[Spud] SPUD Scope?
Szilveszter Nadas <Szilveszter.Nadas@ericsson.com> Thu, 04 June 2015 16:30 UTC
Return-Path: <Szilveszter.Nadas@ericsson.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id C9DFA1A90AC
for <spud@ietfa.amsl.com>; Thu, 4 Jun 2015 09:30:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.301
X-Spam-Level:
X-Spam-Status: No, score=-2.301 tagged_above=-999 required=5
tests=[BAYES_20=-0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3,
SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id nuHZ82XLRluo for <spud@ietfa.amsl.com>;
Thu, 4 Jun 2015 09:30:03 -0700 (PDT)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37])
(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 4BCD81A9155
for <spud@ietf.org>; Thu, 4 Jun 2015 09:28:38 -0700 (PDT)
X-AuditID: c1b4fb25-f79b66d000001131-4e-55707cb44790
Received: from ESESSHC012.ericsson.se (Unknown_Domain [153.88.253.125])
by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id
FF.53.04401.4BC70755; Thu, 4 Jun 2015 18:28:36 +0200 (CEST)
Received: from ESESSMB303.ericsson.se ([169.254.3.142]) by
ESESSHC012.ericsson.se ([153.88.183.54]) with mapi id 14.03.0210.002; Thu, 4
Jun 2015 18:28:36 +0200
From: Szilveszter Nadas <Szilveszter.Nadas@ericsson.com>
To: "spud@ietf.org" <spud@ietf.org>
Thread-Topic: SPUD Scope?
Thread-Index: AdCe42kWUfK3mg2YQc2lRPihacOmIw==
Date: Thu, 4 Jun 2015 16:28:34 +0000
Message-ID: <EA4C43BE752A194597B002779DF69BAE23D47A3E@ESESSMB303.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [153.88.183.16]
Content-Type: multipart/alternative;
boundary="_000_EA4C43BE752A194597B002779DF69BAE23D47A3EESESSMB303erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrOLMWRmVeSWpSXmKPExsUyM+Jvre6WmoJQg0mfZS0WXXjK6MDosWTJ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Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/2e20LavQkmiAtQ4Sh9ZkwUHNyT0>
Subject: [Spud] SPUD Scope?
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>,
<mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>,
<mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jun 2015 16:30:10 -0000
Hi all, I browsed through the mails since last ietf the other day, and I have seen quite big variety in the scope of SPUD in the different mails. The rage looked like this to me on a high level: a) only start/stop, hide everything in DTLS b) Some declarative, safe to ignore, trust but verify markings are OK, but it shall be minimized. c) "common, middlebox friendly connection/packet signaling layer", extensibility, any communication and behavior is OK as long as it is explicit. I am personally closest to group c), still I understand that this is far from the average view and that it would be pretty hard to reach a consensus regarding this. I think that it is very hard to "replace DPI" with easy to verify info (assuming encrypted payload) and with declarations with very light consequences. One can argue that middleboxes shall never be able to have that detailed knowledge ever again, still if we embrace the role of middleboxes we probably need more than a) or b). I completely agree that all kind of signaling shall be safe to ignore and in a normal case ignoring a signal should not result in denial of the service but rather result in some kind of default behavior. I also think that signaling shall not result on delayed start of the connection (usually it is enough to change handling later on, no real reason to delay the start) However I do not really see problems with one of the end-point accepting an offer of a middlebox and communicating with the middlebox with a proprietary vocabulary. SPUD is clearly a good way to offer these improvements to end-hosts. Whether the follow up communication is using SPUD as a sub-transport for the signaling conversation or not is a question. Also this communication (when accepted) might have consequences, e.g. some change in charging. Obviously some kind of security solution is needed to authenticate the middlebox and the end-point, which is far from trivial. At the same time even with the above assumptions, it is not quite clear how something like this can happen. I really like the philosophy of the "Tussle in Cyberspace" article. Things like "Do not design so as to dictate the outcome". Also the part about "Interfaces of tussle" and their "properties": "Visible exchange of value", "Exposure of cost of choice", "Visibility (or not) of choices made" and "Tools to resolve and isolate faults and failures". I think that if we want to cooperate with middleboxes these are very good guiding principles. I also think that many of us are actually biased towards trying to dictate the outcome. If we provide possibility to achieve a functionality in an explicit way is not it better than making network vendors to invent their own not so transparent solutions for the same? Assuming something like c) is not happening in SPUD where do you think it could/should happen? Cheers, Sz.
- [Spud] SPUD Scope? Szilveszter Nadas
- Re: [Spud] SPUD Scope? Daniel Kahn Gillmor
- Re: [Spud] SPUD Scope? Christian Huitema
- Re: [Spud] SPUD Scope? Szilveszter Nadas
- Re: [Spud] SPUD Scope? Daniel Kahn Gillmor
- Re: [Spud] SPUD Scope? Ken Calvert
- Re: [Spud] SPUD Scope? Daniel Kahn Gillmor
- Re: [Spud] SPUD Scope? Mirja Kühlewind
- Re: [Spud] SPUD Scope? FOSSATI, Thomas (Thomas)
- Re: [Spud] SPUD Scope? Szilveszter Nadas
- Re: [Spud] SPUD Scope? Daniel Kahn Gillmor
- Re: [Spud] SPUD Scope? Tom Herbert