Re: [Masque] WGLC for "Requirements for a MASQUE Protocol to Proxy IP Traffic"

Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com> Thu, 10 June 2021 14:00 UTC

Return-Path: <spencerdawkins.ietf@gmail.com>
X-Original-To: masque@ietfa.amsl.com
Delivered-To: masque@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B87B93A1676 for <masque@ietfa.amsl.com>; Thu, 10 Jun 2021 07:00:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.097
X-Spam-Level:
X-Spam-Status: No, score=-1.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uMYjKImKUBoZ for <masque@ietfa.amsl.com>; Thu, 10 Jun 2021 07:00:33 -0700 (PDT)
Received: from mail-yb1-xb2b.google.com (mail-yb1-xb2b.google.com [IPv6:2607:f8b0:4864:20::b2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E9303A166D for <masque@ietf.org>; Thu, 10 Jun 2021 07:00:33 -0700 (PDT)
Received: by mail-yb1-xb2b.google.com with SMTP id h15so11108086ybm.13 for <masque@ietf.org>; Thu, 10 Jun 2021 07:00:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=YVYYfQeT6IDhUgaPLOinxDFExWvJRUbpURiS7pJUtzg=; b=NmRnSrK89NZw3DDlBVhVg4RksbMuWxK8SM2oJPe2YVOrMLsGMFjANDbHhiBEq7A5Ve kR9l0CvPd3yEkVE+GjobpQS8XdJpPEA4Thb+8cleE4o2W+Ryx5pzBwj8fSJF2nbT0ZmB jD/oiHy4tCMWyDitXwOrvzz1VWEyo58YE7HrYojmsgKmjL4VdHnhPjiiBFxVJjv2i7ve HRTbDQ7cSL+zEV5FQmyro2xZhmWRyNgeGX99dmO3wkfxc5BsiX4+7buaSiocXElZD0sY vYhl66Svj9EcYeSkqiYXnPTfWvAnbYc82MXmMrBRVu5KZxcROWzhSEr3RnKwjg1CMG3t eE9g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=YVYYfQeT6IDhUgaPLOinxDFExWvJRUbpURiS7pJUtzg=; b=LFjbisS1LIbaYjTOgoSwXkteG5zeeHhEYozfRarp9IBIVyJsLl31X82fvzzvuiGMCU +3U4T9zUTkNN11+QjOtZBZLykpFQ4HpKFs886Pk8x9zB27bXOKoWH0VcYDiZH2k6+lQ1 m1Bkgecfe0pfnCgf3YYLjoLRZzD5lVtbeKraTB5ZEwzqGRg76MvtfsVnhjE2VPjtlV2n Bk4INqog5HPPS8U/6yaOs1mKYUBwr285FJ7p/57dY4qq0jEvfM7xN8PGHbG44suRoW5I Xw9+7Y/g3/m6TBtG9LHLKX2j/PvCtB4XA0RcCpGVOXuE1SmUL9q21zP0YL6OApYgMfkr Yqjw==
X-Gm-Message-State: AOAM530Oj6H22xUA3k/MRRgxS909ZE8FQ5IPbFCddR+Urh+jkrRYRbpN i2oeqN5F16ZD/phw33LkSLJM5AZMY+sa8JzQeZQ=
X-Google-Smtp-Source: ABdhPJyHgPeQWL4E57tzexI87OwffTzxosc659XguyVbnygZvMNBXbHZ8GJP++mBWUEKfQczAqsqYlIUMSlO5rIudJM=
X-Received: by 2002:a25:2b05:: with SMTP id r5mr8008581ybr.465.1623333631974; Thu, 10 Jun 2021 07:00:31 -0700 (PDT)
MIME-Version: 1.0
References: <d314198b-6c01-4b15-84d8-9896b5fdee80@www.fastmail.com> <HE1PR0702MB3772355483E2771650C6D679953F9@HE1PR0702MB3772.eurprd07.prod.outlook.com> <746F7E16-37BD-49EF-896A-649D394CCB05@ericsson.com> <CAPDSy+6PjZk0Kea6154V3=GF-8bs+0Mr+FtFfi-girGh3uAVrQ@mail.gmail.com> <3deea8212d66731de5c81abae353f3e9322f2d57.camel@ericsson.com> <CAPDSy+68DoVrRiC7uEn1-Ze_5LDn9mt7-f+ZeovTTYAUh=w2Og@mail.gmail.com> <21d8fc788051b570768e53d6d9355ed51b423c0a.camel@ericsson.com> <CAKKJt-d-FzXVdJpUTacb4m7ESyB6nzkk1BQSf8rHtReOvD=5Jw@mail.gmail.com> <CAM4esxSE=misCJX=73h-kF+RQdQLC2WBhwv3nv5QgR8HK17diw@mail.gmail.com> <CAM4esxQatk4-ENdz+2jCbpRtr8hT0nLWbVLbb64RMJwvBf2qDA@mail.gmail.com> <CAHbWFkQ6YAhqgbbsAPC-i2Rv-_LRZ4R3NKTk4of200GUt38A_g@mail.gmail.com> <91475be5-dee4-435e-a65b-1cde43ffff0e@www.fastmail.com> <74934214da56424b57d7985f49e58b20482d6310.camel@ericsson.com> <CAPDSy+6JU9trGDDPpNa+2Xirq=q0FtpOaE9Sy0gUmdXs=N36bA@mail.gmail.com>
In-Reply-To: <CAPDSy+6JU9trGDDPpNa+2Xirq=q0FtpOaE9Sy0gUmdXs=N36bA@mail.gmail.com>
From: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Date: Thu, 10 Jun 2021 09:00:05 -0500
Message-ID: <CAKKJt-d-4iTk4CS-mvAgxsGdBtLOzdnM8HSE4bX_D=ewE75zKA@mail.gmail.com>
To: David Schinazi <dschinazi.ietf@gmail.com>
Cc: Magnus Westerlund <magnus.westerlund@ericsson.com>, "masque@ietf.org" <masque@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007c620405c469d0ec"
Archived-At: <https://mailarchive.ietf.org/arch/msg/masque/QEDzh-IDq5njdZJ7gKkq4tRT7IE>
Subject: Re: [Masque] WGLC for "Requirements for a MASQUE Protocol to Proxy IP Traffic"
X-BeenThere: masque@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiplexed Application Substrate over QUIC Encryption <masque.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/masque>, <mailto:masque-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/masque/>
List-Post: <mailto:masque@ietf.org>
List-Help: <mailto:masque-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/masque>, <mailto:masque-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Jun 2021 14:00:38 -0000

Hi, Davis,

On Wed, Jun 9, 2021 at 8:17 PM David Schinazi <dschinazi.ietf@gmail.com>
wrote:

> Hi Magnus,
>
> You're correct that this isn't currently explicit in the document. The
> intention of the authors was to declare trust out of scope for the IP
> proxying protocol. Similar to IP, DHCP, ESP, etc, the protocol itself
> does not need to worry about trust as that is better handled at a policy
> layer that lives outside of the protocol. Since the IP Proxying
> Requirements document only applies requirements to the IP proxying
> protocol, trust is also out of scope for the requirements document. I can
> add a subsection to Section 5 (Non-Requirements) if you'd like.
>

I'm not Magnus (my loss and his gain), but that seems like a good thing to
write down.

If we agree that trust is out of scope, then the risk for added delay is
> low.
>

I know that IETF working groups don't have a lot of experience with
requirements drafts that are developed in WG Github repos and not forwarded
for publication, but ISTM that unless someone is actually planning to
delete https://github.com/ietf-wg-masque/draft-ietf-masque-ip-proxy-reqs,
which would surprise me a lot, it's just going to be sitting there in the
WG repo, and people who aren't involved in MASQUE now would reasonably
consult it.

So adding assumptions like this one, as we recognize them, would actually
take MASQUE requirements work closer to a living document that continues to
be useful, and that's certainly something new IETF participants would find
helpful.

Do The Right Thing, of course.

Best,

Spencer

David
>
> On Tue, Jun 8, 2021 at 12:46 AM Magnus Westerlund <
> magnus.westerlund@ericsson.com> wrote:
>
>> Hi,
>>
>> I agree that one can split later, with some additional delay. How
>> problematic waiting with splitting is depends on what the network to
>> network use cases is supposed to cover. I think we need to figure out
>> what type of threat model and mutual trust the two MASQUE endpoint is
>> expected to have in this use case.
>>
>> So, can we please figure this out becasue I think that will clarify if
>> there is low risk for extra delay or significant risk for extra delay?
>> This is a request for better clarification in the requirements document
>> on 2.4.
>>
>> Cheers
>>
>> Magnus
>>
>>
>> On Mon, 2021-06-07 at 13:07 -0700, Christopher Wood wrote:
>> > As Martin points out, the solution for the network-to-network use
>> > case in Section 2.4 can be split out into a separate document should
>> > we run into timeline issues down the road.
>> >
>> > To that end, we'd like to reiterate that the purpose of this WGLC is
>> > to determine if we can we move forward with this understanding and
>> > consensus on this document in its current state, plus or minus maybe
>> > some editorial cleanup. If not, what specific requirements in the
>> > document are problematic, and why?
>> >
>> > Thanks,
>> > Chris and Eric
>> >
>> > On Mon, Jun 7, 2021, at 12:54 PM, Alex Chernyakhovsky wrote:
>> > > Hi Martin,
>> > >
>> > > Thanks for weighing in, and I agree with your interpretation that
>> > > there
>> > > is no tension between these two points.
>> > >
>> > > I agree that should we run into timeline issues with the
>> > > implementation
>> > > drafts, it is possible to split out the section 2.4 implementation
>> > > into
>> > > its own document. We should cross that bridge if/when we get there.
>> > >
>> > > Sincerely,
>> > > -Alex
>> > >
>> > > On Mon, Jun 7, 2021 at 3:39 PM Martin Duke <martin.h.duke@gmail.com
>> > > > wrote:
>> > > > To clarify what I meant, I'm suggesting the the future IP proxy
>> > > > document can split out the network-network use case specification
>> > > > if that proves to be problematic.
>> > > >
>> > > > I am not saying we should have two requirements documents.
>> > > >
>> > > > On Mon, Jun 7, 2021 at 12:25 PM Martin Duke <
>> > > > martin.h.duke@gmail.com> wrote:
>> > > > > I'd like to step in here as AD and make sure we are not talking
>> > > > > past each other here. IIUC:
>> > > > >
>> > > > > (1) Magnus and Mirja do not want to implement 2.4.
>> > > > > (2) The authors want to make sure the design is extensible to
>> > > > > support 2.4, but are OK with some endpoints not supporting it.
>> > > > >
>> > > > > It does not appear that there is tension between these points.
>> > > > > However, I understand that Magnus is concerned that 2.4 will
>> > > > > hold up the core proxy-ip draft unnecessarily.
>> > > > >
>> > > > > As AD, if we come to that point, I see no requirement in the
>> > > > > charter that this be one or two documents; if the option is
>> > > > > holding everything up, it can go to the IESG while 2.4 has
>> > > > > further refinement in the WG. I don't see that we have to make
>> > > > > this decision now.
>> > > > >
>> > > > > Regarding the document at hand, the existing Sec 2 offers the
>> > > > > possibility that all of the use cases are optional. It does not
>> > > > > preclude the path that appears to have consensus.
>> > > > >
>> > > > > Is that consistent with others' understanding?
>> > > > >
>> > > > > Martin
>> > > > >
>> > > > > On Mon, Jun 7, 2021 at 5:06 AM Spencer Dawkins at IETF <
>> > > > > spencerdawkins.ietf@gmail.com> wrote:
>> > > > > >
>> > > > > >
>> > > > > > On Mon, Jun 7, 2021, 03:15 Magnus Westerlund <
>> > > > > > magnus.westerlund=40ericsson.com@dmarc.ietf.org> wrote:
>> > > > > > > Hi David and WG,
>> > > > > > >
>> > > > > > > Let me attempt to clarify a bit why I have made the
>> > > > > > > comments I have made. I think they do stem from
>> > > > > > > interepreting the network to network use cases as a very
>> > > > > > > general technology and from the perspective of deploying
>> > > > > > > this with clients which the server has limited trust in. I
>> > > > > > > realize that you are likely comming from another
>> > > > > > > perspective that you only intended to use this in cases
>> > > > > > > where you have fairly high mutual trust in the client and
>> > > > > > > the server. I think that is actually the major difference
>> > > > > > > here and why you below think I am making a circular
>> > > > > > > arguments. I think it all stem from lack of discussion of
>> > > > > > > this use cases and what operational limitations we intended
>> > > > > > > to have on the protocol.
>> > > > > >
>> > > > > > I don't know if this would have helped, but I do wish we
>> > > > > > could tell (explicitly, in the requirements draft) which
>> > > > > > requirements arose from various use cases.
>> > > > > >
>> > > > > > I'm pretty sure that most participants think they know that
>> > > > > > (likely), but also think that other participants have the
>> > > > > > same understanding (perhaps less likely). I think that's what
>> > > > > > Magnus is saying here, if I'm reading the thread correctly.
>> > > > > >
>> > > > > > Do The Right Thing, of course.
>> > > > > >
>> > > > > > Best,
>> > > > > >
>> > > > > > Spencer
>> > > > > >
>> > > > > > > So if the goal here is to have high mutual trust between
>> > > > > > > client and server then I think a protocol solution may be
>> > > > > > > able to be defined with such an applicability statement and
>> > > > > > > less mandate on necessary protocol mechanisms to protect
>> > > > > > > against malicous peers. I think that is in stark contrast
>> > > > > > > against some of the other use cases where the trust in the
>> > > > > > > client could be rather minimal. Like the client and server
>> > > > > > > relationship is only this is a paying customer that gets a
>> > > > > > > VPN access and the server has no idea what type of client
>> > > > > > > or implementation that are the peer. This basic use cases
>> > > > > > > will deploy with an addressing architecture that makes it
>> > > > > > > much less vulnerable to malicous intent on the routing
>> > > > > > > level.
>> > > > > > >
>> > > > > > > So, can we please discuss what assumption we have on the
>> > > > > > > client and server trust?
>> > > > > > >
>> > > > > > > I also think your attempt to sweep the addressing schemes
>> > > > > > > to be used by the servers under the rug and not disucss
>> > > > > > > them have hurt the understanding. I at least have been
>> > > > > > > guessing on possible deployment scenarios rather than that
>> > > > > > > we have openly discussed them in the WG. Yes, they maybe
>> > > > > > > not need to be detailed in the protocol solution or an
>> > > > > > > arhcitecture document, however they would have made sense
>> > > > > > > to have some addressing deployment scenarios in this
>> > > > > > > requirement documents use case section to make clear what
>> > > > > > > would have been intended. Because they do influence what is
>> > > > > > > needed for the solution.
>> > > > > > >
>> > > > > > > Cheers
>> > > > > > >
>> > > > > > > Magnus
>> > > > > > > --
>> > > > > > > Masque mailing list
>> > > > > > > Masque@ietf.org
>> > > > > > > https://www.ietf.org/mailman/listinfo/masque
>> > > > > >
>> > > > > > --
>> > > > > > Masque mailing list
>> > > > > > Masque@ietf.org
>> > > > > > https://www.ietf.org/mailman/listinfo/masque
>> > > >
>> > > > --
>> > > > Masque mailing list
>> > > > Masque@ietf.org
>> > > > https://www.ietf.org/mailman/listinfo/masque
>>
>