Re: [Masque] Éric Vyncke's Discuss on draft-ietf-masque-connect-ip-09: (with DISCUSS and COMMENT)

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Thu, 13 April 2023 11:25 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: masque@ietfa.amsl.com
Delivered-To: masque@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04BF1C1516FF; Thu, 13 Apr 2023 04:25:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.597
X-Spam-Level:
X-Spam-Status: No, score=-9.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="Ze2RTWuK"; dkim=pass (1024-bit key) header.d=cisco.com header.b="QyZ37dk2"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WbM8WDGDksFW; Thu, 13 Apr 2023 04:24:58 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BC5B5C1516E3; Thu, 13 Apr 2023 04:24:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=56219; q=dns/txt; s=iport; t=1681385096; x=1682594696; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=TWjquO3dR7CHHPCLOiC9NLUbl1L7lHSWSB9aFuTyZjc=; b=Ze2RTWuKptrnnnYd+Xs7eCBAc6scJTgL2zMsPvI3nbJT06CMqCU0ihbP Pfoiu2AEbSkxYNSl/JJ/p4GmgNj++5asCdz2+skSoTqkDUCRf+twlbdYc dUrdCgzbTEaPBgUFZdw8LF5bOef0j53mmo1R8DfuMydtXuAMrhcv55huc I=;
X-IPAS-Result: A0ADAABv5TdkmIENJK1aGgEBAQEBAQEBAQEDAQEBARIBAQEBAgIBAQEBZYEWBQEBAQELAYEqMVJzAlkTFhJGhFKDTAOET1+IMAOBExaKIpIRFIERA1YPAQEBDQEBOwkEAQGFBgIWhSYCJTQJDgECAgIBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBwQUAQEBAQEBAQEeGQUOECeFaA2GAwEBAQEDEggJHQEBNwEPAgEIDgMDAQIhAQYDAgICHxEUBgMIAgQOBRYMglwBghUTAzEDAQ8GoAUBgT8CiiB6gTKBAYIIAQEGBAWBNwEDAgELAgJAAZo/DYJHAwaBQQGHRgR2XgEBgVKBYR+ERycbgUlEgRUnHIIwOD6CIEIBAQIBgSgBAQsGAUENCQKDIzmCLol0hQGCX4htCoE0dIEgDoE8gQQCCQIRa4EQCGmBeUACDWMLDm+BSYMqBAIURRAHNgMZKx1AAws7Oj81FB8GVm0sERMFAwsVKkcECDgGHDQRAggPEg8GJkQMQjczEwZcASkLDhEDT4FHBC+BXAYBJiScNYFdJS0ZBj4mBBQOGQgIBgEBBBAMMC8BXgsEEAUBAQEOAxYHChEpA5IvCoMTR4pKjimTDD5vCoN+i3KPDgSGAwQvg32MZoZrimGGMWKFf4w4hT6NU4NukRwIGIR5AgQCBAUCDgEBBjWBLjprcHAVOyoBgggBAQExUhkPjiARCAkVgzuFFIpldQI7AgcBCgEBAwkBgjmGM4JYAQE
IronPort-PHdr: A9a23:TDnNoRcRmJjMnA5ROohRg2KwlGM/foqcDmcuAtIPgrZKdOGk55v9e RGZ7vR2h1iPVoLeuLpIiOvT5rjpQndIoY2Av3YLbIFWWlcbhN8XkQ0tDI/NCUDyIPPwKS1vN M9DT1RiuXq8NBsdA97wMmXbuWb69jsOAlP6PAtxKP7yH9vfkdWx3OO/05bSeA5PwjG6ZOA6I BC/tw6ErsANmsMiMvMo1xLTq31UeuJbjW9pPgeVmBDxp4+8qZVi6C9X/fkm8qZ9
IronPort-Data: A9a23:G5nsgatD2QFvF2PZwOa+HKJYu+fnVJheMUV32f8akzHdYApBsoF/q tZmKWCGO/6LamOkLYh0aYXg9BxTucXVm4NjQAFvrShkFS8SgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUIYoAQgsA141IMsdoUg7wbVh3tcz2YHR7z6l4 LseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3ecldG0DFrrx8RYZWc QpsIIaRpQs19z91Yj+sfy2SnkciGtY+NiDW4pZatjTLbhVq/kQPPqgH2PU0eF0NthWJtshI1 cxonKehRQIZIK/MobFIO/VYO3kW0axu8bvDJz20ttaeihyAeHr3yPIoB0YzVWEa0r8oWicVq 7pBc3ZUNEHra+GemNpXTsFhmNUlJ8rmFIgeoXpnizreCJ7KRLiSHvmXuI8Cgl/cgOgWMs2Da 5NHSAM/UwXbOzBPZlgFFbEXybLAan7XKm0E9w39SbAMy23a1xVs3ZDsPcbbPNuQSq19m0+Dv 3/Lum/5CxAAL/SexCaLtHW2iYfnkTnyVp5XFbCk+LtviUaK22FWAxoQU1awvby4kma/Vs5Rb UsO9UIGrKUp+2SqQ8XzGRqirxa5UgU0Ut5UFagx7xuAj/uS6AeCDW9CRTlEADA7iCMobS0wj GKpn/rxPCF2lZSuWH6YxqmWrQrnbED5MlQ+TSMDSAIE5fzqr4cykg/DQ75f/Eid04Kd9dbYn mjikcQuu1kApZVRh/jnoTgrlxrp98aUH19tjunCdjj9hj6VcrJJcGBBBbLzwv9aKI+fQjFtV 1BbxpDCt4ji4Xxx/RFhrc0EGLWvov2CKjCZ0BhkHoIq8HKm/HvLkWFsDNNWeh8B3iUsIGCBj KrvVeV5v8E70JyCNvIfXm5JI552pZUM7Py8PhwuUvJAY4JqaCiM9zx0aEib0gjFyRZ8yPplZ c3AKpf8Ux727JiLKhLrFo/xNpd2mUgDKZ/7HvgXMjz+i+PFPS7JIVv7GArSM4jVE59oUC2Mo 4oAaKNmOj1UUfb1ZWHM4JUPIFURRUXX9riow/G7gtWre1I8cEl4Uqe56ep4J+RNwf8P/s+Wp S7VZ6Ot4Ael7ZExAV/UOikLhXKGdcsXkE/XygR1ZAf3iyh9ONb0hErdHrNuFYQaGCVY5accZ 9EOet6LBbJETTGvxtjXRcOVQFBKHPhzuT+zAg==
IronPort-HdrOrdr: A9a23:nZtmganUHYPb+1NM7uukcErwwzTpDfOBimdD5ihNYBxZY6Wkfp +V7ZcmPE7P6Ar5BktApTnZAtjwfZq9z/FICYl4B8baYOCUghrZEGgC1/qt/9SEIVydygcz79 YcT0ETMqyWMbE+t7eF3ODaKadg/DDkytHVuQ629R4EJmsGB9AEnmNE40SgYzJLrWJ9dOIE/e +nl7B6Tk2bCA8qh6qAdx84tu74yeHjpdbDW1orFhQn4A6BgXeD87jhCSWV2R8YTndm3aoi2X KtqX272oyT99WAjjPM3W7a6Jpb3PH7zMFYOcCKgs8Jbh3xlweTYph7UbHqhkF2nAjv0idurD D/mWZmAy1B0QKWQohzm2q15+DU6kdr15Yl8y7BvZKsm72jeNtwMbszuWsQSGqq16NnhqA97E qOtFjp6qa+ynj77X7AD5KjbWAeqmOk5XUliuIdlHpZTM8Xb6JQt5UW+AdPHI4HBz+S0vFrLA BCNrCW2B9tSyLRU1nJ+m10hNC8VHU6GRmLBkAEp8yOyjBT2HR01VERysATlmoJsMtVcegK28 3UdqBz0L1eRM4faqxwQO8HXMusE2TIBRbBKnibL1jrHLwOf3jNt5n06rMo4/zCQu1F8LIi3J DaFF9Iv287fEzjTcWIwZ1Q6xjIBH6wWDz8o/sur6SReoeMDYYDHRfzPmzGyfHQ18n3KverLM qOBA==
X-Talos-CUID: 9a23:RBntLmvZuttyGaWTF5h0df3B6Is0aCfg7Hf5O3alEENAc6yZTG+O+qNdxp8=
X-Talos-MUID: 9a23:qvTaJQ042iV6qjwAwRVylxP/lTUju4uVVUxUz7Q/6/aVLnRdO2uSnimUa9py
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-9.cisco.com ([173.36.13.129]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 13 Apr 2023 11:24:54 +0000
Received: from alln-opgw-5.cisco.com (alln-opgw-5.cisco.com [173.37.147.253]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 33DBOsv5007335 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 13 Apr 2023 11:24:54 GMT
Received: from mail-mw2nam12lp2040.outbound.protection.outlook.com (HELO NAM12-MW2-obe.outbound.protection.outlook.com) ([104.47.66.40]) by alln-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Apr 2023 11:24:54 +0000
Received: from mail-mw2nam12lp2040.outbound.protection.outlook.com (HELO NAM12-MW2-obe.outbound.protection.outlook.com) ([104.47.66.40]) by alln-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Apr 2023 11:24:54 +0000
Received: from mail-mw2nam12lp2040.outbound.protection.outlook.com (HELO NAM12-MW2-obe.outbound.protection.outlook.com) ([104.47.66.40]) by alln-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Apr 2023 11:24:54 +0000
Authentication-Results: alln-opgw-5.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=evyncke@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="5.99,341,1677542400"; d="scan'";a="100874"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=djaLlW18xC73c5W++4iR89brAZmis44ZpTDdUwTUcCGNbToi1q82Y7r7VFGEIUlNm/pkdId3vP24wvwhG4QBPtTc5QNzSzrfAKjNr1OuqPtXDWqMyo/saHlazpKb4PRYW0nbgIrPP+ngIP59EC1EGoOpWattuhQvKbeprYs0ynJf4zfhimAu/aiK3MAlLcAqDKQDsYDQl30nk1Qlslj7kp/WH1/avsrDqaDZEVXvq0P4emqlYh7ShpYOhostSIRLDsDTXxMd9o9BzGzm3IfxWrKGyNfvwrtQ4vt4vCn8Gulwp+Yo93uLCeJEhX56BGlCnSreYLQ26qg+hqjXF/fKEg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=TWjquO3dR7CHHPCLOiC9NLUbl1L7lHSWSB9aFuTyZjc=; b=SK4Kw8AxsgK/eFO7QwV/JobzkbfR9YC7AZAZGr/yn1B3POfHCpb9uEMIpxS+7Hd+Ip9a/qzlbi8vi9oPdW4QkjwiTHjl/Kb4Y320PuTuZjtelrVLRJoRdneyW1g5aC6YuRey2ffnyuoe4xQ/x4ovTkROa6DUrRtveia9xo+Jux4mchRJR/r9BcsxGra6OaMGLM9ELKi8JzxN6nyvG73q1uxpcj2UvhIjEebPaAQoaE5/S0JkZzlYQsokjWlAe6rWwhJNVyVK4PN+TJhHQMPUvuBRh7jepIQvKv50G374HWofL80dO2aDwPlT7f9TU6Bp/f86Lf80YAjXj3IxrVjJ9g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TWjquO3dR7CHHPCLOiC9NLUbl1L7lHSWSB9aFuTyZjc=; b=QyZ37dk2k1AzW1xltlo57mtkeNsHAjTRQz2aCge3IoOHINJpFLdJWhXo6TN+XdDxuXkPl3nFfLVhFV+MAhed/0Okm6VflsXo6HGb2WC6NB1kAJoSc/mflO5tYA+Lb8c6xeLW3GoQM8zPCwGg4P+jTA5a2WfgIr1RH+urFSS5Xu0=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by DS7PR11MB6175.namprd11.prod.outlook.com (2603:10b6:8:99::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6298.30; Thu, 13 Apr 2023 11:24:50 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::1cb4:210d:7f4d:ab99]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::1cb4:210d:7f4d:ab99%9]) with mapi id 15.20.6298.030; Thu, 13 Apr 2023 11:24:50 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: David Schinazi <dschinazi.ietf@gmail.com>
CC: The IESG <iesg@ietf.org>, "draft-ietf-masque-connect-ip@ietf.org" <draft-ietf-masque-connect-ip@ietf.org>, "masque-chairs@ietf.org" <masque-chairs@ietf.org>, "masque@ietf.org" <masque@ietf.org>, "caw@heapingbits.net" <caw@heapingbits.net>
Thread-Topic: Éric Vyncke's Discuss on draft-ietf-masque-connect-ip-09: (with DISCUSS and COMMENT)
Thread-Index: AQHZbGjalRrQ6eGTwUabi66uUpVc268mzfOAgADU4ACAAEDXAIAAaAwAgADyHYA=
Date: Thu, 13 Apr 2023 11:24:50 +0000
Message-ID: <4A439244-F4F7-4E76-B4A7-6860C2B4C299@cisco.com>
References: <168121253516.32736.10754673770332939967@ietfa.amsl.com> <CAPDSy+5joAN3X15PNYv5p9X5vde4mz6rXSf3dFXG1b0D4ZVpSg@mail.gmail.com> <09D789D4-1B4F-4292-837B-2BF0D92EBF4C@cisco.com> <CAPDSy+4tNnAxwm0T9HzPk5HyqwHTk86rYwKDk0VaSqYc=1Gw8w@mail.gmail.com> <CAPDSy+4qwbBHmtUm4rTtHaSq3hzfzk2ikAr4drZCysygyfSqgA@mail.gmail.com>
In-Reply-To: <CAPDSy+4qwbBHmtUm4rTtHaSq3hzfzk2ikAr4drZCysygyfSqgA@mail.gmail.com>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.71.23032500
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB4966:EE_|DS7PR11MB6175:EE_
x-ms-office365-filtering-correlation-id: f594c025-010e-42bc-895f-08db3c11b238
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(376002)(39860400002)(136003)(346002)(396003)(366004)(451199021)(316002)(41300700001)(53546011)(6506007)(6512007)(122000001)(38070700005)(6486002)(966005)(186003)(71200400001)(86362001)(38100700002)(66574015)(166002)(2616005)(66556008)(83380400001)(66476007)(66446008)(66946007)(64756008)(6916009)(4326008)(54906003)(36756003)(76116006)(224303003)(91956017)(8936002)(5660300002)(2906002)(30864003)(33656002)(478600001)(66899021)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: IDXUQpYTjrt17/ISXmTSMKZza+hcknltHlRwTIm8Z+D95TBb4Cd9sT9QOuoqlWpcc5IqmCBv+5JzuIHCTcSKD+lyPGGUUnDakZG1UqYiSqHE1pG3f1GyMkmrZON1DenwsIlWFPio0xi62gF1WZMF2ocQ+IAS2vFZg0A+HZaZHRngcM9ase446VOIe+jWNcnjmnJpJBx/Vuk1Hf/nQ3Lib22RA8busZWXoxtCIX7fcXY/OC5Qs6XWJn4yG+OvGC/37CIrMpIE82Vic+Mz+93KCcyoA71PbAknL2OVxUERfoB8/5Gh3X5XVJsFxwjLPUfxvhdY96z45vwKndGdKLFvgeV5oRxylQ/mFil0VIgmRZNB+IbNR3ruGHabV0tOrDy9NEOdj6xslqBBvYn7300a9LBIE2GOlgDksrXxJXdO8v9U9FaZf+H6Butj218odJld88MbgWBCxEYKwKlmriImUjRwklVz4auFxORCZfbMXvhN19CkBoxZbG81kxhjyy4dqPfXyPNDFZuqz+Xa3LpYk3CCx66vZ5elcqwizd4xznej9DjfVpALiZPgtLkSl5d4GPUOFeQin6T0uXU//zSgGzhEQnrE7WTuI0yw24y+N3cCfUeIjjsZ8jjxcAiUoRsUj8XSPsHUSPN8Axim3FYt8u61Z08h44gx9UCTqpm2JnnMNJckYu2u9rFySV9ynZ9nUywUA5n0eFSD9qwmy/JwvJo0fCOVy0A6Dm3bWkDOGVD/FzBmyUnK8ZXG4evOR0WxnNSW359DbE9YFS2s9KLV+O1m9J7D3Q/fcvPryomzCbFQQl066lSLkOBHMmFB4aY/G2MlnIxz9yXYItDMN6vzTtlxSGoLyyRfB2X8iM91yinQigoUM/y0QxqA6Cwl3jAw+fIg5RHJAaWqbZAvkD7xG9K2fRiGxmFU0iBBEbifMRzRPOEh5pvsYzfZvuswxrDb/3QpghgctSeu6v83FXv9UdZuhgJxa5LfiP6C2fb+oxwdvfzwSJpthv/8CrYpWXxSXKFP9pgXu2M69mVPgm+OA8P49I5/6vHLNCsDSOnZGiS84oRwGr6WlvB7hJkPiAdBdwnI6RaE2xwAg/xEmDOsk5caC0T/PctkADgZETrTQJF8DTqSmP6E3PinBrGNEUyoqay1B6F59J6zHYFnjFbQU86xx+bC9SzDprLV5LYBSJsOjVedbbpQ+m+hzGjwzQ6yXgTGxwjbKkV5uJ0xdSSOrBZhwAGrZu9Y4x+iBMP2I0Fhn/AVwO8n+NLmg/aeTJ4maCYzEFUGtYdFy+ulfdBCexXkmU2MuYt5UA0NKk27Ix5G9EYqnaKjopR12L0w3kk0LKcNBStszSEfqgYA1c/ugeNMwcVZOreVmWRBCqlUIWppzW+BmplOjMG0e+EGEMW9aGuvek5SFxbDi3SrtMowAEARVhexLiHF/TkTRYCgEXou0/uvSYqeccC+mTWqQAA12nZKBXZnGtTSkK3SonJujh5nDVopuWNsSAc0w6RhNNng6KdBHWklZL6vmHx0ylcxf0Ui304jmhI7S5vJYqov7dTV1kZscuk7nT0l/QS7q8oZ3qDCvtYE8xgh8DKGt8NIdenALuEqCNn8MUjp2rGsxQLdw+pjC4NL4Gxla6qTHVGI5nfgJVj+PQzSzIcKj4ni
Content-Type: multipart/alternative; boundary="_000_4A439244F4F74E76B4A76860C2B4C299ciscocom_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f594c025-010e-42bc-895f-08db3c11b238
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Apr 2023 11:24:50.4656 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: tueQZZzThN2YLV0bhSxNx8YAkm/4dAJhfxVSBOlzZ2mJfKmEQu/EIVQJK7am+iSFnDKgaP6QDnfYvC4D/gpisQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR11MB6175
X-Outbound-SMTP-Client: 173.37.147.253, alln-opgw-5.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/masque/uM56i2C_XNb9iePv6vObzKE9PQI>
Subject: Re: [Masque] Éric Vyncke's Discuss on draft-ietf-masque-connect-ip-09: (with DISCUSS and COMMENT)
X-BeenThere: masque@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Multiplexed Application Substrate over QUIC Encryption <masque.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/masque>, <mailto:masque-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/masque/>
List-Post: <mailto:masque@ietf.org>
List-Help: <mailto:masque-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/masque>, <mailto:masque-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Apr 2023 11:25:03 -0000

Hello David,

About PR #156, unsure what it is the added value (I am even afraid that it brings confusion): ` When IP proxying endpoints forward IP packets between different links,... This does not apply to IP packets generated by the IP proxying endpoint itself.`

But, PR #157 and PR #158 are indeed addressing my DISCUSS concerns. I.e., I am clearing my DISCUSS ballot as soon as those 2 PRs are merged into a revised I-D.

NOTE: I still wonder whether the example in 9.2 is a kludge or just a token of something wrong in the design... at least the text with the PR is clear about the issue.

While the COMMENT points can be ignored, I would suggest that the authors review them.

Regards,

-éric


From: David Schinazi <dschinazi.ietf@gmail.com>
Date: Thursday, 13 April 2023 at 00:58
To: Eric Vyncke <evyncke@cisco.com>
Cc: The IESG <iesg@ietf.org>, "draft-ietf-masque-connect-ip@ietf.org" <draft-ietf-masque-connect-ip@ietf.org>, "masque-chairs@ietf.org" <masque-chairs@ietf.org>, "masque@ietf.org" <masque@ietf.org>, "caw@heapingbits.net" <caw@heapingbits.net>
Subject: Re: Éric Vyncke's Discuss on draft-ietf-masque-connect-ip-09: (with DISCUSS and COMMENT)

Hi Eric,

To clarify the proposals in my previous email, I've written them up as PRs:
(1) https://github.com/ietf-wg-masque/draft-ietf-masque-connect-ip/pull/157
(2) https://github.com/ietf-wg-masque/draft-ietf-masque-connect-ip/pull/156
(3) https://github.com/ietf-wg-masque/draft-ietf-masque-connect-ip/pull/158

Thanks,
David

On Wed, Apr 12, 2023 at 9:45 AM David Schinazi <dschinazi.ietf@gmail.com<mailto:dschinazi.ietf@gmail.com>> wrote:
Thanks Eric! Below I propose making three changes to the document to address your DISCUSS points, let me know if they'd work for you, see "DS>".
David

On Wed, Apr 12, 2023 at 3:54 AM Eric Vyncke (evyncke) <evyncke@cisco.com<mailto:evyncke@cisco.com>> wrote:
Hello David,

Thank you for your prompt reply.

As you know, authors may completely ignore the COMMENT points as they are not blocking.

Please look below for EV> for my replies. And, to be clear, I intend to ballot a YES once the DICUSS points are discussed/addressed as I really like the technique.

Regards

-éric

From: David Schinazi <dschinazi.ietf@gmail.com<mailto:dschinazi.ietf@gmail.com>>
Date: Wednesday, 12 April 2023 at 02:12
To: Eric Vyncke <evyncke@cisco.com<mailto:evyncke@cisco.com>>
Cc: The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>, "draft-ietf-masque-connect-ip@ietf.org<mailto:draft-ietf-masque-connect-ip@ietf.org>" <draft-ietf-masque-connect-ip@ietf.org<mailto:draft-ietf-masque-connect-ip@ietf.org>>, "masque-chairs@ietf.org<mailto:masque-chairs@ietf.org>" <masque-chairs@ietf.org<mailto:masque-chairs@ietf.org>>, "masque@ietf.org<mailto:masque@ietf.org>" <masque@ietf.org<mailto:masque@ietf.org>>, "caw@heapingbits.net<mailto:caw@heapingbits.net>" <caw@heapingbits.net<mailto:caw@heapingbits.net>>
Subject: Re: Éric Vyncke's Discuss on draft-ietf-masque-connect-ip-09: (with DISCUSS and COMMENT)

Hi Éric, and thank you for your review.
In this email, I'll address your DISCUSS points. We'll dive into your COMMENTs once we've cleared your DISCUSS.
Please see responses inline.
David

On Tue, Apr 11, 2023 at 4:28 AM Éric Vyncke via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>> wrote:
Éric Vyncke has entered the following ballot position for
draft-ietf-masque-connect-ip-09: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-masque-connect-ip/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Thank you for the work put into this document. I *really* find the idea and the
protocol interesting and useful. The text is also easy to read and to
understand (albeit underspecified in some cases -- hence my DISCUSS).

Please find below some blocking DISCUSS points (easy to address by adding some
text), some non-blocking COMMENT points (but replies would be appreciated even
if only for my own education), and some nits.

Special thanks to Chris Wood for the shepherd's detailed write-up including the
WG consensus *but* it lacks the justification of the intended status.

Other thanks to Tim Winters, the Internet directorate reviewer (at my request):
https://datatracker.ietf.org/doc/review-ietf-masque-connect-ip-09-intdir-telechat-winters-2023-04-07/
(and I have read the email exchange, thanks to all)

I hope that this review helps to improve the document,

Regards,

-éric

# DISCUSS (blocking)

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a
DISCUSS ballot is a request to have a discussion on the following topics:

## Section 8

Several parts of this section are unspecified, see below.

`Note that ICMP messages can originate from a source address different from
that of the IP proxying peer.` is of course obvious, but I think that this case
(ICMP originating from the global Internet to the proxy client) deserves a
section on its own. Notably whether this source must be within the target ?

This is discussed in the following paragraph of our Security Considerations:
https://www.ietf.org/archive/id/draft-ietf-masque-connect-ip-09.html#section-12-4
Does that answer your question?

EV> Not really, the point in the security section is valid and should be kept of course.
EV> But, the sentence in section 8 is really terse and would benefit from a paragraph on its own.
EV> Would the authors object adding a sentence like "Client SHOULD expect receiving ICMP messages sourced outside of the target." ?
EV> If authors object, then I am clearing this DISCUSS point as it would have been discussed.

DS> I think mentioning that it can come from outside is a good idea, but I prefer it as a statement of fact instead of a SHOULD. How about the following change:
DS> (1) <<Note that ICMP messages can originate from a source address different from that of the IP proxying peer, and also from outside the target if scoping is in use.>>?

The source address to be used by the proxy when originating an ICMP should also
be specified, even if just a reference to RFC 6724 for IPv6.

We already reference RFC 4443 which discusses this in section 2.2. I'm not sure
adding a reference to RFC 6724 is required. Either way, may I propose we move
this editorial topic out of your DISCUSS block and into a COMMENT please?

EV> the reference to RFC 4443 in section 8 is correct even if I would prefer to have a clearer text rather than " IP proxying endpoints SHOULD use ICMP" (the use being rather vague, what about "IP proxying endpoints SHOULD generate an ICMP by implementing ICMP/ICMPv6" ?). It is about clarification.

DS> I tried reworking the sentence a few times, and it ended up being less clear than the current text <<In such scenarios, IP proxying endpoints SHOULD use ICMP {{!ICMP=RFC0792}} {{!ICMPv6=RFC4443}} to signal the forwarding error to its peer by generating ICMP packets and sending them using HTTP Datagrams.>> because if I remove the use ICMP then it becomes quite a mouthful with the discussion of putting it in HTTP Datagrams. Can you propose a rephrasing?

EV> BTW, I forgot to add a non-blocking COMMENT on this section about ICMP generation about packets received from the Internet to the proxy client. Feel free to ignore of course.

DS> Can you elaborate? Is this about the proxy sending ICMP to an Internet machine? That might be outside the scope of this document, or am I misunderstanding what you mean?

## Section 9.2

In the example where the IP proxy has an IP address in the same prefix as the
legacy client (there is no on-link / off-link state for IPv4 as opposed to
IPv6), the encapsulation behavior of section 7 requires the TTL to be
decremented before entering the tunnel, which is really wrong as it this case
it is not formally a routing to a different prefix and some protocols may
expect TTL=255, which won't be the case.

Request to add some text about this "issue".

Can you elaborate on what protocols do this? As far as I know, all modern OSes
set a default TTL of 64 so you'd never see a TTL or Hop Limit of 255. We use
something very similar to this example in production and haven't had any TTL
problems.

EV> Erik Kline has also noticed this issue. As you asked for examples, from the top of my head:
EV> The generalized TTL security mechanism, RFC 5082, is often used outside of BGP/LDP (and BTW I would love to support BGP on a MASQUE IP proxy)
EV> RFC 4891, NDP, also relies on HL=255
EV> See also section 11 of RFC 6762 (mDNS)


EV> In short, there is either a shortcoming in the route/address negotiation in connect-ip as it allows such deployement
EV> or this example should be annotated by some text about the TTL/HL being decremented in what appears a link operation.

DS> That makes sense. I propose we make two changes:
DS> (2) in the normative text about decrementing TTL/HL, we mention that this decrement is not applied for traffic generated by the IP proxying endpoint itself
DS> (3) in the "Site-to-Site VPN" example, we mention that since this goes across a router, the TTL/HL will be decremented so protocols that require TTL/HL=255 won't work
----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


# COMMENTS (non blocking)

## Waiting for Last Call PR ?

May I suggest, next time, to wait until a revised I-D is submitted based on the
IETF Last Call before balloting ? E.g., the PR based on the sec-dir review is
not yet merged AFAIK.

## Section 3

`The URI Template MUST NOT contain any non-ASCII unicode characters and MUST
only contain ASCII characters in the range 0x21-0x7E inclusive` the fist part
of the sentence appears as useless as the second part is more restrictive.

## Section 4.1

In `establishes an IP tunnel` should the other side of the tunnel specified ?

## Section 4.6

Should the text also be clear that the proxy should only proxy packets *from*
the target to the client ?

## Section 4.7.1

Should the text specify what are the unused bits of the prefix when the prefix
length is not the address length ? I.e., is 2001:db8:cafe:babe:f00d::/32 a
valid prefix ?

## Section 4.7.3

In the previous sections, IP protocol could also be an IPv6 extension header.
I.e., using "0" as a wildcard value prevents using it to signal Hop-by-hop
extension header. Should 59 be used ? (even if no next header is only for IPv6)

BTW, I was about to ballot DISCUSS on this issue.

The reader (including myself and John Scudder per his ballot) would probably
welcome more explanations to understand why the usual CIDR/prefix notation for
routes is not used. I.e., some routers only use CIDR/prefix FIB entries and one
start-end range could translate in a lot of CIDR/prefix routes in the router
FIB.

## Section 7

Thanks for the text about link-local addresses and link-local multicast. But,
then it raises the question about which IP address to use when replying to a
link-local multicast ? I.e., can a global address be used in the absence of LLA
?

## Section 8

Please also add "hop-limit exceeded" in the non-exhaustive list of errors.

Should ICMP echo requests be mentioned ? (they are *not* error signaling but
are quite useful).

## Section 9.1

In `Such VPN setups can be either full-tunnel or split-tunnel` please define
(or add a reference) to full/split tunnel or simply do not mention those terms
now as they are defined later.

`using a source address in its assigned prefix` while the client has been
assigned a single /32 (i.e., the sentence is correct but could be confusing)

The legends of figures 15 and 16 use different templates ("capsule" in one
case) is it on purpose ?

Should the split-tunnel example have two routes to exclude 192.2.0.42 ?

## Section 12

RFC 5095 is probably not the best RFC about extension header security, there
have been many others notably in V6OPS by Fernando Gont et al.

Should there be an informative reference to RFC 6169 (Security Concerns with IP
Tunneling) ?

# NITS (non blocking / cosmetic)

## Section 4.1

s/via A and/or AAAA records/via A and/or AAAA resource records/ ?