Re: [Masque] Proposed draft charter

Magnus Westerlund <magnus.westerlund@ericsson.com> Mon, 27 January 2020 14:41 UTC

Return-Path: <magnus.westerlund@ericsson.com>
X-Original-To: masque@ietfa.amsl.com
Delivered-To: masque@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44B3F12082F for <masque@ietfa.amsl.com>; Mon, 27 Jan 2020 06:41:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WgFRBkn7uvHG for <masque@ietfa.amsl.com>; Mon, 27 Jan 2020 06:41:44 -0800 (PST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on20614.outbound.protection.outlook.com [IPv6:2a01:111:f400:7d00::614]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 59FB9120831 for <masque@ietf.org>; Mon, 27 Jan 2020 06:41:44 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=U8Kmfi2QCsbqNRtZpEKcWmXLjNw1lMw1IQZHFi0aA2zaJ9L9W/xN7kTNBOBJqxXQnjR7lcU33asqIJORNKRuB57ClIxMZ9XYisyt6LTSzuQAbQkcPiHD0RCJopbC7CdxskIkBL/lBMCTXdxaAHpfk7Jwiaonet4mjcwwe0+b9xDzBsIjqQl/sk+FhdlN7HhP7DqHvlfkQlVB+CX7sWq/xbfY1/31y0umjh51in2KzzZjol/EpkQ2xG475P9YT7Gfu3JZ+rtScN//KR+6CfWygNlQT02OCTHvqsimwg/DGVA68DMRXPvQBsnbcYMBDibIIyhTH4fKokQT/UgbriTMKA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/crGGpozXvqBY6/PyvUrIwPFycl6bxXuCv7DI7/m5uo=; b=Ja1OLPJ+33/smbxOUvb5pf1JbDz15Zh2Wkcr0DBp9zA07a08hzgUQJvJnsBEJ3vk6liU4V8VtwGC05PX1vMe+qML52uPN2VwDY9eD8BA68NWck5PxFyBBnRD733VXnFkUL8mui//Q9epjFh8t78058gmOv1MDBiabvl6k6sz+lWz0iKs1Z8Nmvm/KZ18DacFTJZfinCp48Wa6SKo+2/v9aP0H5TQVpHZFTYYnTWNcSsbEV8KECWimM8H6EAYN6FGRHKEYJQeovJnJN8c4h8huFybPOz5jxJAUn/4xeA/0oBML8W7DQww+IdLexB/u+VPIQQmtrSBFqQNHX0PZonMjQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/crGGpozXvqBY6/PyvUrIwPFycl6bxXuCv7DI7/m5uo=; b=rhwQZ6oXICVup+ijazC6K4kV5Cjs3B5Ga/PQMD/jFU2ytn8z3m6Wg+Pdio1coUVmTmIKVHeqAfS7e/0hgOBCmsF8jRYIs5i5sGOvkCT6HXZsZewosEozL4NtRolY48LduAk8B1nDCbufoJGdo4GRBoWnXNHmqM3kg6pZenEedco=
Received: from DB7PR07MB4572.eurprd07.prod.outlook.com (52.135.133.12) by DB7PR07MB5850.eurprd07.prod.outlook.com (20.178.107.140) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.10; Mon, 27 Jan 2020 14:41:41 +0000
Received: from DB7PR07MB4572.eurprd07.prod.outlook.com ([fe80::cd9a:187a:90ab:3544]) by DB7PR07MB4572.eurprd07.prod.outlook.com ([fe80::cd9a:187a:90ab:3544%5]) with mapi id 15.20.2686.019; Mon, 27 Jan 2020 14:41:41 +0000
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
To: "lucaspardue.24.7@gmail.com" <lucaspardue.24.7@gmail.com>
CC: "paul@redbarn.org" <paul@redbarn.org>, "masque@ietf.org" <masque@ietf.org>, "lars@eggert.org" <lars@eggert.org>
Thread-Topic: [Masque] Proposed draft charter
Thread-Index: AQHV0w4aBWkpAZDWB0m+dMAczIB7OKf+HuIAgAAR14D//BPhAIAELm8A//v9WQA=
Date: Mon, 27 Jan 2020 14:41:41 +0000
Message-ID: <b32f61044ed676bdb4bd9c752c406a8e1db5033d.camel@ericsson.com>
References: <845946C2-EB98-4F3A-966E-968AE349302C@ericsson.com> <B5A0CBC5-6127-4F47-B1CC-2BFF4934EA62@eggert.org> <1917123.yJOJJviVma@linux-9daj> <9daceeb9b5775846be0a0551bbdfa643e962fbcf.camel@ericsson.com> <CALGR9oYGrp7HeG7e149Ha-EXypxPmerEjM-FvybVpprRH6miyA@mail.gmail.com>
In-Reply-To: <CALGR9oYGrp7HeG7e149Ha-EXypxPmerEjM-FvybVpprRH6miyA@mail.gmail.com>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=magnus.westerlund@ericsson.com;
x-originating-ip: [158.174.130.211]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b82ec6c4-4829-4f54-cd53-08d7a33705e7
x-ms-traffictypediagnostic: DB7PR07MB5850:
x-microsoft-antispam-prvs: <DB7PR07MB5850B3C9A6C56052A08CC3FF950B0@DB7PR07MB5850.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-forefront-prvs: 02951C14DC
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(346002)(39860400002)(396003)(366004)(376002)(199004)(189003)(66556008)(66446008)(64756008)(66476007)(66616009)(66946007)(478600001)(6512007)(71200400001)(8676002)(81156014)(8936002)(6486002)(81166006)(54906003)(86362001)(2616005)(5660300002)(36756003)(6506007)(53546011)(186003)(26005)(316002)(76116006)(44832011)(6916009)(91956017)(4326008)(2906002); DIR:OUT; SFP:1101; SCL:1; SRVR:DB7PR07MB5850; H:DB7PR07MB4572.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 9u73/u/DV/hvaLCkegy4Lwypntn9Bd5wZOMooRz3bV2v8eJBr2oRN0UI1vh3pkQYKVEIVQCYzUlbIjhsC7sNMuJLxs0/NyTcOK2w9DyZw4RfPyDo1LBtpuFngGxXY++bwHw/XjtmRSvEeXBHqQ77AKEY9Ki7LZOKA7qRnvBx/wddjyqoMY5DQxIkTp3GA6GX5ZKYFZ5dvlZvEyZE6mIeAfDq4EAjxh62dhRPqE4ZS87t6n9g823q4bF6rfuM+oSZlseDGlj7Npk1O9PpryIWKSxdKcBTUcdcd3lcrRpfWIyW6tAjTH9wKOROJKjHgiarftVoRu1sDrX/QYxqM/fr6JvB2I5CpXINJNn5tSOPCmARiJKnPF+TgQbcuA8I5PuVPXAP58LqNiyi7h1g8U6phVzma+VYCG1bKoeQtalXjC+orOpTo2nkkSMJMxipdKgt
x-ms-exchange-antispam-messagedata: XOLfvGvrIIZpuPOuVRIAcgUcSlA+dFZzZaIuoYr49ZqCMUPbOy9HCQvh4YrcSgDVE9QXLzMWS/HHL5P+mvRrE8pb6kouZQM6qjHm4A2oEq6fkkmYq1BtCTKWKq5RU1XRjJ+d7lPIUwr9ChRLoTiJqw==
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; micalg="sha-256"; protocol="application/x-pkcs7-signature"; boundary="=-TGpVBRbSWDNLrk4WyFXi"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b82ec6c4-4829-4f54-cd53-08d7a33705e7
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Jan 2020 14:41:41.3141 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: KMwdnDKSM9O0bdXwOoTO/YyBdTqsilkUAvdoGu0sS5OOC9H5I54hjP3qEko3rLBjKbTSEZ2F5bfuEzAJDehOADjFZo4gxWn9VlaOPNxGIik=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR07MB5850
Archived-At: <https://mailarchive.ietf.org/arch/msg/masque/1eKWi73D2PJwOUiaeG4Bwns2pys>
Subject: Re: [Masque] Proposed draft charter
X-BeenThere: masque@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiplexed Application Substrate over QUIC Encryption <masque.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/masque>, <mailto:masque-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/masque/>
List-Post: <mailto:masque@ietf.org>
List-Help: <mailto:masque-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/masque>, <mailto:masque-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jan 2020 14:41:52 -0000

Hi Lucas,
(As individual)

I think you are right that the charter should be clarified that efficiency
improvements in any form to reduce the overhead of re-encryption is definitely a
seperate parallel work item. One that I think by its nature needs to be optional
to use. And it can be discussed in parallel. 

I can't see how any solution could be other than optional as it will have some
impact on the security properties. The privacy protection against certain agents
will be impacted. And I think it is very important that the resulting properties
are very well described by such a solution. In fact a WG may in the end even
arrive at the conclusion that such a solution is not worth publishing. 

Cheers

Magnus


On Mon, 2020-01-27 at 12:23 +0000, Lucas Pardue wrote:
> Hi Mirja, all,
> 
> Speaking as an individual:
> 
> From reading the charter, it isn't clear to me whether avoidance of double
> encryption is intended to be part of the MASQUE framework deliverable, or seen
> as some other document(s) that would be proposed into a MASQUE WG or some
> other WG?
> 
> The discussion on the list highlights some of complexity in this area. I
> personally see a lot of value in developing a framework that does not attempt
> to avoid the multiple levels of encryption problem initially; there are
> several use cases that could benefit from a baseline capability to tunnel
> congestion-controlled transports inside QUIC without the pitfalls of nested
> congestion control. 
> 
> Targeting a baseline, while letting double encryption avoidance continue in
> parallel at its own rate (and own group of people) seems like one way to
> structure such work. The charter isn't clear if that is the intent or if there
> is a strong desire to solve both in unison.
> 
> Cheers
> Lucas
> 
> On Mon, Jan 27, 2020 at 12:05 PM Magnus Westerlund <
> magnus.westerlund=40ericsson.com@dmarc.ietf.org> wrote:
> > Hi Paul and Lars,
> > (As individual, my AD role clearly have an conflict of interest situation
> > here)
> > 
> > 
> > Paul's question is something that needs to be discussed. This goes beyond
> > the
> > security model I have envisioned for this work. 
> > 
> > So the most basic security model for this work would be to have a secured
> > connection (outer) between an endpoint (mostly the client) and the proxy.
> > Then
> > run a end-to-end secure QUIC connection between client and server (inner).
> > That
> > end-to-end connection can run either inside the client-proxy connection for
> > certain properties or in parallel for other set of properties. Then use the
> > client proxy connection for meta data exchange to accomplis things. This
> > model
> > can be extended to use outer connections between proxies and proxy to
> > server,
> > and in cases where desired to even have an onion model where client uses a
> > set
> > of proxies but each proxy only see the next and previous hop. 
> > 
> > An evolved model would be to move the inner connection from a full blown
> > QUIC
> > connection to something which is an object security model end-to-end between
> > client and server. This will require an chain of outer transport connections
> > all
> > the way between client and server. However, it would enable certain use
> > cases
> > that isn't possible in the first, like object caching. It also enables the
> > proxies to do a much better job transport wise and avoid head of line
> > blocking
> > completely for inner object fragments and enable proxy level
> > prioritizations,
> > which is not really possible in the first model. I do note this model will
> > require basically a new QUIC version as it will redefine the internals
> > significantly. 
> > 
> > Paul I am uncertain of exactly what you attempting to accomplish. I think in
> > the
> > basic security model the client proxy connection can be used by the client
> > to
> > disclose information like SNI (assuming ESNI otherwise) to the proxy as that
> > would allow policy recommendations that it appear you ask for. But, my
> > assumption for this work is that the proxy will by default have no access to
> > clear text content being transfered between endpoints. Any such access would
> > require an explicit disclosure of the security context by the client to the
> > proxy. 
> > 
> > But, lets also try to answer Lars's question. Why not in QUIC WG. I will not
> > dismiss that this could be part of the QUIC WG charter. However, I think
> > writing
> > the charter like it is its own WG clarifieis what the intentions here are. I
> > also note that basic framwork is much more like SOCKS work, or the TURN work
> > in
> > TRAM WG, but different than both to require its own work. Its primary part
> > is
> > not actually changing QUIC, at least for the basic security model above.
> > Then,
> > certain of the transport performance enhancement work will be how to
> > interface
> > information between the proxy and the end-to-end QUIC connection. That work
> > will
> > need interaction with the QUIC WG. Some things may even need QUIC
> > extensions,
> > and such would then likely need to be developed in the QUIC WG. I think we
> > should discuss this more, and at a minimum clarify the interaction part. 
> > 
> > Cheers
> > 
> > Magnus Westerlund
> > (as individual)
> > 
> > 
> > On Mon, 2020-01-27 at 08:26 +0000, Paul Vixie wrote:
> > > i mostly think the same, but i'm concerned about one aspect of H3 that may
> > be 
> > > sufficiently far from the core protocol to warrant special focus on the
> > > proxy, 
> > > and that is the enterprise situation where the endpoint trusts the proxy
> > to 
> > > either carry the transaction for it, or to refer the endpoint to a native 
> > > flow. use case, employee doing their banking from their corporate desktop 
> > > during their lunch break. this isn't a well-loved scenario because it's
> > so 
> > > close to the nation-state authoritarian situation. but i'd like to explore
> > it 
> > > with a group of open minded others, and i think doing it inside the QUIC
> > or 
> > > HTTP WG would make for big distraction.
> > > 
> > > there is, separately and precedingly, the the process by which an
> > endpoint 
> > > would discover, and know whether or not to trust, an enterprise outbound 
> > > proxy.
> > > 
> > > am i in the wrong basket?
> > > 
> > > vixie
> > > 
> > > re:
> > > 
> > > On Monday, 27 January 2020 07:22:14 UTC Lars Eggert wrote:
> > > > Hi,
> > > > 
> > > > what motivates a separate WG vs. doing this in the QUIC WG?
> > > > 
> > > > There are aspects of the charter - e.g., one-sided (transparent to the
> > > > peer?) cooperation with middleboxes, double-encryption avoidance (does
> > this
> > > > translated to an "unencrypted" mode for QUIC?) - that could have a large
> > > > impact on the base protocol. That suggests to me tight coordination with
> > > > the base protocol is essential.
> > > > 
> > > > Thanks,
> > > > Lars
> > > 
> > > -- 
> > > Paul
> > > 
> > > 
> > -- 
> > Cheers
> > 
> > Magnus Westerlund 
> > 
> > 
> > ----------------------------------------------------------------------
> > Networks, Ericsson Research
> > ----------------------------------------------------------------------
> > Ericsson AB                 | Phone  +46 10 7148287
> > Torshamnsgatan 23           | Mobile +46 73 0949079
> > SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
> > ----------------------------------------------------------------------
> > 
> > 
-- 
Cheers

Magnus Westerlund 


----------------------------------------------------------------------
Networks, Ericsson Research
----------------------------------------------------------------------
Ericsson AB                 | Phone  +46 10 7148287
Torshamnsgatan 23           | Mobile +46 73 0949079
SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
----------------------------------------------------------------------