Re: [Spud] network/middle boxes information

Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch> Mon, 30 March 2015 18:34 UTC

Return-Path: <mirja.kuehlewind@tik.ee.ethz.ch>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 08F161A923C for <spud@ietfa.amsl.com>; Mon, 30 Mar 2015 11:34:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level:
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tOzIWfL2mzjo for <spud@ietfa.amsl.com>; Mon, 30 Mar 2015 11:34:02 -0700 (PDT)
Received: from smtp.ee.ethz.ch (smtp.ee.ethz.ch [129.132.2.219]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB9FC1AC3A1 for <spud@ietf.org>; Mon, 30 Mar 2015 11:34:01 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by smtp.ee.ethz.ch (Postfix) with ESMTP id 5F3EBD931B; Mon, 30 Mar 2015 20:34:00 +0200 (MEST)
X-Virus-Scanned: by amavisd-new on smtp.ee.ethz.ch
Received: from smtp.ee.ethz.ch ([127.0.0.1]) by localhost (.ee.ethz.ch [127.0.0.1]) (amavisd-new, port 10024) with LMTP id CUO4fJBOZSLV; Mon, 30 Mar 2015 20:34:00 +0200 (MEST)
Received: from [10.21.66.96] (unknown [68.65.174.174]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: mirjak) by smtp.ee.ethz.ch (Postfix) with ESMTPSA id 91532D9307; Mon, 30 Mar 2015 20:33:59 +0200 (MEST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2070.6\))
From: =?utf-8?Q?Mirja_K=C3=BChlewind?= <mirja.kuehlewind@tik.ee.ethz.ch>
In-Reply-To: <1FEB0782-16E8-4AE0-8FF5-2B824EF89F24@ericsson.com>
Date: Mon, 30 Mar 2015 11:33:54 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <C91E2670-1664-4372-8B62-B919005CA44F@tik.ee.ethz.ch>
References: <1FEB0782-16E8-4AE0-8FF5-2B824EF89F24@ericsson.com>
To: Salvatore Loreto <salvatore.loreto@ericsson.com>
X-Mailer: Apple Mail (2.2070.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/48gDB9gHtvwKNYf8-BDSmTb5Hto>
Cc: "spud@ietf.org" <spud@ietf.org>
Subject: Re: [Spud] network/middle boxes information
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Mar 2015 18:34:04 -0000

Hi Salvatore,

we are currently focusing on use case where you ‚may trust but verify‘ (see constraints). If you want to establish an explicit trust relationship with the middlebox, I personally thing that is currently out of scope. I believe there is information that both, middle and end, are willing to release without a trust relation and which could already provide useful input to e.g. better support certain app requirements. Often these kind of information is already available today by DPI (or at least assumptions are taken based on DPI, which might or might not be true). Providing control which information should be exposed (while encrypting the rest) actually provides better control of information leakage and privacy than we often have today. Further, as these information are only declarative, you can anyway never rely on them: that means you should for all your action always take into account that the information might be wrong (or alter by another entity). However, having some information as a starting point is very often extremely useful, if the alternative is having no information at all.

That’s just my view on scoping.

Mirja

 
> Am 25.03.2015 um 12:27 schrieb Salvatore Loreto <salvatore.loreto@ericsson.com>om>:
> 
> 
> During the open discussion Andrew expressed the fact that the networks have a lot of information
> that can be of interest (or even useful) to the end points (we have seen a proof of this already in tsvwg yesterday).
> 
> I want make clear that privacy and security is also important the network not only for the endpoints.
> We have to make sure that the middle box that is requested to share some info with the endpoint
> can do that in a secure/encrypted way (i.e. be able to decide who will be able to see the info in clear)
> 
> br
> Salvatore
> _______________________________________________
> Spud mailing list
> Spud@ietf.org
> https://www.ietf.org/mailman/listinfo/spud