Re: [Int-area] Call for adoption of draft...
Chris Prince Udochukwu Njoku <udochukwu.njoku@unn.edu.ng> Thu, 12 June 2014 08:24 UTC
Return-Path: <udochukwu.njoku@unn.edu.ng>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB1BA1A02B3 for <int-area@ietfa.amsl.com>; Thu, 12 Jun 2014 01:24:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.978
X-Spam-Level:
X-Spam-Status: No, score=-1.978 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yfUJB-nb-UiT for <int-area@ietfa.amsl.com>; Thu, 12 Jun 2014 01:24:01 -0700 (PDT)
Received: from mail-la0-f54.google.com (mail-la0-f54.google.com [209.85.215.54]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 86FF81A0199 for <int-area@ietf.org>; Thu, 12 Jun 2014 01:23:59 -0700 (PDT)
Received: by mail-la0-f54.google.com with SMTP id pv20so488450lab.41 for <int-area@ietf.org>; Thu, 12 Jun 2014 01:23:58 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:date:message-id:subject:from:to :content-type; bh=i9tsZG51RasnP1RSqsvSWfkSUZ0udzNw+1jAlE2eV60=; b=bJCoHfQOLN5LGo1G1E5sYkJ/oTwGXenDkbkxgdNIKlJzWPws3RLwNZ0uMwHhO2IC7x uNCIDXErqsZqQSA06WqW8zrhkD0hheQoL3VeuPKg8xC6vHKHzBGSZA7FtT1KKQdyXYxr rboZUml+dihkLlLKaCytI9i0i9+vH/z13actN3UPc1vbaLDZKD9rcl7gm5OELT3TezR0 nLrPLRqCwhe77XhIv+BPvpNTrmzRJ8LU44Q53mPlef6mmMC0Cg3LvzbzV/9OJDzPkxAG eTGdlNFuSCHfhFhJgMmyMqdnKQVPxWo+UgcN5WXgxiJEnUt1803ITLlddxPZMzYshjsf yMwA==
X-Gm-Message-State: ALoCoQnE0nmAwih86F/wGDAjlovncLXWVN+PtIHHecsoZrxK9K1nxgyMqrFl12KEkfWDLphLKgMy
MIME-Version: 1.0
X-Received: by 10.112.158.101 with SMTP id wt5mr103183lbb.77.1402561438425; Thu, 12 Jun 2014 01:23:58 -0700 (PDT)
Received: by 10.114.98.135 with HTTP; Thu, 12 Jun 2014 01:23:58 -0700 (PDT)
Received: by 10.114.98.135 with HTTP; Thu, 12 Jun 2014 01:23:58 -0700 (PDT)
Date: Thu, 12 Jun 2014 10:23:58 +0200
Message-ID: <CAOz-jXQdnNOXftWopHDTqJPXXVcbbOWogOzDWU1Ljkq6b+GNuw@mail.gmail.com>
From: Chris Prince Udochukwu Njoku <udochukwu.njoku@unn.edu.ng>
To: int-area@ietf.org
Content-Type: multipart/alternative; boundary="001a11c33f7050372404fb9f48f2"
Archived-At: http://mailarchive.ietf.org/arch/msg/int-area/ukEMFHemN-wDDNA_78uPKxHDmvA
X-Mailman-Approved-At: Thu, 12 Jun 2014 08:01:08 -0700
Subject: Re: [Int-area] Call for adoption of draft...
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Jun 2014 08:24:06 -0000
Hi, all, Agreeing to Dirk's observations, I also submit that the draft be adopted. On Jun 11, 2014 4:09 PM, <int-area-request@ietf.org> wrote: > Send Int-area mailing list submissions to > int-area@ietf.org > > To subscribe or unsubscribe via the World Wide Web, visit > https://www.ietf.org/mailman/listinfo/int-area > or, via email, send a message with subject or body 'help' to > int-area-request@ietf.org > > You can reach the person managing the list at > int-area-owner@ietf.org > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of Int-area digest..." > > > Today's Topics: > > 1. Re: Call for adoption of > draft-boucadair-intarea-host-identifier-scenarios-04 > (Dirk.von-Hugo@telekom.de) > 2. Re: Call for adoption of > draft-boucadair-intarea-host-identifier-scenarios-04 > (mohamed.boucadair@orange.com) > 3. Re: [ietf-privacy] NAT Reveal / Host Identifiers > (mohamed.boucadair@orange.com) > 4. Re: [ietf-privacy] NAT Reveal / Host Identifiers > (mohamed.boucadair@orange.com) > 5. Re: [ietf-privacy] NAT Reveal / Host Identifiers (Joe Touch) > 6. Re: [ietf-privacy] NAT Reveal / Host Identifiers (Stephen Farrell) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Wed, 11 Jun 2014 14:20:52 +0200 > From: <Dirk.von-Hugo@telekom.de> > To: <int-area@ietf.org> > Subject: Re: [Int-area] Call for adoption of > draft-boucadair-intarea-host-identifier-scenarios-04 > Message-ID: > < > 05C81A773E48DD49B181B04BA21A342A2E00822ECD@HE113484.emea1.cds.t-internal.com > > > > Content-Type: text/plain; charset="utf-8" > > Dear all, > Considering the current discussion on pros and cons I think the topic of > NAT reveal and Host_Id in terms of problem statements and requirements > towards a solution space indeed needs to be assessed in further detail - > especially since there are actual use cases in heterogeneous access and > transport domains such as policy assignment, emergency calls, function > chaining, content streaming etc. pp. > > Since IntArea WG IMO seems to be a proper discussion arena I am in favor > of adopting the draft. > > Best regards > Dirk > > > De : Int-area [mailto:int-area-bounces@ietf.org] De la part de Suresh > > Krishnan Envoy? : jeudi 5 juin 2014 06:21 ? : Internet Area Objet : > > [Int-area] Call for adoption of > > draft-boucadair-intarea-host-identifier-scenarios-04 > > > > Hi all, > > This draft was originally intended to be published as an AD > > sponsored submission from the OPS area, but the authors have expressed > > their interest to continue this work in the intarea wg given that > > RFC6269 and RFC6967 originated here. The draft has been updated to > > address the issues brought up during earlier discussions on the wg > > mailing list and the latest version of the draft is available at > > > > http://tools.ietf.org/html/draft-boucadair-intarea-host-identifier-sce > > narios-04 > > > > This call is being initiated to determine whether there is WG consensus > towards adoption of draft-boucadair-intarea-host-identifier-scenarios-04 as > an intarea WG draft. Please state whether or not you're in favor of the > adoption by replying to this email. If you are not in favor, please also > state your objections in your response. This adoption call will complete on > 2014-06-19. > > > > Regards > > Suresh & Juan Carlos > > > ------------------------------ > > Message: 2 > Date: Wed, 11 Jun 2014 14:24:06 +0000 > From: <mohamed.boucadair@orange.com> > To: S Moonesamy <sm+ietf@elandsys.com>, "Tirumaleswar Reddy (tireddy)" > <tireddy@cisco.com>, "int-area@ietf.org" <int-area@ietf.org> > Subject: Re: [Int-area] Call for adoption of > draft-boucadair-intarea-host-identifier-scenarios-04 > Message-ID: > > <787AE7BB302AE849A7480A190F8B9330016053@OPEXCLILM23.corporate.adroot.infra.ftgroup > > > > Content-Type: text/plain; charset="iso-8859-1" > > Hi SM, > > Please see inline. > > Cheers, > Med > > >-----Message d'origine----- > >De?: S Moonesamy [mailto:sm+ietf@elandsys.com] > >Envoy??: vendredi 6 juin 2014 14:56 > >??: BOUCADAIR Mohamed IMT/OLN; Tirumaleswar Reddy (tireddy); int- > >area@ietf.org > >Objet?: RE: [Int-area] Call for adoption of draft-boucadair-intarea-host- > >identifier-scenarios-04 > > > >Hi Med, > >At 00:59 06-06-2014, mohamed.boucadair@orange.com wrote: > >>[Med] FWIW, the scenarios draft is not a "HOST_ID specification > document". > > > >[snip] > > > >>[Med] Having a dedicated section for privacy is a signal that we > >>have those issues on our radar. Our analysis at this stage is that > >>RFC6967 includes a decent discussion that is still valid for this > >>use cases document. If you think that additional concerns are to be > >>discussed, please don't hesitate to share them. We will consider > >>updating the document accordingly. > > > >[snip] > > > >>[Med] There is no mention of "HOST_ID" in this draft. Furthermore, > >>the current text says the following: > >>" The document does not elaborate whether explicit authentication is > >> enabled or not." > >> > >>Solution-specific discussions are out of scope. The main mission of > >>the document is to help identifying use cases where there are > >>difficulties to enforce per-host policies due to the presence of > >>address sharing or the use of tunnels. > > > >[snip] > > > >>[Med] Documenting misuses should be definitely in scope. > >>Contributions are more than welcome. > > > > From the above (quoted text) I understand that there are > >difficulties to enforce policies and those difficulties have not be > >discussed or addressed in IETF RFCs. > > [Med] Yes. > > The INTAREA working group > >previously worked on a RFC about potential solutions for revealing a > >host identifier. Are the potential solutions discussed in RFC 6967 > >inadequate? > > [Med] The effort in RFC6967 does not ambition to pick a solution but to > conduct an analysis effort with a focus on the CGN case. That case is only > one among others defined in the scenario draft. Identify and document the > use cases is a first step to actually understand the problem we are talking > about. This is a contribution to clarify the big picture of this problem > space. > > I don't think the question is out of scope given that > >the draft references RFC 6967. > > [Med] Privacy is not out of scope as I mentioned in a previous message. > Nevertheless, privacy implications may depend on the targeted use case. The > considerations in RFC6967 can be completed with new ones if any. > > > > >If the mission is to identify use cases, why are discussions about > >the use cases (see Section 2) out of scope? > > [Med] What we declared out of scope is solution-oriented aspects. We > wanted to have a very focused document. > > > > >The lack of host identification does not affect host > >connectivity. This scenarios draft makes the case for the lack of > >host identification being the cause of problems. > > [Med] The draft focuses only on scenarios where complications arise. The > problem may be abstracted from other perspective but the host > identification is a valid angle IMHO. > > Do the problems > >affect the internet or are they limited cases? > > [Med] Implication on connectivity depends on the use cases. For example, a > service that black list a full IP address or rate limit based on the > source IP address will impact a lot of customers; access to services won't > be granted. > > > > >Regards, > >S. Moonesamy > > > > ------------------------------ > > Message: 3 > Date: Wed, 11 Jun 2014 14:31:38 +0000 > From: <mohamed.boucadair@orange.com> > To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Ted Lemon > <ted.lemon@nominum.com> > Cc: "ietf-privacy@ietf.org" <ietf-privacy@ietf.org>, > "int-area@ietf.org" <int-area@ietf.org> > Subject: Re: [Int-area] [ietf-privacy] NAT Reveal / Host Identifiers > Message-ID: > > <787AE7BB302AE849A7480A190F8B933001605D@OPEXCLILM23.corporate.adroot.infra.ftgroup > > > > Content-Type: text/plain; charset="iso-8859-1" > > Hi Stephen, > > Please see inline. > > Cheers, > Med > > >-----Message d'origine----- > >De?: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie] > >Envoy??: vendredi 6 juin 2014 17:59 > >??: BOUCADAIR Mohamed IMT/OLN; Ted Lemon > >Cc?: Brian E Carpenter; ietf-privacy@ietf.org; int-area@ietf.org > >Objet?: Re: [Int-area] [ietf-privacy] NAT Reveal / Host Identifiers > > > > > >Hi Med, > > > >On 06/06/14 12:41, mohamed.boucadair@orange.com wrote: > >> [Med] I'm not sure about this Ted. There are other initiatives that > >> try to solve the issue for particular use cases, see for instance > >> this effort for HTTP: > >> http://tools.ietf.org/html/draft-ietf-appsawg-http-forwarded-10. The > >> rationale of the "host identifier scenarios" document is to group all > >> use cases suffering from the same problem instead of focusing on one > >> single case. This allows having a big picture view of the problem > >> space. > > > >I think XFF is actually a good example of why we ought not adopt > >this work. > > [Med] I provided "Forward" as an example to illustrate there is a need to > have a big picture view rather than focusing on specific use case. This > draft does not suggest to adopt XFF or Forward at all. There is a need to > understand the problem space and identify deployment scenarios where > encountering complications. > > > > >XFF is widely deployed already but somewhat flakey in terms of > >interop so the authors of the above draft aimed to produce a spec > >that just addressed interop. (*) That was adopted by an area WG > >without (IMO) ever really considering the privacy implications, > >and definitely without any effort having been made to develop a > >more privacy-friendly mechanism (which could have been done, again > >IMO) to solve what were the claimed use-cases. > > [Med] Wouldn't be this effort an opportunity to promote those solutions > you are advocating for? The proxy use case (not limited to HTTP) is listed > as a typical scenario. If there are other better solutions that solves your > privacy concerns, why not documenting them? > > By the time it > >got to the IESG that was in practice unfixable and after some > >fairly painful discussions it ended up with 4 abstain ballots, > >including mine. [1] (For those who quite reasonably don't need > >to care about IESG balloting, an abstain means approximately > >"yuk.":-) > > > >Of course that all also pre-dated BCP188 and the last year's > >shenanigans so I'd hope we have learned to not keep doing that. > > > >I'd be delighted if those who could get a better solution > >implemented/deployed were to attempt to try to address the > >privacy issues with XFF but it seems that at least in that > >case relevant folks don't care (sufficiently;-) deeply about > >our privacy to go do that. > > > >S. > > > >[1] > > > https://datatracker.ietf.org/doc/draft-ietf-appsawg-http-forwarded/ballot/ > > > >(*) To be clear: I think the authors were genuinely just > >trying to fix what they saw as an interop problem. > > > > ------------------------------ > > Message: 4 > Date: Wed, 11 Jun 2014 14:38:16 +0000 > From: <mohamed.boucadair@orange.com> > To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Dan Wing > <dwing@cisco.com> > Cc: "ietf-privacy@ietf.org" <ietf-privacy@ietf.org>, Internet Area > <int-area@ietf.org> > Subject: Re: [Int-area] [ietf-privacy] NAT Reveal / Host Identifiers > Message-ID: > > <787AE7BB302AE849A7480A190F8B9330016077@OPEXCLILM23.corporate.adroot.infra.ftgroup > > > > Content-Type: text/plain; charset="iso-8859-1" > > Re-, > > Please see inline. > > Cheers, > Med > > >-----Message d'origine----- > >De?: ietf-privacy [mailto:ietf-privacy-bounces@ietf.org] De la part de > >Stephen Farrell > >Envoy??: samedi 7 juin 2014 15:21 > >??: Dan Wing > >Cc?: ietf-privacy@ietf.org; Internet Area; Joe Touch > >Objet?: Re: [ietf-privacy] [Int-area] NAT Reveal / Host Identifiers > > > > > >Hi Dan, > > > >On 07/06/14 02:38, Dan Wing wrote: > >> > >> Stephen, > >> > >> It seems NAPT has become IETF's privacy feature of 2014 because > >> multiple users are sharing one identifier (IP address and presumably > >> randomized ports [RFC6056], although many NAPT deployments use > >> address ranges because of fear of compressing log files). As a > >> former co-chair of BEHAVE it is refreshing to see the IETF embracing > >> NAPT as a desirable feature. > > > >Embracing seems like significant overstatement to me, but maybe > >that's understandable given how calmly NAT is generally debated. > > > >NATs have both good and bad properties. The slightly better privacy > >is one of the good ones. > > > >Recognising that reality is neither embracing nor refreshing IMO, > >nor does it mean NAPT is (un)desirable overall. (That's an argument > >I only ever watch from the side-lines thanks:-) > > > >> However, if NAPT provides privacy and NAT Reveal removes it, where > >> does that leave a host's IPv6 source address with respect to BCP188? > >> > >> Afterall, an IPv6 address is quite traceable, even with IPv6 privacy > >> addresses (especially as IPv6 privacy addresses are currently > >> deployed which only obtain a new IPv6 privacy address every 24 hours > >> or when attaching to a new network). If BCP188 does not prevent > >> deployment of IPv6, I would like to understand the additional privacy > >> leakage of IPv4+NAT+NAT_Reveal compared to the privacy leakage of > >> IPv6+privacy_address. > > > >I'm frankly amazed that that's not crystal clear to anyone who > >has read all 2.5 non-boilerplate pages of the BCP. Or even just > >the last two words of the 1-line abstract (hint: those say "where > >possible.") > > > >Yes, source addresses leak information that affects privacy. But > >we do not have a practical way to mitigate that. So therefore > >BCP188 does not call for doing stupid stuff, nor for new laws of > >physics (unlike -04 of the draft we're discussing;-) > > [Med] FWIW, this draft does not hint solutions but it aims to describe > scenarios with problems. I understand you have concerns with privacy but > this is not an excuse to abuse and characterize this effort as "stupid". > Privacy implications should be assess on a per use case basis (see for > example cases where all involved entities belong to same administrative > entity). Furthermore, the document (including -04) says the following : > "the document does not elaborate whether explicit authentication is enabled > or not." > > > > >Adding new identifiers with privacy impact, as proposed here, is > >quite different. > > [Med] I have already clarified this point: the scenario draft does not > propose any identifier! > > > > >S. > > > >PS: If someone wants to propose what they think is a practical > >way to mitigate the privacy issues with source addresses, please > >write a draft first and then start a separate thread somewhere. > > > > > >> > >> -d > >> > > > >_______________________________________________ > >ietf-privacy mailing list > >ietf-privacy@ietf.org > >https://www.ietf.org/mailman/listinfo/ietf-privacy > > > > ------------------------------ > > Message: 5 > Date: Wed, 11 Jun 2014 07:54:12 -0700 > From: Joe Touch <touch@isi.edu> > To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Dan Wing > <dwing@cisco.com> > Cc: "ietf-privacy@ietf.org" <ietf-privacy@ietf.org>, Internet Area > <int-area@ietf.org> > Subject: Re: [Int-area] [ietf-privacy] NAT Reveal / Host Identifiers > Message-ID: <53986D94.5090801@isi.edu> > Content-Type: text/plain; charset=ISO-8859-1; format=flowed > > > > On 6/7/2014 6:20 AM, Stephen Farrell wrote: > > Yes, source addresses leak information that affects privacy. But > > we do not have a practical way to mitigate that. So therefore > > BCP188 does not call for doing stupid stuff, nor for new laws of > > physics (unlike -04 of the draft we're discussing;-) > > Again, BCP188 does not *call* for doing anything. There are no SHOULD- > or MUST- level requirements in that doc. Let's please not wave it in the > air as if there are. > > Joe > > > > ------------------------------ > > Message: 6 > Date: Wed, 11 Jun 2014 16:09:19 +0100 > From: Stephen Farrell <stephen.farrell@cs.tcd.ie> > To: Joe Touch <touch@isi.edu>, Dan Wing <dwing@cisco.com> > Cc: "ietf-privacy@ietf.org" <ietf-privacy@ietf.org>, Internet Area > <int-area@ietf.org> > Subject: Re: [Int-area] [ietf-privacy] NAT Reveal / Host Identifiers > Message-ID: <5398711F.1020702@cs.tcd.ie> > Content-Type: text/plain; charset=ISO-8859-1 > > > > On 11/06/14 15:54, Joe Touch wrote: > > > > > > On 6/7/2014 6:20 AM, Stephen Farrell wrote: > >> Yes, source addresses leak information that affects privacy. But > >> we do not have a practical way to mitigate that. So therefore > >> BCP188 does not call for doing stupid stuff, nor for new laws of > >> physics (unlike -04 of the draft we're discussing;-) > > > > Again, BCP188 does not *call* for doing anything. There are no SHOULD- > > or MUST- level requirements in that doc. Let's please not wave it in the > > air as if there are. > > I don't buy that argument at all and didn't wave anything anywhere. > > BCP188 very clearly says: > > Pervasive monitoring is a technical attack that should be mitigated > in the design of IETF protocols, where possible. > > and > > Those developing IETF specifications need to be able to describe how > they have considered PM, and, if the attack is relevant to the work > to be published, be able to justify related design decisions. This > does not mean a new "pervasive monitoring considerations" section is > needed in IETF documentation. It means that, if asked, there needs > to be a good answer to the question "Is pervasive monitoring relevant > to this work and if so, how has it been considered?" > > Reverting to RFC2119-keyword-lawyering is not IMO credible here. > > S. > > > > > > > Joe > > > > > > > > ------------------------------ > > Subject: Digest Footer > > _______________________________________________ > Int-area mailing list > Int-area@ietf.org > https://www.ietf.org/mailman/listinfo/int-area > > > ------------------------------ > > End of Int-area Digest, Vol 107, Issue 12 > ***************************************** >
- Re: [Int-area] Call for adoption of draft... Chris Prince Udochukwu Njoku
- Re: [Int-area] Call for adoption of draft... Ted Lemon