Re: [Masque] WGLC for "Requirements for a MASQUE Protocol to Proxy IP Traffic"

David Schinazi <dschinazi.ietf@gmail.com> Mon, 28 June 2021 16:36 UTC

Return-Path: <dschinazi.ietf@gmail.com>
X-Original-To: masque@ietfa.amsl.com
Delivered-To: masque@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F14803A0E00 for <masque@ietfa.amsl.com>; Mon, 28 Jun 2021 09:36:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.096
X-Spam-Level:
X-Spam-Status: No, score=-1.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ATZKJsSxlJIe for <masque@ietfa.amsl.com>; Mon, 28 Jun 2021 09:36:51 -0700 (PDT)
Received: from mail-pj1-x102f.google.com (mail-pj1-x102f.google.com [IPv6:2607:f8b0:4864:20::102f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EABAF3A0DFC for <masque@ietf.org>; Mon, 28 Jun 2021 09:36:50 -0700 (PDT)
Received: by mail-pj1-x102f.google.com with SMTP id pf4-20020a17090b1d84b029016f6699c3f2so13299728pjb.0 for <masque@ietf.org>; Mon, 28 Jun 2021 09:36:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=oNWD3rXCn4sYSaiQd78i8NFSvctbghkd0Xg/4Pqh1i0=; b=gkZmdGA0wbDHXmWvWUFpAJvxJqEyCQh8N//c67vE7JiCfYxppwT0lE45/l3T3s+cnv OqiSFRfom7YnL9fdVUQqteueReUw9stPq1MgR6BUFpE85pFOj9XhAtsjCkoYdrseu/Tt 0s4XkpZzRYVEBHL/8yjl6A0kMANgpnEEoGBzUeu6pzFFFlq/l9LJt5ICqLue5JU6fUoO DKJvvJQ50ou6McNSz7o7ddgHRe8rGJ/57ueQGl2zz/kg1tkk6FE9UhanN0IEti4d8S8W o2nECwAZ+Z6HLgd/W9KN0lTfM4olo4px6/XWD0ERyJoKB6PpxABp8KLhb0PIthfSwctW gXDQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=oNWD3rXCn4sYSaiQd78i8NFSvctbghkd0Xg/4Pqh1i0=; b=XDoDzeGBnv/ZUrlK4LxCEwPQgz4zjOFD8fwjE/aFms6qTGH9uwHgXn0OsHHRL5UKEl igL6wGCTzo0nWc9oPPGmZUZeJEWP/fF5QULu97D7vCfrSp2Y126flThN+v0ykYzp/G34 pkgE2sU8s8elJ2fsCVVA9otedLSd+bFBEiBulZYpNf7Ed/j/kkLcegQmuylINDkh3HdN R1d+9CazP3edvzCSo8Oif1YbAYS+LwTIm4bhRsyZR3mHDMz7OMS58PFkMbFEpuSwjkTz LzmqYquYQrxapdJizJi9fVp/eswVozsUfYpNUggPVHlqPQDtN3x5jPL6vN8+rWBaFfeq JOGQ==
X-Gm-Message-State: AOAM532T/+uRFGPfUvzoGvqbo8f3kMx3Uzmkk0Q6+1tAEsGG5ElN6SSi rK81yptPPvEW1li67Z83JtWx+etlI8d7q38SBhc=
X-Google-Smtp-Source: ABdhPJyqQQrCl6UkENz/Doyjy30iTM2D+J59A+/yq87F0EZjys9Y9e4OcqWVlUjJDAEOr/23IJ67/ksM+3ST00N1pM0=
X-Received: by 2002:a17:90a:de07:: with SMTP id m7mr38797525pjv.100.1624898208450; Mon, 28 Jun 2021 09:36:48 -0700 (PDT)
MIME-Version: 1.0
References: <d314198b-6c01-4b15-84d8-9896b5fdee80@www.fastmail.com> <HE1PR0702MB3772355483E2771650C6D679953F9@HE1PR0702MB3772.eurprd07.prod.outlook.com> <746F7E16-37BD-49EF-896A-649D394CCB05@ericsson.com> <CAPDSy+6PjZk0Kea6154V3=GF-8bs+0Mr+FtFfi-girGh3uAVrQ@mail.gmail.com> <3deea8212d66731de5c81abae353f3e9322f2d57.camel@ericsson.com> <CAPDSy+68DoVrRiC7uEn1-Ze_5LDn9mt7-f+ZeovTTYAUh=w2Og@mail.gmail.com> <21d8fc788051b570768e53d6d9355ed51b423c0a.camel@ericsson.com> <CAKKJt-d-FzXVdJpUTacb4m7ESyB6nzkk1BQSf8rHtReOvD=5Jw@mail.gmail.com> <CAM4esxSE=misCJX=73h-kF+RQdQLC2WBhwv3nv5QgR8HK17diw@mail.gmail.com> <CAM4esxQatk4-ENdz+2jCbpRtr8hT0nLWbVLbb64RMJwvBf2qDA@mail.gmail.com> <CAHbWFkQ6YAhqgbbsAPC-i2Rv-_LRZ4R3NKTk4of200GUt38A_g@mail.gmail.com> <91475be5-dee4-435e-a65b-1cde43ffff0e@www.fastmail.com> <74934214da56424b57d7985f49e58b20482d6310.camel@ericsson.com> <CAPDSy+6JU9trGDDPpNa+2Xirq=q0FtpOaE9Sy0gUmdXs=N36bA@mail.gmail.com> <9287d53cbca722b586b4a7684f07bbf89717fa3f.camel@ericsson.com>
In-Reply-To: <9287d53cbca722b586b4a7684f07bbf89717fa3f.camel@ericsson.com>
From: David Schinazi <dschinazi.ietf@gmail.com>
Date: Mon, 28 Jun 2021 09:36:37 -0700
Message-ID: <CAPDSy+4DMD65w5Cigqc8W09NjjmXq0krtGasSEVuz+kyJwzGGQ@mail.gmail.com>
To: Magnus Westerlund <magnus.westerlund@ericsson.com>
Cc: "spencerdawkins.ietf@gmail.com" <spencerdawkins.ietf@gmail.com>, "masque@ietf.org" <masque@ietf.org>, "martin.h.duke@gmail.com" <martin.h.duke@gmail.com>, "caw@heapingbits.net" <caw@heapingbits.net>, "achernya@google.com" <achernya@google.com>, Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
Content-Type: multipart/alternative; boundary="00000000000082cd4b05c5d61826"
Archived-At: <https://mailarchive.ietf.org/arch/msg/masque/_M4hsu6g7kYTG9Xqk_IgFwJ15pI>
Subject: Re: [Masque] WGLC for "Requirements for a MASQUE Protocol to Proxy IP Traffic"
X-BeenThere: masque@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiplexed Application Substrate over QUIC Encryption <masque.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/masque>, <mailto:masque-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/masque/>
List-Post: <mailto:masque@ietf.org>
List-Help: <mailto:masque-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/masque>, <mailto:masque-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Jun 2021 16:36:56 -0000

Hi Magnus,

Thank you for clarifying *what* you would prefer to see in scope.
Can you explain *why* you are advocating for those topics?
In particular, you seem to be treating the routing table as
something unique that needs to be handled differently, and I
don't understand that. Many HTTP methods involve changing
local state - if I click the Like button on a website, a database
gets updated somewhere, for example. The routing table is a
database, and it's unclear to me why it needs to be treated
differently. It seems absolutely reasonable to have text in the
security considerations section that states that servers shouldn't
let unauthenticated clients modify any server databases without
checks, but it sounds like you're suggesting that the protocol
solution document be opinionated about trust, and that would
severely limit the applicability of the protocol - various use-cases
will have different means of authenticating clients and picking
policies for what a client is allowed to do, and we cannot preclude
those.

David

On Mon, Jun 28, 2021 at 9:04 AM Magnus Westerlund <
magnus.westerlund@ericsson.com> wrote:

> Hi,
>
> Sorry for the delayed response.
>
> From my perspective you can't just state that trust is out of scope. For a
> solution document I would see the need to discuss the security
> implications for
> a MASQUE endpoint between the authorization that can be derived from the
> protocol mechanisms for endpoint identity versus the MASQUE protocol
> requests
> impact on external state such as routing tables and their potential
> implications.
>
> From my perspective if the IP proxying protocol expresses information about
> routes we will end up having to discuss the purpose and security
> implications of
> those routes and the endpoints trust in what is stated.
>
> Cheers
>
> Magnus
>
> On Wed, 2021-06-09 at 18:17 -0700, David Schinazi wrote:
> > Hi Magnus,
> >
> > You're correct that this isn't currently explicit in the document. The
> > intention of the authors was to declare trust out of scope for the IP
> > proxying protocol. Similar to IP, DHCP, ESP, etc, the protocol itself
> > does not need to worry about trust as that is better handled at a policy
> > layer that lives outside of the protocol. Since the IP Proxying
> > Requirements document only applies requirements to the IP proxying
> > protocol, trust is also out of scope for the requirements document. I can
> > add a subsection to Section 5 (Non-Requirements) if you'd like.
> >
> > If we agree that trust is out of scope, then the risk for added delay is
> low.
> >
> > David
> >
> > On Tue, Jun 8, 2021 at 12:46 AM Magnus Westerlund <
> > magnus.westerlund@ericsson.com> wrote:
> > > Hi,
> > >
> > > I agree that one can split later, with some additional delay. How
> > > problematic waiting with splitting is depends on what the network to
> > > network use cases is supposed to cover. I think we need to figure out
> > > what type of threat model and mutual trust the two MASQUE endpoint is
> > > expected to have in this use case.
> > >
> > > So, can we please figure this out becasue I think that will clarify if
> > > there is low risk for extra delay or significant risk for extra delay?
> > > This is a request for better clarification in the requirements document
> > > on 2.4.
> > >
> > > Cheers
> > >
> > > Magnus
> > >
> > >
> > > On Mon, 2021-06-07 at 13:07 -0700, Christopher Wood wrote:
> > > > As Martin points out, the solution for the network-to-network use
> > > > case in Section 2.4 can be split out into a separate document should
> > > > we run into timeline issues down the road.
> > > >
> > > > To that end, we'd like to reiterate that the purpose of this WGLC is
> > > > to determine if we can we move forward with this understanding and
> > > > consensus on this document in its current state, plus or minus maybe
> > > > some editorial cleanup. If not, what specific requirements in the
> > > > document are problematic, and why?
> > > >
> > > > Thanks,
> > > > Chris and Eric
> > > >
> > > > On Mon, Jun 7, 2021, at 12:54 PM, Alex Chernyakhovsky wrote:
> > > > > Hi Martin,
> > > > >
> > > > > Thanks for weighing in, and I agree with your interpretation that
> > > > > there
> > > > > is no tension between these two points.
> > > > >
> > > > > I agree that should we run into timeline issues with the
> > > > > implementation
> > > > > drafts, it is possible to split out the section 2.4 implementation
> > > > > into
> > > > > its own document. We should cross that bridge if/when we get there.
> > > > >
> > > > > Sincerely,
> > > > > -Alex
> > > > >
> > > > > On Mon, Jun 7, 2021 at 3:39 PM Martin Duke <
> martin.h.duke@gmail.com
> > > > > > wrote:
> > > > > > To clarify what I meant, I'm suggesting the the future IP proxy
> > > > > > document can split out the network-network use case specification
> > > > > > if that proves to be problematic.
> > > > > >
> > > > > > I am not saying we should have two requirements documents.
> > > > > >
> > > > > > On Mon, Jun 7, 2021 at 12:25 PM Martin Duke <
> > > > > > martin.h.duke@gmail.com> wrote:
> > > > > > > I'd like to step in here as AD and make sure we are not talking
> > > > > > > past each other here. IIUC:
> > > > > > >
> > > > > > > (1) Magnus and Mirja do not want to implement 2.4.
> > > > > > > (2) The authors want to make sure the design is extensible to
> > > > > > > support 2.4, but are OK with some endpoints not supporting it.
> > > > > > >
> > > > > > > It does not appear that there is tension between these points.
> > > > > > > However, I understand that Magnus is concerned that 2.4 will
> > > > > > > hold up the core proxy-ip draft unnecessarily.
> > > > > > >
> > > > > > > As AD, if we come to that point, I see no requirement in the
> > > > > > > charter that this be one or two documents; if the option is
> > > > > > > holding everything up, it can go to the IESG while 2.4 has
> > > > > > > further refinement in the WG. I don't see that we have to make
> > > > > > > this decision now.
> > > > > > >
> > > > > > > Regarding the document at hand, the existing Sec 2 offers the
> > > > > > > possibility that all of the use cases are optional. It does not
> > > > > > > preclude the path that appears to have consensus.
> > > > > > >
> > > > > > > Is that consistent with others' understanding?
> > > > > > >
> > > > > > > Martin
> > > > > > >
> > > > > > > On Mon, Jun 7, 2021 at 5:06 AM Spencer Dawkins at IETF <
> > > > > > > spencerdawkins.ietf@gmail.com> wrote:
> > > > > > > >
> > > > > > > >
> > > > > > > > On Mon, Jun 7, 2021, 03:15 Magnus Westerlund <
> > > > > > > > magnus.westerlund=40ericsson.com@dmarc.ietf.org> wrote:
> > > > > > > > > Hi David and WG,
> > > > > > > > >
> > > > > > > > > Let me attempt to clarify a bit why I have made the
> > > > > > > > > comments I have made. I think they do stem from
> > > > > > > > > interepreting the network to network use cases as a very
> > > > > > > > > general technology and from the perspective of deploying
> > > > > > > > > this with clients which the server has limited trust in. I
> > > > > > > > > realize that you are likely comming from another
> > > > > > > > > perspective that you only intended to use this in cases
> > > > > > > > > where you have fairly high mutual trust in the client and
> > > > > > > > > the server. I think that is actually the major difference
> > > > > > > > > here and why you below think I am making a circular
> > > > > > > > > arguments. I think it all stem from lack of discussion of
> > > > > > > > > this use cases and what operational limitations we intended
> > > > > > > > > to have on the protocol.
> > > > > > > >
> > > > > > > > I don't know if this would have helped, but I do wish we
> > > > > > > > could tell (explicitly, in the requirements draft) which
> > > > > > > > requirements arose from various use cases.
> > > > > > > >
> > > > > > > > I'm pretty sure that most participants think they know that
> > > > > > > > (likely), but also think that other participants have the
> > > > > > > > same understanding (perhaps less likely). I think that's what
> > > > > > > > Magnus is saying here, if I'm reading the thread correctly.
> > > > > > > >
> > > > > > > > Do The Right Thing, of course.
> > > > > > > >
> > > > > > > > Best,
> > > > > > > >
> > > > > > > > Spencer
> > > > > > > >
> > > > > > > > > So if the goal here is to have high mutual trust between
> > > > > > > > > client and server then I think a protocol solution may be
> > > > > > > > > able to be defined with such an applicability statement and
> > > > > > > > > less mandate on necessary protocol mechanisms to protect
> > > > > > > > > against malicous peers. I think that is in stark contrast
> > > > > > > > > against some of the other use cases where the trust in the
> > > > > > > > > client could be rather minimal. Like the client and server
> > > > > > > > > relationship is only this is a paying customer that gets a
> > > > > > > > > VPN access and the server has no idea what type of client
> > > > > > > > > or implementation that are the peer. This basic use cases
> > > > > > > > > will deploy with an addressing architecture that makes it
> > > > > > > > > much less vulnerable to malicous intent on the routing
> > > > > > > > > level.
> > > > > > > > >
> > > > > > > > > So, can we please discuss what assumption we have on the
> > > > > > > > > client and server trust?
> > > > > > > > >
> > > > > > > > > I also think your attempt to sweep the addressing schemes
> > > > > > > > > to be used by the servers under the rug and not disucss
> > > > > > > > > them have hurt the understanding. I at least have been
> > > > > > > > > guessing on possible deployment scenarios rather than that
> > > > > > > > > we have openly discussed them in the WG. Yes, they maybe
> > > > > > > > > not need to be detailed in the protocol solution or an
> > > > > > > > > arhcitecture document, however they would have made sense
> > > > > > > > > to have some addressing deployment scenarios in this
> > > > > > > > > requirement documents use case section to make clear what
> > > > > > > > > would have been intended. Because they do influence what is
> > > > > > > > > needed for the solution.
> > > > > > > > >
> > > > > > > > > Cheers
> > > > > > > > >
> > > > > > > > > Magnus
> > > > > > > > > --
> > > > > > > > > Masque mailing list
> > > > > > > > > Masque@ietf.org
> > > > > > > > > https://www.ietf.org/mailman/listinfo/masque
> > > > > > > >
> > > > > > > > --
> > > > > > > > Masque mailing list
> > > > > > > > Masque@ietf.org
> > > > > > > > https://www.ietf.org/mailman/listinfo/masque
> > > > > >
> > > > > > --
> > > > > > Masque mailing list
> > > > > > Masque@ietf.org
> > > > > > https://www.ietf.org/mailman/listinfo/masque
>