Re: A problem with RFC 6465's Uniform Format for Extension Headers

Fernando Gont <fgont@si6networks.com> Fri, 14 February 2014 09:11 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 872061A0179 for <ipv6@ietfa.amsl.com>; Fri, 14 Feb 2014 01:11:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.302
X-Spam-Level:
X-Spam-Status: No, score=-1.302 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_42=0.6, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QYg3enGwt-FB for <ipv6@ietfa.amsl.com>; Fri, 14 Feb 2014 01:11:51 -0800 (PST)
Received: from web01.jbserver.net (web01.jbserver.net [IPv6:2a00:d10:2000:e::3]) by ietfa.amsl.com (Postfix) with ESMTP id CB3191A00DC for <6man@ietf.org>; Fri, 14 Feb 2014 01:11:50 -0800 (PST)
Received: from [2001:5c0:1000:a::fab] by web01.jbserver.net with esmtpsa (TLSv1:DHE-RSA-CAMELLIA256-SHA:256) (Exim 4.82) (envelope-from <fgont@si6networks.com>) id 1WEEnL-0002Pu-CX; Fri, 14 Feb 2014 10:10:51 +0100
Message-ID: <52FDDA1B.3060104@si6networks.com>
Date: Fri, 14 Feb 2014 05:55:55 -0300
From: Fernando Gont <fgont@si6networks.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: Mark ZZZ Smith <markzzzsmith@yahoo.com.au>, Fernando Gont <fernando@gont.com.ar>, Ole Troan <otroan@employees.org>
Subject: Re: A problem with RFC 6465's Uniform Format for Extension Headers
References: <20140130230740.25350.9524.idtracker@ietfa.amsl.com> <52EAF63A.7050108@si6networks.com> <52F1B8CE.4070803@ericsson.com> <52F1BD1F.2080007@si6networks.com> <m3k3d82zz6.wl%narten@us.ibm.com> <52F383A0.7030002@si6networks.com> <m28utnbwj9.wl%randy@psg.com> <52F44A73.3000609@si6networks.com> <86BA587E-A7F8-47B9-AC74-98D3DB9A7E46@employees.org> <52F4DDC7.8070606@si6networks.com> <1391817989.71306.YahooMailNeo@web162204.mail.bf1.yahoo.com> <52F927E0.5080706@gont.com.ar> <1392193724.5329.YahooMailNeo@web162201.mail.bf1.yahoo.com>
In-Reply-To: <1392193724.5329.YahooMailNeo@web162201.mail.bf1.yahoo.com>
X-Enigmail-Version: 1.5.2
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/ipv6/nWjw2b3ZNNV6fWdR2fGs2Mox0uw
Cc: Thomas Narten <narten@us.ibm.com>, "C. M. Heard" <heard@pobox.com>, Tim Chown <tjc@ecs.soton.ac.uk>, "6man@ietf.org" <6man@ietf.org>, Suresh Krishnan <suresh.krishnan@ericsson.com>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2014 09:11:53 -0000

Hi, Mark,

On 02/12/2014 05:28 AM, Mark ZZZ Smith wrote:
>> Depends on what you mean by end-to-end crypto, and in what
>> context.
>> 
>> SSL/TLS for say, web servers and mailservers, fine.
>> 
>> IPsec for the general case...mmm.. unlikely.
>> 
>> Is there any plan for solving the authentication of nodes? Is
>> everyone expected to get/buy a certificate?
>> 
> 
> Any or all of them. In the latter case, BTNS mode of IPsec (RFC5386)
> would probably be better than NSA can have everything(tm) IP because
> it shrinks their window to be a MITM.

Which my result in "placebo" security: you never know if you've been
MITM'ed.  :-(



>>> I think it might be worth remembering that as per the IETF88
>>> Plenary, end-to-end encryption is the general direction, and that
>>> middle boxes less effective/in-effective because of it. So
>>> putting a lot of time and effort into facilitating them might be
>>> wasted effort.
>> 
>> It's a 1-page to 5-page document (and that's including
>> bolierplates).
> 
> I'm not saying to no do it, just that if e.g., somebody like Google,
> Apple or Microsoft roll out an update that enables crypto on a very
> popular service (similar to how within days, millions of iPhones and
> iPads used MPTCP for Siri), the traffic that these middleboxes are
> inspecting might "go dark" or become hidden "overnight".

If e.g. TLS is enabled, the TCP header information is still in the clear
(unless you're *tunneling* over TLS).


> If there is
> a lot of effort involved, it would be wasted if that sort of event
> happened.

This shouldn't be "a lot of effort".



>>> Yes, it works! Thanks Kristian. However here in Italy 3G carriers
>>> filter out TCP options.. so SIRI gives up and stops trying to use
>>> mptcp in the long run.
> 
> "Encapsulation of TCP and other Transport Protocols over UDP" 
> http://tools.ietf.org/html/draft-cheshire-tcp-over-udp-00
> 
> "In fact, TCP options are expected to work more reliably with
> TCP-over-UDP, because middleboxes will be less able to easily
> interfere with such options, modifying them, stripping them, or
> dropping packets containing TCP options, as they often dotoday with
> native TCP                     packets.  In particular, Multipath
> TCP-over-UDP is expected to work more reliably than native Multipath
> TCP [RFC6824], because middleboxes that interfere with use of those
> TCP options will be less able to do that when the packets are
> encapsulated inside UDP."
> 
> ;-)

Well, how good this is probably depends on whether one assumes the
aforementioned middle-box behavior is intentional or not. If it is, then
this is "middle-box unfriendly". If it's not, this is "middle-box
friendly". FWIW, one would expect this to be an arms race. If this is
*intended middle-box behavior", then you'd expect middle-boxes to become
smarter, and eventually we'll have TCP-over-UDP-over-* :-)

Cheers,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492