Re: [secdir] [Taps] Secdir last call review of draft-ietf-taps-minset-06
Tommy Pauly <tpauly@apple.com> Mon, 27 August 2018 15:53 UTC
Return-Path: <tpauly@apple.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0542D130E06; Mon, 27 Aug 2018 08:53:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level:
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M9sc1t_fqbpV; Mon, 27 Aug 2018 08:53:22 -0700 (PDT)
Received: from nwk-aaemail-lapp02.apple.com (nwk-aaemail-lapp02.apple.com [17.151.62.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0648124C04; Mon, 27 Aug 2018 08:53:18 -0700 (PDT)
Received: from pps.filterd (nwk-aaemail-lapp02.apple.com [127.0.0.1]) by nwk-aaemail-lapp02.apple.com (8.16.0.22/8.16.0.22) with SMTP id w7RFq5Ie025250; Mon, 27 Aug 2018 08:53:18 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=mime-version : content-transfer-encoding : content-type : sender : subject : from : in-reply-to : date : cc : message-id : references : to; s=20180706; bh=ROZI3Odd4tmwNnZ+nqorC2+13ZVhYV7P7Hcah4MGPSc=; b=OcfQ9rklCMw+FDBBdJFhEiNUmJGClwF8tQY2jJMyV9GeZ9FmvGC6/lznSjTMPMbdv9c6 NlnUZLoqJRCGYb15X+AbeR0wgG8vfK42lEef4VS0/PtKT2+fhvnzpZwbd7vp1ESLPpYd Ciq3Y7ikG3BUijNnctiILL/tjQJM2PS6MqyRqYo1KezAnLWYFBxYknxCMaO7IgeI9lIc p1uJ8KbKy5d126ohgccnFxKqSNqXxbDiQIlW/ctKMsnHcCbFoMFG4TUqBzlr1zMiKKHo vgctu3wrp3o7aSOocRe0a0OBNhV8FVsZr3IIPQpUUDwrFZmIiYNT8715CMSAbxqTxhxV Yw==
Received: from ma1-mtap-s02.corp.apple.com (ma1-mtap-s02.corp.apple.com [17.40.76.6]) by nwk-aaemail-lapp02.apple.com with ESMTP id 2m33pk4mbe-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Mon, 27 Aug 2018 08:53:18 -0700
MIME-version: 1.0
Content-transfer-encoding: 7bit
Content-type: text/plain; CHARSET="US-ASCII"
Received: from nwk-mmpp-sz13.apple.com (nwk-mmpp-sz13.apple.com [17.128.115.216]) by ma1-mtap-s02.corp.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) with ESMTPS id <0PE4006F7MST6H90@ma1-mtap-s02.corp.apple.com>; Mon, 27 Aug 2018 08:53:17 -0700 (PDT)
Received: from process_viserion-daemon.nwk-mmpp-sz13.apple.com by nwk-mmpp-sz13.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) id <0PE400900LSPQ900@nwk-mmpp-sz13.apple.com>; Mon, 27 Aug 2018 08:53:17 -0700 (PDT)
X-Va-A:
X-Va-T-CD: c3998f68f5443d99dad98dff2fd2f9f7
X-Va-E-CD: cbfa0b2259f11418691e1c39b70cf19c
X-Va-R-CD: 8b3096eb4796fec17348c9603c905ec8
X-Va-CD: 0
X-Va-ID: d09a0160-010d-4011-b194-829eeaf178bd
X-V-A:
X-V-T-CD: c3998f68f5443d99dad98dff2fd2f9f7
X-V-E-CD: cbfa0b2259f11418691e1c39b70cf19c
X-V-R-CD: 8b3096eb4796fec17348c9603c905ec8
X-V-CD: 0
X-V-ID: 10a73a85-f8e7-4f70-b28d-c956685972b0
Received: from process_milters-daemon.nwk-mmpp-sz13.apple.com by nwk-mmpp-sz13.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) id <0PE400900LS0MJ00@nwk-mmpp-sz13.apple.com>; Mon, 27 Aug 2018 08:53:16 -0700 (PDT)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-27_06:,, signatures=0
X-Proofpoint-Scanner-Instance: nwk-grpmailp-qapp14.corp.apple.com-10000_instance1
Received: from tpauly.scv.apple.com (tpauly.scv.apple.com [17.192.171.37]) by nwk-mmpp-sz13.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) with ESMTPSA id <0PE400KZ4MSS5X10@nwk-mmpp-sz13.apple.com>; Mon, 27 Aug 2018 08:53:16 -0700 (PDT)
Sender: tpauly@apple.com
From: Tommy Pauly <tpauly@apple.com>
In-reply-to: <153534622572.11764.16971261463087249495@ietfa.amsl.com>
Date: Mon, 27 Aug 2018 08:53:16 -0700
Cc: secdir@ietf.org, draft-ietf-taps-minset.all@ietf.org, ietf@ietf.org, taps@ietf.org
Message-id: <11A6EDDC-06EE-47E5-B61B-ED6F7B5999A6@apple.com>
References: <153534622572.11764.16971261463087249495@ietfa.amsl.com>
To: Yaron Sheffer <yaronf.ietf@gmail.com>
X-Mailer: Apple Mail (2.3445.100.21)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-08-27_06:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/gVj5Oo56yRKi7XTFIpuLN6rFhfY>
Subject: Re: [secdir] [Taps] Secdir last call review of draft-ietf-taps-minset-06
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Aug 2018 15:53:24 -0000
Hi Yaron, This minimal set is a description of the surface that any generic API must have to cover the common *transport* features of protocols only. This document is not meant in itself to describe an API that applications use directly, but instead describe the distilled feature set from transport services (such as reliable/unreliable sending, etc). To that end, it essentially describes what you need to be able to use basic things like TCP, UDP, etc. Even without security considered, this distillation is a non-trivial task, thus it required this document. The security document that is referenced (draft-ietf-taps-transport-security) provides a similar survey and distillation for how transport security interfaces add more surface to control and interact with handshake and record layers used on top of/in conjunction with the base transport. The set of documents that actually describe the API surface that we want applications to use (draft-ietf-taps-arch, draft-ietf-taps-api, draft-ietf-taps-interface, draft-ietf-taps-impl) does indeed provide a unified abstraction for a secure transport connection. However, this surface depends upon both the distillation from draft-ietf-taps-minset and draft-ietf-taps-transport-security. There is no intention of promoting insecure connections for applications. Thanks, Tommy > On Aug 26, 2018, at 10:03 PM, Yaron Sheffer <yaronf.ietf@gmail.com> wrote: > > Reviewer: Yaron Sheffer > Review result: Not Ready > > The whole notion of TAPS is new to me, so I may be missing the point here. This > document defines a minimal set of network APIs that should be available to > applications, in order to allow multiple different transport protocols to be > used as interchangeable plug-ins with minimal or no change to applications. > > However the document does not cover security, and instead refers readers to a > security protocol survey (draft-ietf-taps-transport-security). > > There's a disconnect here: in many cases we want applications to be aware of > security features. For example, a typical TCP-using application should choose > whether to enable TLS encryption of the connection (or as a receiver, whether > to require encryption), and if TLS is selected, should at the very least > receive access to the authenticated address of the connection's peer. In other > words, a meaningful minimal set of APIs cannot be defined without considering > the effects and requirements of security protocols. > > Put differently, the application normally treats the transport protocol and the > security protocol layered on it as one protocol. Hence the old name of TLS: > Secure Socket Layer. The application sees a single socket, not one socket for > transport and another for security. This has been the case for TCP for the last > 20-odd years, and is unlikely to change any time soon. > > I have not surveyed the protocols discussed in this draft, and I don't know > whether a viable transport-level security protocol exists for each of them. If > this is not the case, then I guess the industry is not yet ready for the kind > of solution proposed here. > > _______________________________________________ > Taps mailing list > Taps@ietf.org > https://www.ietf.org/mailman/listinfo/taps
- [secdir] Secdir last call review of draft-ietf-ta… Yaron Sheffer
- Re: [secdir] [Taps] Secdir last call review of dr… Tommy Pauly
- Re: [secdir] [Taps] Secdir last call review of dr… Benjamin Kaduk
- Re: [secdir] [Taps] Secdir last call review of dr… Aaron Falk
- Re: [secdir] [Taps] Secdir last call review of dr… Yaron Sheffer