[Privacy-pass] Fwd: New Version Notification for draft-schwartz-ohai-consistency-doublecheck-03.txt

Ben Schwartz <bemasc@google.com> Wed, 19 October 2022 20:16 UTC

Return-Path: <bemasc@google.com>
X-Original-To: privacy-pass@ietfa.amsl.com
Delivered-To: privacy-pass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2035EC1524D9 for <privacy-pass@ietfa.amsl.com>; Wed, 19 Oct 2022 13:16:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.607
X-Spam-Level:
X-Spam-Status: No, score=-17.607 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cxnlePQj_Y35 for <privacy-pass@ietfa.amsl.com>; Wed, 19 Oct 2022 13:16:46 -0700 (PDT)
Received: from mail-il1-x12f.google.com (mail-il1-x12f.google.com [IPv6:2607:f8b0:4864:20::12f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 274DCC152593 for <privacy-pass@ietf.org>; Wed, 19 Oct 2022 13:14:18 -0700 (PDT)
Received: by mail-il1-x12f.google.com with SMTP id g13so9819481ile.0 for <privacy-pass@ietf.org>; Wed, 19 Oct 2022 13:14:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=zWQlsNt/FQ8KL01rproOq0DNqLm/omi9B9VTSpw19vM=; b=m+FNh19LRoHvl7+nQmEzIht32W04C6MOMEcC5r/DpJIFLXGrVsSDIJsvjErFYi2ZIE EUZd4xT5KUZjZHy0wVMmS1tznelvx1u7LeRgCeU8vIpPtSMwDPgP9TFYOSOF++syGpl6 5Fk5gCDcielZKu/AeLbrAHLL6oEwK515O5AJ/q/siok3YuieIPAqZCTnGEVxpTQVXHiB uz9rKRysPkHy41NwECkDfbfXIjlz94lZymNLS4h/xUeIqa538QM0d2E6QVgZwWZPYu6R OZ8GZBL2Hac3GpUuattdXrJuNSW3PUSijAetSwFU9Lnjdte4jfgjsKL8CB7pHtUFlSGd ZQaw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=zWQlsNt/FQ8KL01rproOq0DNqLm/omi9B9VTSpw19vM=; b=7qG/GpcDip5R0dUPiyoF6O5SjpaF6Ky1p8uHcq8TRFB2qlX0thVv+vYYxcrGrk7Tka abXwrpI+dHzdMk9Z0hQbQhnjqdWRwe48ac/S8bfrG8XmETCL5Fvuk0QDiddaqO39GKCM UNhv6wX4BiCPJFVnsQckWHnmZYofJXJ2kBb3rgs3LDTyVEi8td3I7GAsnfejTF0ZDfdY oFzQjo0SCwlTvX+TBGOTfb1ZRRjdb6lwb+RZI1aBwUgPf7SQOiGwgGkwVOG6gNbUSgF8 fVTZTPPxp3IKx9/YICPrOHdT78RjotA+um1qmLtUMpdnbliLkiHPTZg9CesPhpCN6Ee/ n4LQ==
X-Gm-Message-State: ACrzQf0rHokdqbnkGcLt6L7RPNWCvwp8t3KroiAWJLkMFZ5IWLwBDv5Z imqJKbA1O2nJbrI7vPxMUNOGB0oKZi9hILjnDqcpe8n+mRKitw==
X-Google-Smtp-Source: AMsMyM5WKKuFbqt/S9UV77Pk+OUSzvnazSnttD/FKjnozVYwq5NscM5TUPPSxEiGCkOxhCkXArwdpJV95PcjVtLN4DQ=
X-Received: by 2002:a05:6e02:15c9:b0:2e1:a5b6:7e25 with SMTP id q9-20020a056e0215c900b002e1a5b67e25mr6743262ilu.185.1666210456998; Wed, 19 Oct 2022 13:14:16 -0700 (PDT)
MIME-Version: 1.0
References: <166620948548.40913.9820980135582975290@ietfa.amsl.com>
In-Reply-To: <166620948548.40913.9820980135582975290@ietfa.amsl.com>
From: Ben Schwartz <bemasc@google.com>
Date: Wed, 19 Oct 2022 16:14:03 -0400
Message-ID: <CAHbrMsDWTexrdKuzYeG7_RBXE2TLUMxT5gmA+GWT+x=cdsDmrw@mail.gmail.com>
To: ohai@ietf.org, privacy-pass@ietf.org
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="0000000000007066bb05eb68dad5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/privacy-pass/BaKmsXiQBnvkcnmGkcEn3B5sw9w>
Subject: [Privacy-pass] Fwd: New Version Notification for draft-schwartz-ohai-consistency-doublecheck-03.txt
X-BeenThere: privacy-pass@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Privacy Pass Protocol <privacy-pass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/privacy-pass/>
List-Post: <mailto:privacy-pass@ietf.org>
List-Help: <mailto:privacy-pass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2022 20:16:49 -0000

Hello OHAI and PRIVACYPASS,

This revision of the DoubleCheck draft makes extensive changes based on
feedback from the last session and subsequent discussions:

* The draft no longer has a normative dependency on
draft-schwartz-masque-access-descriptions or OHTTP.
* The draft no longer recommends CONNECT-UDP over CONNECT.
* The "MUST" requirement to provide and use a transport proxy has been
reduced to SHOULD, with explanation about the risks if one is not used.
* The introduction has been expanded to describe how this procedure might
be useful for both OHTTP and Privacy Pass.
* The example (Section 5) has been adjusted to make use of
draft-pauly-ohai-svcb-config.
* The draft introduces its own capitalized terminology for the three
parties, similar to OHTTP and Privacy Pass.

The protocol itself has not changed since the previous revision.

I would like to present this revision at IETF 115 if possible.

Good topics for feedback:

* Is this bending HTTP Cache-Control semantics too far?
* Is there any way to solve the Thundering Herd problem (Section 6.2) using
only HTTP caching directives?
* Which working group would be best to discuss this?

--Ben Schwartz

---------- Forwarded message ---------
From: <internet-drafts@ietf.org>
Date: Wed, Oct 19, 2022 at 3:58 PM
Subject: New Version Notification for
draft-schwartz-ohai-consistency-doublecheck-03.txt
To: Benjamin M. Schwartz <bemasc@google.com>



A new version of I-D, draft-schwartz-ohai-consistency-doublecheck-03.txt
has been successfully submitted by Benjamin Schwartz and posted to the
IETF repository.

Name:           draft-schwartz-ohai-consistency-doublecheck
Revision:       03
Title:          Key Consistency by Double-Checking via a Semi-Trusted Proxy
Document date:  2022-10-19
Group:          Individual Submission
Pages:          15
URL:
https://www.ietf.org/archive/id/draft-schwartz-ohai-consistency-doublecheck-03.txt
Status:
https://datatracker.ietf.org/doc/draft-schwartz-ohai-consistency-doublecheck/
Html:           https://www.ietf.org/archive/id/draft-schwartzAs the draft
is more general-ohai-consistency-doublecheck-03.html
<https://www.ietf.org/archive/id/draft-schwartz-ohai-consistency-doublecheck-03.html>
Htmlized:
https://datatracker.ietf.org/doc/html/draft-schwartz-ohai-consistency-doublecheck
Diff:
https://www.ietf.org/rfcdiff?url2=draft-schwartz-ohai-consistency-doublecheck-03

Abstract:
   Several recent IETF privacy protocols require clients to acquire
   bootstrap information for a service in a way that guarantees both
   authenticity and consistency, e.g., encrypting to the same key as
   many other users.  This specification defines a procedure for
   transferring arbitrary HTTP resources in a manner that provides these
   guarantees.  The procedure relies on access to a semi-trusted HTTP
   proxy, under the same security assumptions as an Oblivious HTTP
   Relay.




The IETF Secretariat