Re: [saag] [tsvwg] Fwd: Last Call: <draft-ietf-tsvwg-transport-encrypt-19.txt> (Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols) to Informational RFC

Fernando Gont <fgont@si6networks.com> Thu, 11 February 2021 17:58 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 88B523A180E; Thu, 11 Feb 2021 09:58:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sdbumpY3Z2cE; Thu, 11 Feb 2021 09:58:19 -0800 (PST)
Received: from fgont.go6lab.si (fgont.go6lab.si [IPv6:2001:67c:27e4::14]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 341533A180D; Thu, 11 Feb 2021 09:58:18 -0800 (PST)
Received: from [IPv6:2800:810:464:2b9:4181:442:5061:d73f] (unknown [IPv6:2800:810:464:2b9:4181:442:5061:d73f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 608772809AE; Thu, 11 Feb 2021 17:58:14 +0000 (UTC)
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>, "Black, David" <David.Black@dell.com>, Fernando Gont <fernando@gont.com.ar>, Benjamin Kaduk <kaduk@mit.edu>, "saag@ietf.org" <saag@ietf.org>, "tsvwg@ietf.org" <tsvwg@ietf.org>
References: <161257199785.16601.5458969087152796022@ietfa.amsl.com> <20210210062551.GI21@kduck.mit.edu> <f1a1aaef-5400-89ca-fe26-786686800036@gont.com.ar> <MN2PR19MB4045B25A78B3C0841CC8EAFE838D9@MN2PR19MB4045.namprd19.prod.outlook.com> <2fb9d724-7f8a-93cd-9045-eb3852345a9e@erg.abdn.ac.uk>
From: Fernando Gont <fgont@si6networks.com>
Message-ID: <1416490d-6532-59ce-e09f-388db716af8f@si6networks.com>
Date: Thu, 11 Feb 2021 14:58:00 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <2fb9d724-7f8a-93cd-9045-eb3852345a9e@erg.abdn.ac.uk>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/XL6mydikG7f-clsbCWaZga5zwAg>
Subject: Re: [saag] [tsvwg] Fwd: Last Call: <draft-ietf-tsvwg-transport-encrypt-19.txt> (Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols) to Informational RFC
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Feb 2021 17:58:23 -0000

On 11/2/21 06:50, Gorry Fairhurst wrote:
[....]
>>
>> Some very specific comments on some parts:
>>
>> * Section 5.1:
>>
>>      For example, an
>>      endpoint that sends an IPv6 Hop-by-Hop option [RFC8200] can provide
>>      explicit transport layer information that can be observed and 
>> used by
>>      network devices on the path.
>>
>> This is not as easy as it sounds. If you convey this information in
>> multiple places (e.g. the transport protocol itself (that you cannot
>> see), and e.g. IPv6 options, then the two might not much -- and devices
>> could e.g. enforce a security policy on contents (e.g., the info in the
>> IPv6 options), that the destination endpoint might possibly e.g. ignore.
> 
> This sounds similar to the case of explicitly exposing other 
> information.

Yes. ANything where you have two copies of the same information, and 
different parties are likely to act on different copies, is prone to the 
same thing.

(I guess, unless you can enforce that the two match, and have a strong 
requirement that all parties check that, and otherwise drop the packet 
-- something that in practice, many don't)



> In this case, the network will make decisions on what it 
> sees or infers - without knowledge of the contents of the encrypted part 
> Would you like to propose some text to help explain this?

I'd be happy to. I'll craft text and come back to you on this one.




>> * Section 5.1:
>>
>>      Protocol methods can be designed to
>>      probe to discover whether the specific option(s) can be used along
>>      the current path, enabling use on arbitrary paths.
>>
>> This might be a problem of "English as a second language", but the above
>> text sounds to me like you can enable use of this feature on arbitrary
>> paths.... where's I'd probably argue that what you can do is to
>> *disable* the feature on paths where the feature cannot be used, such
>> that you may still communicate (albeit without using the aforementioned
>> feature).
>>
>> Another simpler fix might be s/arbitrary/specific/
> 
> The whole para currently reads:
> 
>     An arbitrary path can include one or more network devices that drop
>     packets that include a specific header or option used for this
>     purpose (see [RFC7872]).  This could impact the proper functioning of
>     the protocols using the path.  Protocol methods can be designed to
>     probe to discover whether the specific option(s) can be used along
>     the current path, enabling use on arbitrary paths.
> 
> I think this last sentence can indeed be improved, and I suggest 
> something like:
> 
>     Protocol methods can be designed to
>     probe to discover whether the specific option(s) can be used along
>     the current path, enabling or disabling their use on the path.
> 
> Is that better?

That's perfect, and indeed addressed my comment.

Thanks!

Regards,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492