Re: [Spud] [Stackevo-discuss] Fwd: Possible WG-forming follow-on to SPUD BoF

Dave Dolson <ddolson@sandvine.com> Fri, 20 May 2016 16:17 UTC

Return-Path: <ddolson@sandvine.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4296B12DD6F for <spud@ietfa.amsl.com>; Fri, 20 May 2016 09:17:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.346
X-Spam-Level:
X-Spam-Status: No, score=-3.346 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.426] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kMjuFCzIhLTo for <spud@ietfa.amsl.com>; Fri, 20 May 2016 09:17:30 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D84F612D521 for <spud@ietf.org>; Fri, 20 May 2016 09:17:29 -0700 (PDT)
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by WTL-EXCHP-2.sandvine.com (192.168.194.177) with Microsoft SMTP Server (TLS) id 14.3.195.1; Fri, 20 May 2016 12:17:28 -0400
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0181.006; Fri, 20 May 2016 12:17:28 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: Brian Trammell <ietf@trammell.ch>, "spud@ietf.org" <spud@ietf.org>
Thread-Topic: [Spud] [Stackevo-discuss] Fwd: Possible WG-forming follow-on to SPUD BoF
Thread-Index: AQHRsfbuJ2cvNkb2DUuyKJNQQWe2WZ/A1zKAgAAIQQCAAQ29AIAAE5sw
Date: Fri, 20 May 2016 16:17:28 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F75D19@wtl-exchp-2.sandvine.com>
References: <7EE2C4F8-98D4-493A-9778-FB6697B4A4DF@trammell.ch> <825141DA-F346-412A-A52C-53BF81EC6502@trammell.ch> <655C07320163294895BBADA28372AF5D4885CF80@FR712WXCHMBA15.zeu.alcatel-lucent.com> <CALx6S37br_VkDrggO1gAh2LzZtm=BTNTEecRU3sRQmUrnR+r7g@mail.gmail.com> <20160519182701.GL12994@cisco.com> <655C07320163294895BBADA28372AF5D4885D2CB@FR712WXCHMBA15.zeu.alcatel-lucent.com> <EEA5C082-194B-4151-86E9-426D04247834@trammell.ch>
In-Reply-To: <EEA5C082-194B-4151-86E9-426D04247834@trammell.ch>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/Bbv49jiSDobvtfxohWQLqfuIHY0>
Subject: Re: [Spud] [Stackevo-discuss] Fwd: Possible WG-forming follow-on to SPUD BoF
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 May 2016 16:17:33 -0000

Brian,
The text of the proposed charter doesn't mention "UDP"; it's just in the title.

If the intent is to require the use of UDP, it should be spelled out, I'd think.

-Dave


-----Original Message-----
From: Spud [mailto:spud-bounces@ietf.org] On Behalf Of Brian Trammell
Sent: Friday, May 20, 2016 7:02 AM
To: spud@ietf.org
Subject: Re: [Spud] [Stackevo-discuss] Fwd: Possible WG-forming follow-on to SPUD BoF

Hi, all,

I've heard one concrete charter suggestion so far; the edited draft charter (changed paragraph 2) is below. If others would like to see points clarified to answer their questions, please send suggested edits. :)

I take the fact that we're diving into technical discussion as an indication that those participating are at least interested in the BoF, if not (yet ;) ) convinced of the need for a WG at this space?

Thanks, cheers,

Brian


Path Layer UDP Substrate (PLUS)
===============================

The PLUS working group's goal is to enable the deployment of new,
encrypted transport protocols, while providing a
transport-independent method to signal flow semantics under
transport and application control.

The current Internet protocol stack has no layer for explicit,
in-band signaling of flow semantics and characteristics to network
elements in an interdomain context, nor an integrated signaling
mechanism from network elements to back to endpoints and applications.
This layer never evolved within the stack, because middleboxes and
other devices on path could simply inspect and modify headers and
payload of unencrypted traffic at every layer. This implicit use of
information from the transport and application layers is a
key cause of the ossification that makes it hard or impossible
to deploy new protocols.

In order to support more ubiquitous deployment of encryption,
explicit signaling must be added to the stack, and it must be
transport protocol independent. While IP would seem to be the
natural home for this facility, both IPv4 and IPv6 options and
extensions have deployment problems on their own, which makes it
hard to include any additional information in these protocols.
Additionally, a feedback channel that provides information from
on-path devices back to endpoints and applications, e.g. for error
handling, is essential for the deployment and success of an explicit
cooperation approach.

The PLUS working group will specify a new protocol as a Path Layer
User Substrate (PLUS), to support experimental deployment of
explicit cooperation between endpoints and devices on path, with the following goals:

- enable ubiquitous deployment of encrypted higher layer protocols
by providing exposure of similar semantics to existing protocols (e.g.
TCP) to devices on path (e.g. NATs and firewalls)

- allow applications and transport protocols to explicitly provide
limited information to devices on path

- allow devices on path to provide feedback and information about
the path to sending endpoints, under sending endpoint control

- allow devices on path to provide information about the path to
receiving endpoints, with feedback to the sending endpoint, under
sending endpoint control

Note that this approach explicitly gives the control of information
exposure back the application and/or transport layer protocol on
the end host. It is the goal of PLUS to minimize the information
exposed at the level of detail that is useful for the network,
while encrypting everything else. This is important to avoid future
implicit treatment and the resulting ossification, as well as to
leverage the principle of least exposure to minimize privacy risks
presented by explicit cooperation.

Given that the primary goal of PLUS is to enable the deployment of
arbitrary, fully encrypted transport protocols, we assume that the
higher layer protocol can provide an encryption context that can be
used by PLUS to provide authentication, integrity, and encryption
where needed. The primary threat model to defend against will be
modification or deletion of exposed information by middleboxes and
other devices on path, by allowing a remote endpoint to detect modifications.

The working group will start with an initial set of use cases (see
draft-kuehlewind-spud-use-cases) and requirements (see
draft-trammell-spud-req), taken from experience with the Substrate
Protocol for User Datagrams (SPUD) prototype.
The working group's main output will be an experimental protocol
specification, together with an initial registry of types of
information that can be exposed using PLUS, clearly aligned to
these use cases and requirements. The working group will close if
it is not able to come to consensus on a protocol design to meet
these requirements.

The working group will additionally aim to identify other working
groups that could or should address parts of these requirements
within existing protocols, e.g. by specifying new protocol
extensions or as input for on-going standardization work. It will
aim to work with working groups defining encryption protocols (e.g.
TLS) which could be used for encryption of transport protocols
running over PLUS.




> On 19 May 2016, at 20:56, Scharf, Michael (Nokia - DE) <michael.scharf@nokia.com> wrote:
> 
> My comment is *only* that the sentence "The current Internet protocol stack has no layer for explicit signaling of flow semantics and characteristics to network elements" needs to be improved, in my personal point of view.
> 
> For instance, for NAT/FW control, there are many existing out-of-band protocols such as PCP, MEGACO/H.248, NSIS, MIDCOM (and SIMCO), COPS, etc., not to mention all the SDN protocols, which are typically all flow-based. They are all out-of-band but e.g. NSIS would have been end-to-end. The intention and deployment model of these protocols may be very different to what SPUD aims for, and none of them is deployed end-to-end in the Internet. But I think this sentence has to be slightly more specific how to differentiate e.g. from control plane solutions.
> 
> Michael
> 
> 
> -----Original Message-----
> From: Toerless Eckert [mailto:eckert@cisco.com]
> Sent: Thursday, May 19, 2016 8:27 PM
> To: Tom Herbert
> Cc: Scharf, Michael (Nokia - DE); Brian Trammell; spud@ietf.org
> Subject: Re: [Spud] [Stackevo-discuss] Fwd: Possible WG-forming follow-on to SPUD BoF
> 
> Tom, Michael
> 
> I am reading your positions and i am confused:
> 
> DSCP is very successfull in enterprise networks. SPUD does not have to be successfull "on the Internet". To me it would already be a great success if it would help to improve controlled network services (like enterprise or 4G/5G networks). And their transit traffic across the Internet (without changing anything on the Internet itself).
> 
> AFAIK, TOS/DSCP/ECN are not per-flow, but per-packet mechanisms. Even if we often think about them as per-flow and ould maybe like them to be restrict to per-flow. At least i don't know any normative reference that defines them to be per-flow.
> 
> Wrt to out-of-band/out-of-path: The whole reason for SPUD is the analysis that all those mechanisms fail to provide an easily deplopyale framework in the face of middleboxes. Aka: their presence and mostly non-success should be an argument FOR working on spud. Not against it.
> 
> If a NAT/FW does support any flow signaling, its most likely inband. Every NAT/firwall supports flow recognition via the explicit signaling of flow-based transport protoocols like TCP. They do try to do the same for UDP and because that has no explicit flow signaling, thats where the problem starts. NAT/FW do deep packet inspection which has all these problems we know. SPUD sets out to solve/reduce these NAT/FW issues.
> 
> Non-support of anything like IP options is IMHO primarily driven by the absence of unform cross-OS/Dev-language APIs for them. Yes. It may suck architecturally by designing protocol stacks based on reality like: applications will only be able to use UDP and TCP, so lets do new work on top of them, but to me the most important goal is to find the best deployable solution to a problem. Not the architecturally cleanest one. If you give me research money to work outside of reality i will happily take it though and represent a different perspective.
> 
> Please, i do not want to dismiss your opposition, i just don't understand how the arguments you make are working out. Maybe you can explain to me where i am going wrong in my interpretations above.
> 
> Cheers
>   Toerless
> 
> On Thu, May 19, 2016 at 10:50:21AM -0700, Tom Herbert wrote:
>> On Thu, May 19, 2016 at 10:12 AM, Scharf, Michael (Nokia - DE)
>> <michael.scharf@nokia.com> wrote:
>>> Does the sentence ...
>>> 
>>>  The current Internet protocol stack has no layer for explicit signaling of flow semantics and characteristics to network elements ...
>>> 
>>> actually wants to say something like
>>> 
>>>  The current Internet protocol stack has no layer for explicit *in-band* signaling of flow semantics and characteristics ... ?
>>> 
>>> I may be wrong, but there is no shortage of IETF and non-IETF protocols that can signal flow semantics and characteristics out-of-band, either path-coupled or path-decoupled, e.g., in the control or management plane. As a result, there are protocol "layers" for that signaling, but they are not in-band. There may also be other ways to fix this problem (e.g., by adding "end-to-end" or "inter-domain" instead of "in-band").
>>> 
>> Not to mention that TOS and diff-serv are in-band signaling mechanisms
>> to the network, ECN is explicitly signaling from the network. Given
>> that they've been around for many years but have never been widely
>> deployed on the Internet makes me wonder if any in-band signaling
>> mechanism will ever catch on. The use of out of band signaling should
>> be considered, especially considered that in many cases like NAT and
>> firewall the network elements that need signaling are likely in local
>> networks of one side of the connection.
>> 
>> I have a similar concern about the statement that IP options/EH and
>> extension headers are being left off the table as part of a solution.
>> The fact that neither have these caught on in the Internet and that
>> tells me two things 1) No IP option is needed for the Internet to
>> operate and be successful which makes me wonder if signaling between
>> network and hosts is even required 2) If the extensibility mechanisms
>> of IP are chronically not deployable, I wonder why any alternative
>> that does not yet exist but intends to solve the same problem would be
>> any more deployable.
>> 
>> Tom
>> 
>>> Michael
>>> 
>>> 
>>> -----Original Message-----
>>> From: Stackevo-discuss [mailto:stackevo-discuss-bounces@iab.org] On
>>> Behalf Of Brian Trammell
>>> Sent: Thursday, May 19, 2016 5:07 PM
>>> To: stackevo-discuss@iab.org
>>> Subject: [Stackevo-discuss] Fwd: Possible WG-forming follow-on to
>>> SPUD BoF
>>> 
>>> Greetings, all,
>>> 
>>> Forwarding this to the correct address for this mailing list (oops). Please discuss at spud@ietf.org.
>>> 
>>> Thanks, cheers,
>>> 
>>> Brian
>>> 
>>>> Begin forwarded message:
>>>> 
>>>> From: Brian Trammell <ietf@trammell.ch>
>>>> Subject: Possible WG-forming follow-on to SPUD BoF
>>>> Date: 19 May 2016 at 17:04:50 GMT+2
>>>> To: spud@ietf.org
>>>> Cc: stackevo-discuss@ietf.org, tsv-area@ietf.org, "Mirja Kuehlewind
>>>> (IETF)" <ietf@kuehlewind.net>, Spencer Dawkins at IETF
>>>> <spencerdawkins.ietf@gmail.com>
>>>> 
>>>> Greetings, all,
>>>> 
>>>> We propose to hold a working-group forming BoF in Berlin as a follow-on to the SPUD work, to define a common substrate protocol for encrypted transports based on the requirements derived from experimentation with the SPUD prototype.
>>>> 
>>>> First, note that since the acronym "SPUD" refers primarily to the prototype itself, any follow-on working group should have a different name. We're using the derived requirements, not starting for the prototype. The name is a subject for discussion, and suggestions are welcome. To have something to put in the proposed charter, we'd propose "Path Layer UDP Substrate" (PLUS) as a starting point.
>>>> 
>>>> The proposed charter appears below. We're interested in hearing initial feedback on the proposed charter in preparation for a BoF proposal (the cutoff date is two weeks from tomorrow, on Friday 3 June). Is there work to do here within the IETF? Is the scope of the proposed charter appropriate? Is there energy to do this work?
>>>> 
>>>> Thanks, cheers,
>>>> 
>>>> Brian and Mirja
>>>> 
>>>> 
>>>> Path Layer UDP Substrate (PLUS)
>>>> ===============================
>>>> 
>>>> The PLUS working group???s goal is to enable the deployment of new,
>>>> encrypted transport protocols, while providing a
>>>> transport-independent method to signal flow semantics under transport and application control.
>>>> 
>>>> The current Internet protocol stack has no layer for explicit
>>>> signaling of flow semantics and characteristics to network
>>>> elements, nor an integrated signaling mechanism from network
>>>> elements to back to endpoints and applications. This layer never
>>>> evolved within the stack, because middleboxes and other devices on
>>>> path could simply inspect and modify headers and payload of
>>>> unencrypted traffic at every layer. This implicit use of
>>>> information from the transport and application layers is a key origin of the ossification that makes it hard or impossible to deploy new protocols.
>>>> 
>>>> In order to support more ubiquitous deployment of encryption,
>>>> explicit signaling must be added to the stack, and it must be
>>>> transport protocol independent. While IP would seem to be the
>>>> natural home for this facility, both IPv4 and IPv6 options and
>>>> extensions have deployment problems on their own, which makes it
>>>> hard to include any additional information in these protocols.
>>>> Additionally, a feedback channel that provides information from
>>>> on-path devices back to endpoints and applications, e.g. for error
>>>> handling, is essential for the deployment and success of an explicit cooperation approach.
>>>> 
>>>> The PLUS working group will specify a new protocol as a Path Layer
>>>> User Substrate (PLUS), to support experimental deployment of
>>>> explicit cooperation between endpoints and devices on path, with the following goals:
>>>> 
>>>> - enable ubiquitous deployment of encrypted higher layer protocols
>>>> by providing exposure of similar semantics to existing protocols (e.g.
>>>> TCP) to devices on path (e.g. NATs and firewalls)
>>>> 
>>>> - allow applications and transport protocols to explicitly provide
>>>> limited information to devices on path
>>>> 
>>>> - allow devices on path to provide feedback and information about
>>>> the path to sending endpoints, under sending endpoint control
>>>> 
>>>> - allow devices on path to provide information about the path to
>>>> receiving endpoints, with feedback to the sending endpoint, under
>>>> sending endpoint control
>>>> 
>>>> Note that this approach explicitly gives the control of information
>>>> exposure back the application and/or transport layer protocol on
>>>> the end host. It is the goal of PLUS to minimize the information
>>>> exposed at the level of detail that is useful for the network,
>>>> while encrypting everything else. This is important to avoid future
>>>> implicit treatment and the resulting ossification, as well as to
>>>> leverage the principle of least exposure to minimize privacy risks presented by explicit cooperation.
>>>> 
>>>> Given that the primary goal of PLUS is to enable the deployment of
>>>> arbitrary, fully encrypted transport protocols, we assume that the
>>>> higher layer protocol can provide an encryption context that can be
>>>> used by PLUS to provide authentication, integrity, and encryption
>>>> where needed. The primary threat model to defend against will be
>>>> modification or deletion of exposed information by middleboxes and
>>>> other devices on path, by allowing a remote endpoint to detect modifications.
>>>> 
>>>> The working group will start with an initial set of use cases (see
>>>> draft-kuehlewind-spud-use-cases) and requirements (see
>>>> draft-trammell-spud-req), taken from experience with the Substrate Protocol for User Datagrams prototype.
>>>> The working group's main output will be an experimental protocol
>>>> specification, together with an initial registry of types of
>>>> information that can be exposed using PLUS, clearly aligned to
>>>> these use cases and requirements. The working group will close if
>>>> it is not able to come to consensus on a protocol design to meet these requirements.
>>>> 
>>>> The working group will additionally aim to identify other working
>>>> groups that could or should address parts of these requirements
>>>> within existing protocols, e.g. by specifying new protocol
>>>> extensions or as input for on-going standardization work. It will
>>>> aim to work with working groups defining encryption protocols (e.g.
>>>> TLS) which could be used for encryption of transport protocols running over PLUS.
>>>> 
>>> 
>>> _______________________________________________
>>> Spud mailing list
>>> Spud@ietf.org
>>> https://www.ietf.org/mailman/listinfo/spud
>> 
>> _______________________________________________
>> Spud mailing list
>> Spud@ietf.org
>> https://www.ietf.org/mailman/listinfo/spud
> 
> --
> ---
> Toerless Eckert, eckert@cisco.com