Re: [OPSAWG] [TLS] CALL FOR ADOPTION: draft-reddy-opsawg-mud-tls

Nick Harper <nharper@google.com> Wed, 16 September 2020 00:30 UTC

Return-Path: <nharper@google.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E8BF3A08E2 for <opsawg@ietfa.amsl.com>; Tue, 15 Sep 2020 17:30:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.599
X-Spam-Level:
X-Spam-Status: No, score=-17.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pvJrKEwgTOMN for <opsawg@ietfa.amsl.com>; Tue, 15 Sep 2020 17:30:15 -0700 (PDT)
Received: from mail-ot1-x32f.google.com (mail-ot1-x32f.google.com [IPv6:2607:f8b0:4864:20::32f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8755F3A08E7 for <opsawg@ietf.org>; Tue, 15 Sep 2020 17:30:15 -0700 (PDT)
Received: by mail-ot1-x32f.google.com with SMTP id 60so5081186otw.3 for <opsawg@ietf.org>; Tue, 15 Sep 2020 17:30:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=TZ/w7j18z91kOSlSsUK9irqnAMEibNnutZKj9tdFMqo=; b=pMmii9sLlvVxfS/3mJOoaqrXI4prlH9ek8+2O33FAkKoi0EDvsn7uHrRzuvcNbhiL5 oF+NlppsGvUdf1fbchlXT1fShD+MYAhTvS5SPRfQVZYUNgVGvHxROjD6iuJKDMePeh20 mmt9E1+JYCk5PuHUzVcESl1vDkiaOgBfBewMnmh/KRWIYS4sM/k9y4+3g2JmZgI1tmiM pvX7kiogMe9hIE/mHvwEG+5EHbEmtn+bc1wcNl+Q4/xSp9tc8K0DbbCyqD9NMLaHrsnt r87mxZDjo0Tr40EABMYJtyXCXOX8S7Ymi+akxOjWu0seSZoPMx65rDKHo6QGb7LgOcia k8/w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=TZ/w7j18z91kOSlSsUK9irqnAMEibNnutZKj9tdFMqo=; b=YbKjxOSz667WY9y/qw8XZXb0z9YRE01Lnv7FihYSeG0/5TCu47Im4J9Wwi+3qmg5z4 vNA/dIncttN+rGFqqln1HFhaDRfnEgHmjfL/DaaYu7vGCeTT9n6ESdhbuZYK96oTqV0I bHmf7J7YxKVEPGm6X9qxOjwnKvQiunblWogZhF4iiMQIKNCYg9FGZHo264VoKLqL2TmC cURxMs9skxuM6wFwyPcAYAwhUtl3HPPEO0P961kDMtkhtFvK30GqhBqrJGwm5uDCxqyh Z7MSB6PhB9J46p420gLYfS4tywCNhyK7QIAm2oncWOuMcfhhwND5f6d7KnXCN8fw/x2E L5bA==
X-Gm-Message-State: AOAM53113Dn5018F25TYGpl7n2MYIFpW0492K3+2n8B6QAf1f5YstHHL CBD6Jvijf4k1jdst6giZi7E6cggcIT26hlFv4vlqQQ==
X-Google-Smtp-Source: ABdhPJwKntmRCr0Bxja504jA4NSMOmQOBwy/+1uBs1uue975C/NjeAcXx9sKGF8UApVmZBZHEXcxmmIwCoyQENGehog=
X-Received: by 2002:a9d:67d0:: with SMTP id c16mr14610338otn.347.1600216214380; Tue, 15 Sep 2020 17:30:14 -0700 (PDT)
MIME-Version: 1.0
References: <21BA8D05-DD83-44DE-81B9-457692484CAD@cisco.com> <053b286e-4780-1818-a79d-71b9c967bbd2@sandelman.ca> <CAHbrMsANEA4omTm5dPYLN9zGde2YdT_71ujpBcCEer_xSkPhbw@mail.gmail.com> <CAFpG3gepojPJoK8W+o9Qr66gPSUqHY+sDX-v+-fuwcM9Y56C_g@mail.gmail.com> <20200911114054.184988dc@totoro.tlrmx.org> <CAFpG3gdRUAAYmvV1+m=+4_0GUd_SDS0hZHhpSXa2qQ6Civtf-g@mail.gmail.com> <CAHbrMsD=BOxYLaJyOkv-t9p+Cm4cEpOui7sQdL9Mmfi=Ufh3mA@mail.gmail.com> <7207C73E-FB80-4BD3-AE68-627355B10708@cisco.com> <CAHbrMsBLrGsg+beMhNadqs+QC9icOsGLxLJYGghEg339=c0b0Q@mail.gmail.com> <5F503ED8-38B0-414A-906A-FE8DCF94AC92@cisco.com> <CAFpG3gdcy2Drm+7j6M_oSfuG5VRH5qE+0nY8joZG3g9yszKf2Q@mail.gmail.com> <CAHbrMsBOhZ+sMxM3KJYT=OkZGzp_1GipkFpwxLKVBckXhDRt2Q@mail.gmail.com> <FFAAF9F3-CAB7-4AC1-A15B-4AF58345331D@cisco.com> <CACsn0cnphGR2dgLcUjWLDs+PvRjmF-7JA7JGjhambArOQGUC2w@mail.gmail.com>
In-Reply-To: <CACsn0cnphGR2dgLcUjWLDs+PvRjmF-7JA7JGjhambArOQGUC2w@mail.gmail.com>
From: Nick Harper <nharper@google.com>
Date: Tue, 15 Sep 2020 17:30:03 -0700
Message-ID: <CACdeXiLb8exX-x1RrqJFVNEf1Fck9_nwy48Ywigv2j9ifrxKiA@mail.gmail.com>
To: Watson Ladd <watsonbladd@gmail.com>
Cc: Eliot Lear <lear=40cisco.com@dmarc.ietf.org>, opsawg <opsawg@ietf.org>, "<tls@ietf.org>" <tls@ietf.org>, tirumal reddy <kondtir@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000000608ed05af635f7d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/NUR8xYKVs2EMBWcksK24VJRFFoM>
Subject: Re: [OPSAWG] [TLS] CALL FOR ADOPTION: draft-reddy-opsawg-mud-tls
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Sep 2020 00:30:17 -0000

I agree with EKR, Ben Schwartz, and Watson Ladd's concerns on this draft.

The grease_extension parameter shouldn't exist, and there should be no
special handling for GREASE values. GREASE doesn't need to be mentioned in
this draft, except to say that a client may send values (cipher suites,
extensions, named groups, signature algorithms, versions, key exchange
modes, ALPN identifiers, etc.) that are unknown to the middlebox and that
the middlebox MUST NOT reject connections with values unknown to the
middlebox. (This can be stated without mentioning GREASE specifically.)

There is also an issue where this draft does not describe how an observer
identifies whether a TLS ClientHello is compliant with a MUD profile.

On Tue, Sep 15, 2020 at 4:58 PM Watson Ladd <watsonbladd@gmail.com> wrote:

> On Tue, Sep 15, 2020, 9:10 AM Eliot Lear
> <lear=40cisco.com@dmarc.ietf.org> wrote:
> >
> >
> >
> > My concern is not with "new extensions" per se.  The hidden assumption
> here is that "extensions" are the only way TLS can evolve.  In fact, future
> TLS versions are not constrained to evolve in any particular way.  For
> example, future versions can introduce entirely new messages in the
> handshake, or remove messages that are currently visible in the handshake.
> QUIC is arguably just an extreme version of this observation.
> >
> >
> > I understand.  I used TLS extensions merely as an example.
>
> There is no reason that a firewall should expect to parse TLS 1.4. TLS
> 1.3 had to go through significant hoops due to middleboxes that
> assumed they could see into everything like it was 1.2. This easily
> added a year to the development time. The final hunt for incompatible
> devices involved attempting to purchase samples, with no real
> guarantee that they would find an intolerant device. Encouraging this
> sort of behavior is a bad idea IMHO, as it will substantially burden
> the TLS WG when designing TLS 1.4 in all sorts of unexpected ways.
>
> >
> >
> > Even within the realm of ClientHello extensions, there is significant
> inflexibility here.  For example, consider the handling of GREASE
> extensions.  GREASE uses a variety of reserved extension codepoints,
> specifically to make sure that no entity is attempting to restrict use of
> unrecognized extensions.  This proposal therefore has to add a flag
> declaring whether the client uses GREASE, because otherwise the set of
> extensions is dynamic, and the number of potential codepoints is
> impractically large.  Any change to the way GREASE selects and rotates
> extension codepoints would therefore require a revision of this YANG model
> first.  There has also been discussion of adding GREASE-type behavior to
> the "supported_versions" extension; that would similarly require a revised
> YANG model here.
> >
> >
> > Probably greasing is something that needs a certain special handling.
> Indeed that’s a form of fingerprinting (greases field XYZ).
>
> The whole point of grease is keeping extensions open. Coding special
> handling defeats the purpose.
>
> Sincerely,
> Watson Ladd
>
> >
> > Eliot
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>