Re: [Spud] [Stackevo-discuss] Fwd: Possible WG-forming follow-on to SPUD BoF

Toerless Eckert <eckert@cisco.com> Fri, 20 May 2016 15:09 UTC

Return-Path: <eckert@cisco.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65FB812B018 for <spud@ietfa.amsl.com>; Fri, 20 May 2016 08:09:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.947
X-Spam-Level:
X-Spam-Status: No, score=-15.947 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.426, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kejilKrZeWUS for <spud@ietfa.amsl.com>; Fri, 20 May 2016 08:09:39 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8FA1D12D1CA for <spud@ietf.org>; Fri, 20 May 2016 08:09:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=23755; q=dns/txt; s=iport; t=1463756979; x=1464966579; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=hSyzV7cswXgOy5p1LSqIOeKPDWcMudAbLVsuvQE7FiA=; b=ObZgQ17xeYksfsMNuAL+LkbZmo//5k1MZTa4vo6onWtdRqY8ZsxroMAj fjRio1RP6QgZG+e1n5obZ/8oELD6Ld5kpwzIy7lwPCXgWWzVkb+6G2Lo9 um4CHh0gS0z/diwjTOLdfsS44dOclXyA+bi1QzEen2BOu6EwfrYzsfJny A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BDAgAVKD9X/5hdJa1IDAqDN1YtAU+uGotvAQ2BcQQXC4VvAoE2OBQBAQEBAQEBZSeEQgEBAQMBAQEBFyA0BAcFBwQLDgMDAQEBAQkMEgcPBQ0GHwkOExuHegMPCA6/Xw2EMAEBAQEBAQEBAQEBAQEBAQEBAQEBARcFiW+BA4JDgUcFCARjhRsFjWR0iSkziHiDL4FvCoFphE+IZIdjh2geAQFCggYcgWscMoZFgT4BAQE
X-IronPort-AV: E=Sophos;i="5.26,339,1459814400"; d="scan'208";a="104354309"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 May 2016 15:09:37 +0000
Received: from mcast-linux1.cisco.com (mcast-linux1.cisco.com [172.27.244.121]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id u4KF9bSl028157 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 20 May 2016 15:09:37 GMT
Received: from mcast-linux1.cisco.com (localhost.cisco.com [127.0.0.1]) by mcast-linux1.cisco.com (8.13.8/8.13.8) with ESMTP id u4KF9aov031374; Fri, 20 May 2016 08:09:36 -0700
Received: (from eckert@localhost) by mcast-linux1.cisco.com (8.13.8/8.13.8/Submit) id u4KF9amF031373; Fri, 20 May 2016 08:09:36 -0700
Date: Fri, 20 May 2016 08:09:36 -0700
From: Toerless Eckert <eckert@cisco.com>
To: Brian Trammell <ietf@trammell.ch>
Message-ID: <20160520150936.GK2511@cisco.com>
References: <7EE2C4F8-98D4-493A-9778-FB6697B4A4DF@trammell.ch> <825141DA-F346-412A-A52C-53BF81EC6502@trammell.ch> <655C07320163294895BBADA28372AF5D4885CF80@FR712WXCHMBA15.zeu.alcatel-lucent.com> <CALx6S37br_VkDrggO1gAh2LzZtm=BTNTEecRU3sRQmUrnR+r7g@mail.gmail.com> <20160519182701.GL12994@cisco.com> <655C07320163294895BBADA28372AF5D4885D2CB@FR712WXCHMBA15.zeu.alcatel-lucent.com> <EEA5C082-194B-4151-86E9-426D04247834@trammell.ch>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <EEA5C082-194B-4151-86E9-426D04247834@trammell.ch>
User-Agent: Mutt/1.4.2.2i
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/4Rs3W5kP_MT-38f2MAR51DT0tCc>
Cc: "spud@ietf.org" <spud@ietf.org>
Subject: Re: [Spud] [Stackevo-discuss] Fwd: Possible WG-forming follow-on to SPUD BoF
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 May 2016 15:09:45 -0000

> Path Layer UDP Substrate (PLUS)
> ===============================
> 
> The PLUS working group's goal is to enable the deployment of new,
> encrypted transport protocols, while providing a
> transport-independent method to signal flow semantics under
> transport and application control.

Don't like don't understand this paragraph.
- What if we do not develope new transprt protocols but recipes
  how to modify existing transport protocols to run in PLUS ?
- "We are going to cook stew while juggling 4 balls". The relationship
  between the two is not really clear from the sentence. 
- What does "under transport and application control" mean ?
- Does not cover the key aspect of being able to implement these protocols
  as part of application code.

The goal of the PLUS working group is to overcome ossification of
deployments of new transport layer work. PLUS will develop a new
transport layer approach with the following properties:

- The transport protocol is encrypted.
- A transport protocol independent inband layer is used for signaling of
  flow semantics.
- The transport layer can be implemented in application layer code.

> The current Internet protocol stack has no layer for explicit,
> in-band signaling of flow semantics and characteristics to network
> elements in an interdomain context, nor an integrated signaling
> mechanism from network elements to back to endpoints and applications.
>
> This layer never evolved within the stack, because middleboxes and
> other devices on path could simply inspect and modify headers and
> payload of unencrypted traffic at every layer. This implicit use of
> information from the transport and application layers is a
> key cause of the ossification that makes it hard or impossible
> to deploy new protocols.

First paragraph wrong if you take STUN/ICE/MALICE into account.
Second paragraph unfair because it's hitting only one side. Give
the IETF some friendly slapping too, please.

Proposed text:

Traditionally, the Internet protocols did not provide explicit,
transport protocol independent signaling of flow characteristics to
on-path network devices. In return, the industry developed the practice
of inspecting protocol headers all the way from the transport layer
ports to application payload. This practice is called DPI (Deep Packet
Inspection. Later on, middleboxes started to filter or modify deep
into packets as well, for example to fix up IP addresses in application
layer protocols in NAT middleboxes. This was all possible because
historically all these layers where (and partially are) unencrypted. 

Later IETF standards track onpath signaling work such as RSVP or NSIS could not
overcome this practice because it could not not solely be implemented by
applications interested in it because these protocols had to be implemented by
OS vendors. Investmenting in these protocols was unattractive too, because
by default middleboxes that do not support these protocols would simply
drop them: The practice of unspecified, vendor specific DPI had lead to a
"security" model in middleboxes where it was impossible to deploy new
transport protocols that could be recognized and supported by pre-existing
middleboxes without new work on these middleboxes. This lead to ossification
in deployment of new transport work. 

In recent years, STUN/ICE and extensions to it started to introduce
the ability for onpath inband explicit signaling to middleboxes, but
being limited to be used purely with existing UDP based transport options,
they do not address how to solve the problem for applications using
non-UDP transport.

> In order to support more ubiquitous deployment of encryption,
> explicit signaling must be added to the stack, and it must be
> transport protocol independent.

> While IP would seem to be the
> natural home for this facility, both IPv4 and IPv6 options and
> extensions have deployment problems on their own, which makes it
> hard to include any additional information in these protocols.

Better:

The natural layer for flow information is between Internet and Transport
protocols - IP/IPv6 options/extensions or a common transport sublayer.
Implementation in the IP/IPv6 layer makes it difficult o adopt though
because it would not allow for implementation in application code.

> Additionally, a feedback channel that provides information from
> on-path devices back to endpoints and applications, e.g. for error
> handling, is essential for the deployment and success of an explicit
> cooperation approach.
> 
> The PLUS working group will specify a new protocol as a Path Layer
> User Substrate (PLUS), to support experimental deployment of
> explicit cooperation between endpoints and devices on path, with the following goals:
> 
> - enable ubiquitous deployment of encrypted higher layer protocols
                                            ^^^ transport and
> by providing exposure of similar semantics to existing protocols (e.g.
> TCP) to devices on path (e.g. NATs and firewalls)
>
> - allow applications and transport protocols to explicitly provide
> limited information to devices on path
> 
> - allow devices on path to provide feedback and information about
> the path to sending endpoints, under sending endpoint control
> 
> - allow devices on path to provide information about the path to
> receiving endpoints, with feedback to the sending endpoint, under
> sending endpoint control

So.. The biggest discussion point i guess will be around the "limited",
where the privacy advocacy segment of our population will argue
"nothing", and the evil-network-doer will argue "everything".

What i really want to see is this:

- Allow the application to learn from the network devices what information
  it must present in the clear to have its traffic be passed through
  and/or receive additional treatment by the network.

Aka: "Security guard: Sure, you can go through this door if you show me your <credential> else not"

Then the app can decide if it wants to show <credential>. Otherwise the
apps have to operate like corporate drones, carrying around their corp-ID
in the open all the time hoping that thats the right credential.

Or to rephrase: if we do not even attempt to overcome TCP port numbers as
credentials then we're lame and will not be successful.

> Note that this approach explicitly gives the control of information
> exposure back the application and/or transport layer protocol on
> the end host.

remove "and/or transport layer protocols". We MUST have auditability
of what is being sent in the clear by the application. We can not
have transport protocols inserting information in the clear without
the app knowing.

> It is the goal of PLUS to minimize the information
> exposed at the level of detail that is useful for the network,
> while encrypting everything else. This is important to avoid future
> implicit treatment and the resulting ossification, as well as to
> leverage the principle of least exposure to minimize privacy risks
> presented by explicit cooperation.

How about a next paragraph about this:

Text:
In cases where middleboxes require auditability/unencrypted access to
the encrypted information of a flow, PLUS can still be used, but the
encryption keys need to be shared between application and middleboxes
(or backend thereof). PLUS itself will not consider any mechanisms
for such encryption key sharing, but instead expects this to be done
by a higher layer in the application.
End of text.

I would like to see something to this extend, because to me there
are two classes of key sharing and they have a crucial difference:

One where the application is actually knowledgable about this and wants
to support this key sharing, such as in banking applications for auditing middleboxes
(money laundering rules etc..). And PLUS can be perfectly be used. the app/
middleboxes will just have to write up their key sharing as another layer in the app
and middlebox backend.

The other class of course is (L)I where the premise is that the app is unaware.
I want to make it as clear as possible that there is nothing in PLUS or
the encrypted transports it works on that enables this model. If somebody
wants to make this model work, he has to define another secret key sharing
layer in the application cocde or other layers, but PLUS needs to stay clean

> 
> Given that the primary goal of PLUS is to enable the deployment of
> arbitrary, fully encrypted transport protocols, we assume that the
> higher layer protocol can provide an encryption context that can be
> used by PLUS to provide authentication, integrity, and encryption
> where needed. The primary threat model to defend against will be
"threat model" == "attack vector" ??
> modification or deletion of exposed information by middleboxes and
> other devices on path, by allowing a remote endpoint to detect modifications.

Detection of messups is a pretty low bar. I do not need encryption for
that. A protected checksum will suffice. The "encryption where needed" is
also i think a basic question - eg: would be nice we we had clarity during
charter:

I as assuming in my above comments that we would ALWAYS have encryption,
and that we would need application layer key sharing. Is that the model
we want ?? If not, what are the criteria for not having encryption ? Do
we think we can agree on criteria during charter ?

> The working group will start with an initial set of use cases (see
> draft-kuehlewind-spud-use-cases) and requirements (see
> draft-trammell-spud-req), taken from experience with the Substrate
> Protocol for User Datagrams (SPUD) prototype.
> The working group's main output will be an experimental protocol
> specification, together with an initial registry of types of
> information that can be exposed using PLUS, clearly aligned to
> these use cases and requirements. The working group will close if
> it is not able to come to consensus on a protocol design to meet
> these requirements.
> 
> The working group will additionally aim to identify other working
> groups that could or should address parts of these requirements
> within existing protocols, e.g. by specifying new protocol
> extensions or as input for on-going standardization work. It will
> aim to work with working groups defining encryption protocols (e.g.
> TLS) which could be used for encryption of transport protocols
> running over PLUS.
> 

Cheers
    Teorless
> 
> 
> 
> > On 19 May 2016, at 20:56, Scharf, Michael (Nokia - DE) <michael.scharf@nokia.com> wrote:
> > 
> > My comment is *only* that the sentence "The current Internet protocol stack has no layer for explicit signaling of flow semantics and characteristics to network elements" needs to be improved, in my personal point of view.
> > 
> > For instance, for NAT/FW control, there are many existing out-of-band protocols such as PCP, MEGACO/H.248, NSIS, MIDCOM (and SIMCO), COPS, etc., not to mention all the SDN protocols, which are typically all flow-based. They are all out-of-band but e.g. NSIS would have been end-to-end. The intention and deployment model of these protocols may be very different to what SPUD aims for, and none of them is deployed end-to-end in the Internet. But I think this sentence has to be slightly more specific how to differentiate e.g. from control plane solutions.
> > 
> > Michael
> > 
> > 
> > -----Original Message-----
> > From: Toerless Eckert [mailto:eckert@cisco.com]
> > Sent: Thursday, May 19, 2016 8:27 PM
> > To: Tom Herbert
> > Cc: Scharf, Michael (Nokia - DE); Brian Trammell; spud@ietf.org
> > Subject: Re: [Spud] [Stackevo-discuss] Fwd: Possible WG-forming follow-on to SPUD BoF
> > 
> > Tom, Michael
> > 
> > I am reading your positions and i am confused:
> > 
> > DSCP is very successfull in enterprise networks. SPUD does not have to be successfull "on the Internet". To me it would already be a great success if it would help to improve controlled network services (like enterprise or 4G/5G networks). And their transit traffic across the Internet (without changing anything on the Internet itself).
> > 
> > AFAIK, TOS/DSCP/ECN are not per-flow, but per-packet mechanisms. Even if we often think about them as per-flow and ould maybe like them to be restrict to per-flow. At least i don't know any normative reference that defines them to be per-flow.
> > 
> > Wrt to out-of-band/out-of-path: The whole reason for SPUD is the analysis that all those mechanisms fail to provide an easily deplopyale framework in the face of middleboxes. Aka: their presence and mostly non-success should be an argument FOR working on spud. Not against it.
> > 
> > If a NAT/FW does support any flow signaling, its most likely inband. Every NAT/firwall supports flow recognition via the explicit signaling of flow-based transport protoocols like TCP. They do try to do the same for UDP and because that has no explicit flow signaling, thats where the problem starts. NAT/FW do deep packet inspection which has all these problems we know. SPUD sets out to solve/reduce these NAT/FW issues.
> > 
> > Non-support of anything like IP options is IMHO primarily driven by the absence of unform cross-OS/Dev-language APIs for them. Yes. It may suck architecturally by designing protocol stacks based on reality like: applications will only be able to use UDP and TCP, so lets do new work on top of them, but to me the most important goal is to find the best deployable solution to a problem. Not the architecturally cleanest one. If you give me research money to work outside of reality i will happily take it though and represent a different perspective.
> > 
> > Please, i do not want to dismiss your opposition, i just don't understand how the arguments you make are working out. Maybe you can explain to me where i am going wrong in my interpretations above.
> > 
> > Cheers
> >   Toerless
> > 
> > On Thu, May 19, 2016 at 10:50:21AM -0700, Tom Herbert wrote:
> >> On Thu, May 19, 2016 at 10:12 AM, Scharf, Michael (Nokia - DE)
> >> <michael.scharf@nokia.com> wrote:
> >>> Does the sentence ...
> >>> 
> >>>  The current Internet protocol stack has no layer for explicit signaling of flow semantics and characteristics to network elements ...
> >>> 
> >>> actually wants to say something like
> >>> 
> >>>  The current Internet protocol stack has no layer for explicit *in-band* signaling of flow semantics and characteristics ... ?
> >>> 
> >>> I may be wrong, but there is no shortage of IETF and non-IETF protocols that can signal flow semantics and characteristics out-of-band, either path-coupled or path-decoupled, e.g., in the control or management plane. As a result, there are protocol "layers" for that signaling, but they are not in-band. There may also be other ways to fix this problem (e.g., by adding "end-to-end" or "inter-domain" instead of "in-band").
> >>> 
> >> Not to mention that TOS and diff-serv are in-band signaling mechanisms
> >> to the network, ECN is explicitly signaling from the network. Given
> >> that they've been around for many years but have never been widely
> >> deployed on the Internet makes me wonder if any in-band signaling
> >> mechanism will ever catch on. The use of out of band signaling should
> >> be considered, especially considered that in many cases like NAT and
> >> firewall the network elements that need signaling are likely in local
> >> networks of one side of the connection.
> >> 
> >> I have a similar concern about the statement that IP options/EH and
> >> extension headers are being left off the table as part of a solution.
> >> The fact that neither have these caught on in the Internet and that
> >> tells me two things 1) No IP option is needed for the Internet to
> >> operate and be successful which makes me wonder if signaling between
> >> network and hosts is even required 2) If the extensibility mechanisms
> >> of IP are chronically not deployable, I wonder why any alternative
> >> that does not yet exist but intends to solve the same problem would be
> >> any more deployable.
> >> 
> >> Tom
> >> 
> >>> Michael
> >>> 
> >>> 
> >>> -----Original Message-----
> >>> From: Stackevo-discuss [mailto:stackevo-discuss-bounces@iab.org] On
> >>> Behalf Of Brian Trammell
> >>> Sent: Thursday, May 19, 2016 5:07 PM
> >>> To: stackevo-discuss@iab.org
> >>> Subject: [Stackevo-discuss] Fwd: Possible WG-forming follow-on to
> >>> SPUD BoF
> >>> 
> >>> Greetings, all,
> >>> 
> >>> Forwarding this to the correct address for this mailing list (oops). Please discuss at spud@ietf.org.
> >>> 
> >>> Thanks, cheers,
> >>> 
> >>> Brian
> >>> 
> >>>> Begin forwarded message:
> >>>> 
> >>>> From: Brian Trammell <ietf@trammell.ch>
> >>>> Subject: Possible WG-forming follow-on to SPUD BoF
> >>>> Date: 19 May 2016 at 17:04:50 GMT+2
> >>>> To: spud@ietf.org
> >>>> Cc: stackevo-discuss@ietf.org, tsv-area@ietf.org, "Mirja Kuehlewind
> >>>> (IETF)" <ietf@kuehlewind.net>, Spencer Dawkins at IETF
> >>>> <spencerdawkins.ietf@gmail.com>
> >>>> 
> >>>> Greetings, all,
> >>>> 
> >>>> We propose to hold a working-group forming BoF in Berlin as a follow-on to the SPUD work, to define a common substrate protocol for encrypted transports based on the requirements derived from experimentation with the SPUD prototype.
> >>>> 
> >>>> First, note that since the acronym "SPUD" refers primarily to the prototype itself, any follow-on working group should have a different name. We're using the derived requirements, not starting for the prototype. The name is a subject for discussion, and suggestions are welcome. To have something to put in the proposed charter, we'd propose "Path Layer UDP Substrate" (PLUS) as a starting point.
> >>>> 
> >>>> The proposed charter appears below. We're interested in hearing initial feedback on the proposed charter in preparation for a BoF proposal (the cutoff date is two weeks from tomorrow, on Friday 3 June). Is there work to do here within the IETF? Is the scope of the proposed charter appropriate? Is there energy to do this work?
> >>>> 
> >>>> Thanks, cheers,
> >>>> 
> >>>> Brian and Mirja
> >>>> 
> >>>> 
> >>>> Path Layer UDP Substrate (PLUS)
> >>>> ===============================
> >>>> 
> >>>> The PLUS working group???s goal is to enable the deployment of new,
> >>>> encrypted transport protocols, while providing a
> >>>> transport-independent method to signal flow semantics under transport and application control.
> >>>> 
> >>>> The current Internet protocol stack has no layer for explicit
> >>>> signaling of flow semantics and characteristics to network
> >>>> elements, nor an integrated signaling mechanism from network
> >>>> elements to back to endpoints and applications. This layer never
> >>>> evolved within the stack, because middleboxes and other devices on
> >>>> path could simply inspect and modify headers and payload of
> >>>> unencrypted traffic at every layer. This implicit use of
> >>>> information from the transport and application layers is a key origin of the ossification that makes it hard or impossible to deploy new protocols.
> >>>> 
> >>>> In order to support more ubiquitous deployment of encryption,
> >>>> explicit signaling must be added to the stack, and it must be
> >>>> transport protocol independent. While IP would seem to be the
> >>>> natural home for this facility, both IPv4 and IPv6 options and
> >>>> extensions have deployment problems on their own, which makes it
> >>>> hard to include any additional information in these protocols.
> >>>> Additionally, a feedback channel that provides information from
> >>>> on-path devices back to endpoints and applications, e.g. for error
> >>>> handling, is essential for the deployment and success of an explicit cooperation approach.
> >>>> 
> >>>> The PLUS working group will specify a new protocol as a Path Layer
> >>>> User Substrate (PLUS), to support experimental deployment of
> >>>> explicit cooperation between endpoints and devices on path, with the following goals:
> >>>> 
> >>>> - enable ubiquitous deployment of encrypted higher layer protocols
> >>>> by providing exposure of similar semantics to existing protocols (e.g.
> >>>> TCP) to devices on path (e.g. NATs and firewalls)
> >>>> 
> >>>> - allow applications and transport protocols to explicitly provide
> >>>> limited information to devices on path
> >>>> 
> >>>> - allow devices on path to provide feedback and information about
> >>>> the path to sending endpoints, under sending endpoint control
> >>>> 
> >>>> - allow devices on path to provide information about the path to
> >>>> receiving endpoints, with feedback to the sending endpoint, under
> >>>> sending endpoint control
> >>>> 
> >>>> Note that this approach explicitly gives the control of information
> >>>> exposure back the application and/or transport layer protocol on
> >>>> the end host. It is the goal of PLUS to minimize the information
> >>>> exposed at the level of detail that is useful for the network,
> >>>> while encrypting everything else. This is important to avoid future
> >>>> implicit treatment and the resulting ossification, as well as to
> >>>> leverage the principle of least exposure to minimize privacy risks presented by explicit cooperation.
> >>>> 
> >>>> Given that the primary goal of PLUS is to enable the deployment of
> >>>> arbitrary, fully encrypted transport protocols, we assume that the
> >>>> higher layer protocol can provide an encryption context that can be
> >>>> used by PLUS to provide authentication, integrity, and encryption
> >>>> where needed. The primary threat model to defend against will be
> >>>> modification or deletion of exposed information by middleboxes and
> >>>> other devices on path, by allowing a remote endpoint to detect modifications.
> >>>> 
> >>>> The working group will start with an initial set of use cases (see
> >>>> draft-kuehlewind-spud-use-cases) and requirements (see
> >>>> draft-trammell-spud-req), taken from experience with the Substrate Protocol for User Datagrams prototype.
> >>>> The working group's main output will be an experimental protocol
> >>>> specification, together with an initial registry of types of
> >>>> information that can be exposed using PLUS, clearly aligned to
> >>>> these use cases and requirements. The working group will close if
> >>>> it is not able to come to consensus on a protocol design to meet these requirements.
> >>>> 
> >>>> The working group will additionally aim to identify other working
> >>>> groups that could or should address parts of these requirements
> >>>> within existing protocols, e.g. by specifying new protocol
> >>>> extensions or as input for on-going standardization work. It will
> >>>> aim to work with working groups defining encryption protocols (e.g.
> >>>> TLS) which could be used for encryption of transport protocols running over PLUS.
> >>>> 
> >>> 
> >>> _______________________________________________
> >>> Spud mailing list
> >>> Spud@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/spud
> >> 
> >> _______________________________________________
> >> Spud mailing list
> >> Spud@ietf.org
> >> https://www.ietf.org/mailman/listinfo/spud
> > 
> > --
> > ---
> > Toerless Eckert, eckert@cisco.com
> 



> _______________________________________________
> Spud mailing list
> Spud@ietf.org
> https://www.ietf.org/mailman/listinfo/spud


-- 
---
Toerless Eckert, eckert@cisco.com