Re: [Masque] WGLC for "Requirements for a MASQUE Protocol to Proxy IP Traffic"

Christopher Wood <caw@heapingbits.net> Mon, 07 June 2021 20:07 UTC

Return-Path: <caw@heapingbits.net>
X-Original-To: masque@ietfa.amsl.com
Delivered-To: masque@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 15AFA3A0CBB for <masque@ietfa.amsl.com>; Mon, 7 Jun 2021 13:07:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=heapingbits.net header.b=ePaLnxS/; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=wnkOQGLS
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DD4MXE45UX97 for <masque@ietfa.amsl.com>; Mon, 7 Jun 2021 13:07:51 -0700 (PDT)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50F183A0C9D for <masque@ietf.org>; Mon, 7 Jun 2021 13:07:51 -0700 (PDT)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id DEF875C01B5; Mon, 7 Jun 2021 16:07:48 -0400 (EDT)
Received: from imap4 ([10.202.2.54]) by compute4.internal (MEProxy); Mon, 07 Jun 2021 16:07:48 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=heapingbits.net; h=mime-version:message-id:in-reply-to:references:date:from:to :cc:subject:content-type; s=fm1; bh=PRkXfNRsl0SZZNczlEzVaww+CbMu KvVuE7mo8kVgUkY=; b=ePaLnxS/vJDobTnmO5d9CzSayRSBtFQx2foMGXRVfK+L oDr0kbwkJyYUdLvyWZU9fKEyvUFVzEFc1FUpPbDdd4PslzCgtUvMrmZp1UiHYo4m 6goCR+YYuuM9GtQN74u3eS6tF2E5G76Oo+bkJe7dz6xBfwvGQCEhKr/hptLl5GV/ FWKtwxcsMvlfSqbgjbQotWKJA08j5KxF/yc9fKbZWVwRFb7AG5o930nTH1q+r75h 5/LaVRwN6aXW9ZJVL9deK3PNxnCAghEDRbWWOddMTLc5guvraTvfq45tdtrM6aAk 2N+7VZ6c3eBhNZKGIWp/yV/a2hDcTpH5F0dCVxD3+w==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=PRkXfN Rsl0SZZNczlEzVaww+CbMuKvVuE7mo8kVgUkY=; b=wnkOQGLSt/3huEQASFeeG9 s49sIYZkWcK6iRY5+BAP3zY2NoRaz1pB6dl85Y58Ou48xNBziwdVvEIJPcydWjUr fhBsAgjl+e1FV5iKBJNNAHmxcLU1Um1OiQZDown54LCKTZTBLkYdtC156aJbeeNH xkgd4CUsW7xjS4Stx11KKcU7bRUYVdIcleVR41Gm/6DcZpTo5EiOHijZd4EoMph2 GuxTjfRIcQ0rxcmvaTg63rQGHVtfJra6nPDYD52tcTVe4wYVUEvG4k6Srx8OHBaq cLvTwZ5n3gxJAb5yCJKnmfX7ImvNKMwa4VLFFLa7BoUB7ae+mldKJ1/qkpdI9eaQ ==
X-ME-Sender: <xms:lHy-YB1dE90gbq_6YAXq244zHPvyYJEaGs4LQhzcCTSgnWPb2_NPmA> <xme:lHy-YIHPmMvwyvoFUPRpSJFfIA5vfYOPmndcSmpBSEaqWpmuhQhPNZA6xindmz2xx TCU9k_1QgZaOgTQwhQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrfedtjedgudeghecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd enucfjughrpefofgggkfgjfhffhffvufgtsehttdertderreejnecuhfhrohhmpedfvehh rhhishhtohhphhgvrhcuhghoohgufdcuoegtrgifsehhvggrphhinhhgsghithhsrdhnvg htqeenucggtffrrghtthgvrhhnpeduffetffekvefhvdeuheffgeetfeegleevgefffedv veejhedvueegkeehledvleenucffohhmrghinhepihgvthhfrdhorhhgnecuvehluhhsth gvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomheptggrfieshhgvrghpihhn ghgsihhtshdrnhgvth
X-ME-Proxy: <xmx:lHy-YB6YyhpNXtupu0YrDC4lwt1oa6Tc5k5imxBHCMuIgwhiYpMGFQ> <xmx:lHy-YO0kefGrb8kV6jbORgGODHstxKok1HWQHPoIxH0O9H7OG6bCPg> <xmx:lHy-YEFrgXTEuqKufSx4kXVc39pFdlLGqvHGn4q271ML3eDUjLdCJg> <xmx:lHy-YAjt8WrjWjelz_cJRa4aomuMMxYdKX1L-P8OtZ9fGGOVcDksEg>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 8153D160095; Mon, 7 Jun 2021 16:07:48 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.5.0-alpha0-519-g27a961944e-fm-20210531.001-g27a96194
Mime-Version: 1.0
Message-Id: <91475be5-dee4-435e-a65b-1cde43ffff0e@www.fastmail.com>
In-Reply-To: <CAHbWFkQ6YAhqgbbsAPC-i2Rv-_LRZ4R3NKTk4of200GUt38A_g@mail.gmail.com>
References: <d314198b-6c01-4b15-84d8-9896b5fdee80@www.fastmail.com> <HE1PR0702MB3772355483E2771650C6D679953F9@HE1PR0702MB3772.eurprd07.prod.outlook.com> <746F7E16-37BD-49EF-896A-649D394CCB05@ericsson.com> <CAPDSy+6PjZk0Kea6154V3=GF-8bs+0Mr+FtFfi-girGh3uAVrQ@mail.gmail.com> <3deea8212d66731de5c81abae353f3e9322f2d57.camel@ericsson.com> <CAPDSy+68DoVrRiC7uEn1-Ze_5LDn9mt7-f+ZeovTTYAUh=w2Og@mail.gmail.com> <21d8fc788051b570768e53d6d9355ed51b423c0a.camel@ericsson.com> <CAKKJt-d-FzXVdJpUTacb4m7ESyB6nzkk1BQSf8rHtReOvD=5Jw@mail.gmail.com> <CAM4esxSE=misCJX=73h-kF+RQdQLC2WBhwv3nv5QgR8HK17diw@mail.gmail.com> <CAM4esxQatk4-ENdz+2jCbpRtr8hT0nLWbVLbb64RMJwvBf2qDA@mail.gmail.com> <CAHbWFkQ6YAhqgbbsAPC-i2Rv-_LRZ4R3NKTk4of200GUt38A_g@mail.gmail.com>
Date: Mon, 07 Jun 2021 13:07:28 -0700
From: Christopher Wood <caw@heapingbits.net>
To: Alex Chernyakhovsky <achernya@google.com>, Martin Duke <martin.h.duke@gmail.com>
Cc: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>, David Schinazi <dschinazi.ietf@gmail.com>, Magnus Westerlund <magnus.westerlund=40ericsson.com@dmarc.ietf.org>, Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>, MASQUE <masque@ietf.org>
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/masque/DP6Zt59qLbRnfNMQvagfbW12_kE>
Subject: Re: [Masque] WGLC for "Requirements for a MASQUE Protocol to Proxy IP Traffic"
X-BeenThere: masque@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiplexed Application Substrate over QUIC Encryption <masque.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/masque>, <mailto:masque-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/masque/>
List-Post: <mailto:masque@ietf.org>
List-Help: <mailto:masque-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/masque>, <mailto:masque-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Jun 2021 20:08:05 -0000

As Martin points out, the solution for the network-to-network use case in Section 2.4 can be split out into a separate document should we run into timeline issues down the road. 

To that end, we'd like to reiterate that the purpose of this WGLC is to determine if we can we move forward with this understanding and consensus on this document in its current state, plus or minus maybe some editorial cleanup. If not, what specific requirements in the document are problematic, and why?

Thanks,
Chris and Eric

On Mon, Jun 7, 2021, at 12:54 PM, Alex Chernyakhovsky wrote:
> Hi Martin,
> 
> Thanks for weighing in, and I agree with your interpretation that there 
> is no tension between these two points.
> 
> I agree that should we run into timeline issues with the implementation 
> drafts, it is possible to split out the section 2.4 implementation into 
> its own document. We should cross that bridge if/when we get there.
> 
> Sincerely,
> -Alex
> 
> On Mon, Jun 7, 2021 at 3:39 PM Martin Duke <martin.h.duke@gmail.com> wrote:
> > To clarify what I meant, I'm suggesting the the future IP proxy document can split out the network-network use case specification if that proves to be problematic.
> > 
> > I am not saying we should have two requirements documents.
> > 
> > On Mon, Jun 7, 2021 at 12:25 PM Martin Duke <martin.h.duke@gmail.com> wrote:
> >> I'd like to step in here as AD and make sure we are not talking past each other here. IIUC:
> >> 
> >> (1) Magnus and Mirja do not want to implement 2.4.
> >> (2) The authors want to make sure the design is extensible to support 2.4, but are OK with some endpoints not supporting it.
> >> 
> >> It does not appear that there is tension between these points. However, I understand that Magnus is concerned that 2.4 will hold up the core proxy-ip draft unnecessarily.
> >> 
> >> As AD, if we come to that point, I see no requirement in the charter that this be one or two documents; if the option is holding everything up, it can go to the IESG while 2.4 has further refinement in the WG. I don't see that we have to make this decision now.
> >> 
> >> Regarding the document at hand, the existing Sec 2 offers the possibility that all of the use cases are optional. It does not preclude the path that appears to have consensus.
> >> 
> >> Is that consistent with others' understanding?
> >> 
> >> Martin
> >> 
> >> On Mon, Jun 7, 2021 at 5:06 AM Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com> wrote:
> >>> 
> >>> 
> >>> On Mon, Jun 7, 2021, 03:15 Magnus Westerlund <magnus.westerlund=40ericsson.com@dmarc.ietf.org> wrote:
> >>>> Hi David and WG,
> >>>> 
> >>>> Let me attempt to clarify a bit why I have made the comments I have made. I think they do stem from interepreting the network to network use cases as a very general technology and from the perspective of deploying this with clients which the server has limited trust in. I realize that you are likely comming from another perspective that you only intended to use this in cases where you have fairly high mutual trust in the client and the server. I think that is actually the major difference here and why you below think I am making a circular arguments. I think it all stem from lack of discussion of this use cases and what operational limitations we intended to have on the protocol.
> >>> 
> >>> I don't know if this would have helped, but I do wish we could tell (explicitly, in the requirements draft) which requirements arose from various use cases. 
> >>> 
> >>> I'm pretty sure that most participants think they know that (likely), but also think that other participants have the same understanding (perhaps less likely). I think that's what Magnus is saying here, if I'm reading the thread correctly.
> >>> 
> >>> Do The Right Thing, of course.
> >>> 
> >>> Best,
> >>> 
> >>> Spencer
> >>> 
> >>>> So if the goal here is to have high mutual trust between client and server then I think a protocol solution may be able to be defined with such an applicability statement and less mandate on necessary protocol mechanisms to protect against malicous peers. I think that is in stark contrast against some of the other use cases where the trust in the client could be rather minimal. Like the client and server relationship is only this is a paying customer that gets a VPN access and the server has no idea what type of client or implementation that are the peer. This basic use cases will deploy with an addressing architecture that makes it much less vulnerable to malicous intent on the routing level.
> >>>> 
> >>>> So, can we please discuss what assumption we have on the client and server trust? 
> >>>> 
> >>>> I also think your attempt to sweep the addressing schemes to be used by the servers under the rug and not disucss them have hurt the understanding. I at least have been guessing on possible deployment scenarios rather than that we have openly discussed them in the WG. Yes, they maybe not need to be detailed in the protocol solution or an arhcitecture document, however they would have made sense to have some addressing deployment scenarios in this requirement documents use case section to make clear what would have been intended. Because they do influence what is needed for the solution. 
> >>>> 
> >>>> Cheers
> >>>> 
> >>>> Magnus
> >>>> -- 
> >>>> Masque mailing list
> >>>> Masque@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/masque
> >>> -- 
> >>> Masque mailing list
> >>> Masque@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/masque
> > -- 
> > Masque mailing list
> > Masque@ietf.org
> > https://www.ietf.org/mailman/listinfo/masque