Re: A problem with RFC 6465's Uniform Format for Extension Headers
Fernando Gont <fgont@si6networks.com> Fri, 14 February 2014 09:11 UTC
Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 872061A0179 for <ipv6@ietfa.amsl.com>; Fri, 14 Feb 2014 01:11:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.302
X-Spam-Level:
X-Spam-Status: No, score=-1.302 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_42=0.6, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QYg3enGwt-FB for <ipv6@ietfa.amsl.com>; Fri, 14 Feb 2014 01:11:51 -0800 (PST)
Received: from web01.jbserver.net (web01.jbserver.net [IPv6:2a00:d10:2000:e::3]) by ietfa.amsl.com (Postfix) with ESMTP id CB3191A00DC for <6man@ietf.org>; Fri, 14 Feb 2014 01:11:50 -0800 (PST)
Received: from [2001:5c0:1000:a::fab] by web01.jbserver.net with esmtpsa (TLSv1:DHE-RSA-CAMELLIA256-SHA:256) (Exim 4.82) (envelope-from <fgont@si6networks.com>) id 1WEEnL-0002Pu-CX; Fri, 14 Feb 2014 10:10:51 +0100
Message-ID: <52FDDA1B.3060104@si6networks.com>
Date: Fri, 14 Feb 2014 05:55:55 -0300
From: Fernando Gont <fgont@si6networks.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: Mark ZZZ Smith <markzzzsmith@yahoo.com.au>, Fernando Gont <fernando@gont.com.ar>, Ole Troan <otroan@employees.org>
Subject: Re: A problem with RFC 6465's Uniform Format for Extension Headers
References: <20140130230740.25350.9524.idtracker@ietfa.amsl.com> <52EAF63A.7050108@si6networks.com> <52F1B8CE.4070803@ericsson.com> <52F1BD1F.2080007@si6networks.com> <m3k3d82zz6.wl%narten@us.ibm.com> <52F383A0.7030002@si6networks.com> <m28utnbwj9.wl%randy@psg.com> <52F44A73.3000609@si6networks.com> <86BA587E-A7F8-47B9-AC74-98D3DB9A7E46@employees.org> <52F4DDC7.8070606@si6networks.com> <1391817989.71306.YahooMailNeo@web162204.mail.bf1.yahoo.com> <52F927E0.5080706@gont.com.ar> <1392193724.5329.YahooMailNeo@web162201.mail.bf1.yahoo.com>
In-Reply-To: <1392193724.5329.YahooMailNeo@web162201.mail.bf1.yahoo.com>
X-Enigmail-Version: 1.5.2
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/ipv6/nWjw2b3ZNNV6fWdR2fGs2Mox0uw
Cc: Thomas Narten <narten@us.ibm.com>, "C. M. Heard" <heard@pobox.com>, Tim Chown <tjc@ecs.soton.ac.uk>, "6man@ietf.org" <6man@ietf.org>, Suresh Krishnan <suresh.krishnan@ericsson.com>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2014 09:11:53 -0000
Hi, Mark, On 02/12/2014 05:28 AM, Mark ZZZ Smith wrote: >> Depends on what you mean by end-to-end crypto, and in what >> context. >> >> SSL/TLS for say, web servers and mailservers, fine. >> >> IPsec for the general case...mmm.. unlikely. >> >> Is there any plan for solving the authentication of nodes? Is >> everyone expected to get/buy a certificate? >> > > Any or all of them. In the latter case, BTNS mode of IPsec (RFC5386) > would probably be better than NSA can have everything(tm) IP because > it shrinks their window to be a MITM. Which my result in "placebo" security: you never know if you've been MITM'ed. :-( >>> I think it might be worth remembering that as per the IETF88 >>> Plenary, end-to-end encryption is the general direction, and that >>> middle boxes less effective/in-effective because of it. So >>> putting a lot of time and effort into facilitating them might be >>> wasted effort. >> >> It's a 1-page to 5-page document (and that's including >> bolierplates). > > I'm not saying to no do it, just that if e.g., somebody like Google, > Apple or Microsoft roll out an update that enables crypto on a very > popular service (similar to how within days, millions of iPhones and > iPads used MPTCP for Siri), the traffic that these middleboxes are > inspecting might "go dark" or become hidden "overnight". If e.g. TLS is enabled, the TCP header information is still in the clear (unless you're *tunneling* over TLS). > If there is > a lot of effort involved, it would be wasted if that sort of event > happened. This shouldn't be "a lot of effort". >>> Yes, it works! Thanks Kristian. However here in Italy 3G carriers >>> filter out TCP options.. so SIRI gives up and stops trying to use >>> mptcp in the long run. > > "Encapsulation of TCP and other Transport Protocols over UDP" > http://tools.ietf.org/html/draft-cheshire-tcp-over-udp-00 > > "In fact, TCP options are expected to work more reliably with > TCP-over-UDP, because middleboxes will be less able to easily > interfere with such options, modifying them, stripping them, or > dropping packets containing TCP options, as they often dotoday with > native TCP packets. In particular, Multipath > TCP-over-UDP is expected to work more reliably than native Multipath > TCP [RFC6824], because middleboxes that interfere with use of those > TCP options will be less able to do that when the packets are > encapsulated inside UDP." > > ;-) Well, how good this is probably depends on whether one assumes the aforementioned middle-box behavior is intentional or not. If it is, then this is "middle-box unfriendly". If it's not, this is "middle-box friendly". FWIW, one would expect this to be an arms race. If this is *intended middle-box behavior", then you'd expect middle-boxes to become smarter, and eventually we'll have TCP-over-UDP-over-* :-) Cheers, -- Fernando Gont SI6 Networks e-mail: fgont@si6networks.com PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
- A problem with RFC 6465's Uniform Format for Exte… Fernando Gont
- Re: A problem with RFC 6465's Uniform Format for … Hagen Paul Pfeifer
- Re: A problem with RFC 6465's Uniform Format for … Brian E Carpenter
- Re: A problem with RFC 6465's Uniform Format for … Hagen Paul Pfeifer
- Re: A problem with RFC 6465's Uniform Format for … Brian E Carpenter
- Re: A problem with RFC 6465's Uniform Format for … Jen Linkova
- Re: A problem with RFC 6465's Uniform Format for … Fernando Gont
- Re: A problem with RFC 6465's Uniform Format for … Suresh Krishnan
- Re: A problem with RFC 6465's Uniform Format for … Fernando Gont
- Re: A problem with RFC 6465's Uniform Format for … Thomas Narten
- Re: A problem with RFC 6465's Uniform Format for … Fernando Gont
- Re: A problem with RFC 6465's Uniform Format for … brianjusa
- Re: A problem with RFC 6465's Uniform Format for … Brian E Carpenter
- Re: A problem with RFC 6465's Uniform Format for … Randy Bush
- Re: A problem with RFC 6465's Uniform Format for … Fernando Gont
- Re: A problem with RFC 6465's Uniform Format for … Randy Bush
- Re: A problem with RFC 6465's Uniform Format for … Fernando Gont
- Re: A problem with RFC 6465's Uniform Format for … Karsten Thomann
- Re: A problem with RFC 6465's Uniform Format for … Hagen Paul Pfeifer
- Re: A problem with RFC 6465's Uniform Format for … Brian E Carpenter
- Re: A problem with RFC 6465's Uniform Format for … Mark ZZZ Smith
- Re: A problem with RFC 6465's Uniform Format for … C. M. Heard
- Re: A problem with RFC 6465's Uniform Format for … Brian E Carpenter
- Re: A problem with RFC 6465's Uniform Format for … Fernando Gont
- Re: A problem with RFC 6465's Uniform Format for … RJ Atkinson
- Re: A problem with RFC 6465's Uniform Format for … Fernando Gont
- Re: A problem with RFC 6465's Uniform Format for … Brian E Carpenter
- Re: A problem with RFC 6465's Uniform Format for … Fernando Gont
- Re: A problem with RFC 6465's Uniform Format for … RJ Atkinson
- Re: A problem with RFC 6465's Uniform Format for … Fernando Gont
- Re: Re: A problem with RFC 6465's Uniform Format … Ray Hunter
- Re: A problem with RFC 6465's Uniform Format for … C. M. Heard
- Re: A problem with RFC 6465's Uniform Format for … Mark ZZZ Smith
- Re: A problem with RFC 6465's Uniform Format for … Fernando Gont
- Re: A problem with RFC 6465's Uniform Format for … Dan Lüdtke
- Re: A problem with RFC 6465's Uniform Format for … Mark ZZZ Smith
- Re: A problem with RFC 6465's Uniform Format for … Brian E Carpenter
- Re: A problem with RFC 6465's Uniform Format for … Fernando Gont