Re: [OPSEC] AD Review of: draft-ietf-opsec-probe-attribution
Warren Kumari <warren@kumari.net> Tue, 30 May 2023 13:46 UTC
Return-Path: <warren@kumari.net>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 190D4C15E406 for <opsec@ietfa.amsl.com>; Tue, 30 May 2023 06:46:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.086
X-Spam-Level:
X-Spam-Status: No, score=-2.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=kumari.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PluDkcmA3vu0 for <opsec@ietfa.amsl.com>; Tue, 30 May 2023 06:46:48 -0700 (PDT)
Received: from mail-qt1-x830.google.com (mail-qt1-x830.google.com [IPv6:2607:f8b0:4864:20::830]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F00B4C13AE30 for <opsec@ietf.org>; Tue, 30 May 2023 06:45:56 -0700 (PDT)
Received: by mail-qt1-x830.google.com with SMTP id d75a77b69052e-3f6affdb6ddso49874491cf.0 for <opsec@ietf.org>; Tue, 30 May 2023 06:45:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kumari.net; s=google; t=1685454355; x=1688046355; h=cc:to:subject:message-id:date:from:references:in-reply-to :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=OLcYV23YOuQHrakfYQ4nfMuOIXpd2xopFJI8qGy6Sh0=; b=fK2+C/B6y+vgKfXIpt1F1rEnGxkdrgfVF4BwFFd6h4gPiExZFko7fkkYa1HdHS7acq NdS48tDydpp4cCcxwO+LNREbj5DHekQ/ZuIDZ+ROQ7EjcSzAsPGcuYos1lZWbEs+kMWk qZhkA/7nTdpoMIBNPkxp46nWPTqQ5SaL1/CEsv0duh6zo184uUnR5PIfNH+I014VwjHB 8oE5p7WajuMJldCaqm33haOgJy6Xbzx5wWM96mSbLeLjJH1ckCQoYj8H+MeQclBkrbb9 U91ZJeZ11aL9ogOZJysdcXzi4/OJPob861K/7hEi0hQ5ljpl4oLClGXFnENa/DrGKEAe xasg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685454355; x=1688046355; h=cc:to:subject:message-id:date:from:references:in-reply-to :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=OLcYV23YOuQHrakfYQ4nfMuOIXpd2xopFJI8qGy6Sh0=; b=ijuwiPvyXDJSsaEN5D8D+4lKOEjSqxr5mPoGKVRy7cWpXsVvYnqsKOe7wdSvItqTcZ NwrWZS5X2C3iNO0pKWPRY0GB8/TpzNNbUW4HmQzBn61QZtrPHr0y9fwluBuMNW5k4Ob8 I4mXtWtrCFF/y5ZTSv5qfPt4gZf18QkUPwTW7Oi3eYig3+JfJsyF2i1CrMf0Ig30/UsG +MFkFvvkB9m2BY4NeQdPkejlZcyBwIpHHdCgply8TKcOwCodwZNWN3VvcOm6SsWt331b MLo0HLMtgAJOI5Eo+rXShBul0OLFMTNjB+I3BEPMsEYZ5PlqPZI9Rw3ZyWLIf7ylyZaU y9dA==
X-Gm-Message-State: AC+VfDzJYtxSFy4m+mbhvQLJYvICfry8SqWV0HZF0Oi48jepADknAU8Y HEoD1GwTG+FB9ZnJxHBZaXk4MlW1l6/Q4RwHai/qXQ==
X-Google-Smtp-Source: ACHHUZ4QuGua59D3erwluBChslX3gUwroUUfLzTGh1MLJRad5jkzADE43v8pdYY0z4V+e5Be8axCLL9bbv0FKQu+BVE=
X-Received: by 2002:a05:622a:5c6:b0:3f5:1f13:a70b with SMTP id d6-20020a05622a05c600b003f51f13a70bmr1962797qtb.67.1685454355217; Tue, 30 May 2023 06:45:55 -0700 (PDT)
Received: from 649336022844 named unknown by gmailapi.google.com with HTTPREST; Tue, 30 May 2023 06:45:54 -0700
Mime-Version: 1.0
X-Superhuman-ID: liabzre2.d3d60e02-ff5f-4bef-ad53-76308a373b42
In-Reply-To: <04030c06-5b41-6c16-aa91-bd0cf7903bc3@uliege.be>
References: <CAHw9_iJmKnVf8xmh1R4WKxRCoxQtgtB6G1VwPa54m2qiVmF3bw@mail.gmail.com> <04030c06-5b41-6c16-aa91-bd0cf7903bc3@uliege.be>
From: Warren Kumari <warren@kumari.net>
X-Mailer: Superhuman Desktop (2023-05-26T19:06:02Z)
X-Superhuman-Draft-ID: draft0092531b6ef1c997
Date: Tue, 30 May 2023 06:45:54 -0700
Message-ID: <CAHw9_iLVTRNyVLUN6e_KFoxkXbbDTFusaWW_1r9izFsJjVmVxw@mail.gmail.com>
To: Justin Iurman <justin.iurman@uliege.be>
Cc: draft-ietf-opsec-probe-attribution@ietf.org, opsec wg mailing list <opsec@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000020d40805fce96c3a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsec/QOAqTh_4ngmp8PgY7qfoyUXQBAU>
Subject: Re: [OPSEC] AD Review of: draft-ietf-opsec-probe-attribution
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 May 2023 13:46:53 -0000
On Mon, May 22, 2023 at 11:42 AM, Justin Iurman <justin.iurman@uliege.be> wrote: > Hi Warren, > > Thanks for that, I'll publish the revision right after your confirmation > (for the security question). Please see inline ([JI] tag). > > On 5/20/23 22:02, Warren Kumari wrote: > > Hi there, authors (and WG), > > Thank you for this document. In general I found it clear, useful, and an > easy read. > > I do have a few comments/nits; addressing these now should help the IETF > LC and IESG evaluation go more smoothly. > > The majority of these are simply readability comments, but it does end > with a more important question… > > Please SHOUT loudly once you've had a chance to address these, and I'll > start IETF LC. > S1: > O: "Active measurements at Internet-scale can target either collaborating > parties or non-collaborating ones." > P: "Active measurements can target either collaborating > parties or non-collaborating ones." > C: Even at none Internet-scale the target can be collaborating, or not. > > [JI] Applied 2 times (abstract and intro). > > O: "This document suggests some simple techniques allowing any party or > organization to understand:" > P: "This document suggests some simple techniques to allow any party or > organization to understand:" > C: Flow / grammar. > > [JI] Applied. > > O: "Note: it is expected that only researchers with no bad intentions will > use these techniques, although anyone might use them. This is discussed in > Section 7." > C: "with no bd intentions" seems a bit clunky - perhaps "with good > intentions" instead? > > [JI] Applied 2 times ("with good intentions"). > > S4: > O: "This could be: > * thing > * other thing > * more other thing > * etc." > P: "Examples of this include: > * thing > * other thing > * more other thing" > C: Having 'etc' as it's own bullet seems somewhat odd. > > [JI] Applied ("etc" bullet removed). > > O: "The probe description URI should start at the first octet of the > payload and should be terminated by an octet of 0x00, i.e., it must be null > terminated." > C: So, which is it? It should be null terminated. or it must be null > terminated? > > [JI] Good catch! Applied ("must" for all). > > S5: > O: "The advantage of using the in-band technique is to cover the cases > where the out-of-band technique is not possible, as listed above." P: > "The primary advantage of using the in-band technique is that it covers the > cases where the out-of-bounds technique is not feasible (as > > [JI] you probably meant out-of-band, right? :-D > Stoopid autocorrect :-P > described above)" > C: Readability. > > [JI] Applied. > > P: "The primary disadvantage is that it potentially biases the > measurements, since packets with the Probe Description URI might be > discarded." > C: Readability > > [JI] Applied. > > S6: > O: "Executing some measurement experiences over the global Internet > obviously require some ethical considerations when transit/ > destination non-solicited parties are involved." P: "Executing > measurement experiments over the global Internet > obviously requires ethical consideration, especially when transit/ > destination non-solicited parties are involved." C: Readability. > > [JI] Applied (+ s/non-solicited/unsolicited/g). > > S7: Security Considerations > C: I wonder if this should speak more about "false flag" operations? I > send 1Mpps, and include a probe-attribution saying that I'm Eric Vynke, at > +1-212-555-1212?? Suddenly you have hundreds of irate network admins > calling you at 3AM.... > > [JI] What about: > > [JI] OLD: "This information is provided to identify the source and intent > of specific probes, but there is no authentication possible for the inline > information. As a result, a malevolent actor could provide false > information while conducting the probes, so that the action is attributed > to a third party. As a consequence, the recipient of this information > cannot trust this information without confirmation. If a recipient cannot > confirm the information or does not wish to do so, it should treat the > flows as if there were no attribution." > > [JI] NEW: "This information is provided to identify the source and intent > of specific probes, but there is no authentication possible for the inline > information. Therefore, a malevolent actor could provide false information > while conducting the probes, so that the action is attributed to a third > party. In that case, not only this third party would be wrongly accused, > but it might also be exposed to unwanted solicitations (e.g., angry emails > or phone calls, if the malevolent actor used someone else's email address > or phone number). As a consequence, the recipient of this information > cannot trust it without confirmation. If a recipient cannot confirm the > information or does not wish to do so, it should treat the flows as if > there were no attribution." > > Thank you again; I know that making edits to address nits can be annoying, > but we are expecting many people to read and review the document, and so > having it polished is important and polite (also, once people start > commenting on nits, they seem to continue :-) ) > > Thank you, works for me! W > [JI] Thank YOU! > Justin > > W > >
- [OPSEC] AD Review of: draft-ietf-opsec-probe-attr… Warren Kumari
- Re: [OPSEC] AD Review of: draft-ietf-opsec-probe-… Justin Iurman
- Re: [OPSEC] AD Review of: draft-ietf-opsec-probe-… Warren Kumari