenant-Network-Message-Id: 0010014c-ed37-4cb1-8ad6-08d81dc89eba
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Jul 2020 14:11:16.5825 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /U7lxMnVRB3KNb+Nir6GkykQOGfYwG0ClGaMv7cueuDNC/q1WVDYVhNNIeTX7JTcp/Vm3JzeOLUNx4S3F6DxvmmgaxSweNZu1D4tO4fMcjI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: FRAPR01MB0739
X-TM-SNTS-SMTP: 2068C7AB359E9FF980974BC6DB10E57F39C42F94BD9A0F48DB6003257803A1B22000:8
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/QdEXFL_GbGzGmm4KepaM88ZCPv0>
Subject: Re: [Int-area] [saag] 3rd WGLC (limited-scope): draft-ietf-tsvwg-transport-encrypt-15, closes 29 June 2020
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2020 14:11:24 -0000

+1
Thanks, Kyle!
Kind regards
Dirk

From: Int-area <int-area-bounces@ietf.org> On Behalf Of Kyle Rose
Sent: Mittwoch, 1. Juli 2020 15:57
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
Cc: int-area <int-area@ietf.org>; tsvwg@ietf.org; IETF SAAG <saag@ietf.org>
Subject: Re: [Int-area] [saag] 3rd WGLC (limited-scope): draft-ietf-tsvwg-transport-encrypt-15, closes 29 June 2020

On Wed, Jul 1, 2020 at 9:20 AM Hannes Tschofenig <Hannes.Tschofenig@arm.com<mailto:Hannes.Tschofenig@arm.com>> wrote:
I noticed this in various IETF discussions and so I will describe it in the abstract.

A group of people propose an idea. Those who do not like the idea are then asked to convince the original contributors that their idea is not sound or contribute text so make it look nicer.
Not only is this requiring me to spend my time on something I don’t agree with but it turns out that no discussions will change the mind of the original contributors. They just strongly believe in their ideas. They will keep proposing the same idea over and over again (for years) till it gets published as an RFC..

I don't understand why so many are opposed to publishing a document that merely describes how operators manage protocols in the absence of header encryption, and how header encryption interferes with those practices. That is, at least, in its original form, before this WG decided it needed to incorporate pro-encryption advocacy, greatly complicating the document and the resulting analysis.

For the OG version, I ask myself the following questions:

Does the document describe reality? Yes: it tells us what practices operators employ today.
Is the document useful? Yes: see above, plus it makes clear that there will be an impact to operators and/or protocol users from this evolution.
Does the document establish an IETF position on encryption? No. There are plenty of other published RFCs that embody the spirit "encrypt all the things". This document does not change that.
Does the document make normative statements about future protocol development? No.

On what basis would I therefore oppose publication?

I may or may not have opinions about prioritization of user privacy over manageability, the tussle between manageability and deployability, and what alternatives are available to operators for managing protocols with encrypted headers. I would be happy to help express those in a follow-on document. But this document describing where those conflicts lie is a *prerequisite* to developing those alternatives. And frankly those opinions are irrelevant to the intended content of *this* document.

Kyle