Re: [saag] draft-smith-encrypted-traffic-management

"Smith, Kevin, (R&D) Vodafone Group" <Kevin.Smith@vodafone.com> Tue, 12 May 2015 15:25 UTC

Return-Path: <Kevin.Smith@vodafone.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E73BE1A8A42 for <saag@ietfa.amsl.com>; Tue, 12 May 2015 08:25:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xtGa-zAYFf_0 for <saag@ietfa.amsl.com>; Tue, 12 May 2015 08:25:16 -0700 (PDT)
Received: from mail1.bemta5.messagelabs.com (mail1.bemta5.messagelabs.com [195.245.231.139]) (using TLSv1.2 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B37421A8A3A for <saag@ietf.org>; Tue, 12 May 2015 08:25:15 -0700 (PDT)
Received: from [85.158.136.83] by server-3.bemta-5.messagelabs.com id F1/4C-03026-A5B12555; Tue, 12 May 2015 15:25:14 +0000
X-Env-Sender: Kevin.Smith@vodafone.com
X-Msg-Ref: server-8.tower-36.messagelabs.com!1431444313!6825007!1
X-Originating-IP: [195.232.244.136]
X-StarScan-Received:
X-StarScan-Version: 6.13.14; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 6053 invoked from network); 12 May 2015 15:25:14 -0000
Received: from mailout04.vodafone.com (HELO mailout04.vodafone.com) (195.232.244.136) by server-8.tower-36.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP; 12 May 2015 15:25:14 -0000
Received: from mailint03.vodafone.com (mailint03.vodafone.com [195.232.244.200]) by mailout04.vodafone.com (Postfix) with ESMTP id 3lmNHF5GpjznTbD for <saag@ietf.org>; Tue, 12 May 2015 17:25:13 +0200 (CEST)
Received: from mailint03.vodafone.com (localhost [127.0.0.1]) by mailint03.vodafone.com (Postfix) with ESMTP id 3lmNHF3jwjz16JC5 for <saag@ietf.org>; Tue, 12 May 2015 17:25:13 +0200 (CEST)
Received: from VOEXC01W.internal.vodafone.com (voexc01w.dc-ratingen.de [145.230.101.21]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mailint03.vodafone.com (Postfix) with ESMTPS id 3lmNHF3d9fz16J0g for <saag@ietf.org>; Tue, 12 May 2015 17:25:13 +0200 (CEST)
Received: from VOEXC16W.internal.vodafone.com (145.230.101.18) by VOEXC01W.internal.vodafone.com (145.230.101.21) with Microsoft SMTP Server (TLS) id 14.3.224.2; Tue, 12 May 2015 17:25:13 +0200
Received: from VOEXM17W.internal.vodafone.com ([169.254.1.66]) by voexc16w.internal.vodafone.com ([145.230.101.18]) with mapi id 14.03.0224.002; Tue, 12 May 2015 17:25:12 +0200
From: "Smith, Kevin, (R&D) Vodafone Group" <Kevin.Smith@vodafone.com>
To: "saag@ietf.org" <saag@ietf.org>
Thread-Topic: [saag] draft-smith-encrypted-traffic-management
Thread-Index: AQHQidFavQk8tPwQzkuWKI+Go6xoZZ14JXWQgABWeOA=
Date: Tue, 12 May 2015 15:25:11 +0000
Message-ID: <A4BAAB326B17CE40B45830B745F70F108E009045@VOEXM17W.internal.vodafone.com>
References: <A4BAAB326B17CE40B45830B745F70F108E0051CB@VOEXM17W.internal.vodafone.com> <554CDDD8.8010101@cs.tcd.ie> <1C9F17D1873AFA47A969C4DD98F98A752658DEB8@xmb-rcd-x10.cisco.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/pS4TuA2p0FzCyGZmYEMFFGRYjnE>
Subject: Re: [saag] draft-smith-encrypted-traffic-management
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 May 2015 15:25:18 -0000

Hi Panos,

Thanks for the feedback. I have added these as issues to the git repo at:

https://github.com/Kevsy/encrypted-traffic-management/

...and I will be releasing a revised version of the I-D with these suggestions (and others) incorporated in a couple of weeks.

All best
Kevin 

-----Original Message-----
From: Panos Kampanakis (pkampana) [mailto:pkampana@cisco.com] 
Sent: 08 May 2015 21:55
To: Smith, Kevin, (R&D) Vodafone Group; saag@ietf.org
Subject: RE: [saag] draft-smith-encrypted-traffic-management

Hi Kevin,
I just wanted to point out a couple of similar to SPUD options. The PCP Flowdata option that was proposed in https://tools.ietf.org/html/draft-wing-pcp-flowdata-00 is another option that operates in the same context of the endpoint communicating with the network to give context about the flows without compromising privacy. Also https://tools.ietf.org/html/draft-martinsen-tram-discuss-02 is in the same context viable only for UDP.
Panos




-----Original Message-----
From: saag [mailto:saag-bounces@ietf.org] On Behalf Of Stephen Farrell
Sent: Friday, May 08, 2015 12:01 PM
To: Smith, Kevin, (R&D) Vodafone Group; saag@ietf.org
Subject: Re: [saag] draft-smith-encrypted-traffic-management


Hi Kevin,

Thanks for writing that up. I think Kathleen's maybe travelling now (or just about to) so it might be a day or so but I'm sure she'll get back about possibly merging bits of this text with [4].

Cheers,
S.

On 08/05/15 16:35, Smith, Kevin, (R&D) Vodafone Group wrote:
> Dear all,
> 
> I've posted a draft on 'Network management of encrypted traffic' [1]. This follows up from the acknowledgement in both the 'Pervasive Monitoring is an attack' BCP [2] and the  IAB statement on Internet confidentiality [3] to strike a balance that allows non-intrusive network management to continue to operate. The aim of the draft is to list ways to enable this, including new work (such as SPUD) looking into the problem. As such it intends to provide privacy-aware solutions to the effects of encryption raised in [2].
> 
> All comments and feedback very welcome. Thanks for your time!
> 
> Kevin
> 
> Kevin Smith, Vodafone R&D
> 
> [1] 
> https://datatracker.ietf.org/doc/draft-smith-encrypted-traffic-managem
> ent/ [2] https://tools.ietf.org/html/rfc7258
> [3] 
> https://www.iab.org/2014/11/14/iab-statement-on-internet-confidentiali
> ty/ [4] https://datatracker.ietf.org/doc/draft-mm-wg-effect-encrypt/
> 
> 
> 
> _______________________________________________
> saag mailing list
> saag@ietf.org
> https://www.ietf.org/mailman/listinfo/saag
> 
> 

_______________________________________________
saag mailing list
saag@ietf.org
https://www.ietf.org/mailman/listinfo/saag