Re: [Spud] SPUD Scope?
Szilveszter Nadas <Szilveszter.Nadas@ericsson.com> Fri, 05 June 2015 10:37 UTC
Return-Path: <Szilveszter.Nadas@ericsson.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id BE7121A005C
for <spud@ietfa.amsl.com>; Fri, 5 Jun 2015 03:37:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001]
autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id J2-CUMaCPx1F for <spud@ietfa.amsl.com>;
Fri, 5 Jun 2015 03:37:56 -0700 (PDT)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45])
(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 2474D1A1A5A
for <spud@ietf.org>; Fri, 5 Jun 2015 03:37:55 -0700 (PDT)
X-AuditID: c1b4fb2d-f794d6d000004501-0d-55717c02eb80
Received: from ESESSHC022.ericsson.se (Unknown_Domain [153.88.253.125])
by sessmg23.ericsson.net (Symantec Mail Security) with SMTP id
20.BB.17665.20C71755; Fri, 5 Jun 2015 12:37:54 +0200 (CEST)
Received: from ESESSMB303.ericsson.se ([169.254.3.142]) by
ESESSHC022.ericsson.se ([153.88.183.84]) with mapi id 14.03.0210.002; Fri, 5
Jun 2015 12:37:53 +0200
From: Szilveszter Nadas <Szilveszter.Nadas@ericsson.com>
To: Christian Huitema <huitema@microsoft.com>, Daniel Kahn Gillmor
<dkg@fifthhorseman.net>, "spud@ietf.org" <spud@ietf.org>
Thread-Topic: [Spud] SPUD Scope?
Thread-Index: AdCe42kWUfK3mg2YQc2lRPihacOmIwAB/SYAAABSZ4AAIPnEsA==
Date: Fri, 5 Jun 2015 10:37:53 +0000
Message-ID: <EA4C43BE752A194597B002779DF69BAE23D48602@ESESSMB303.ericsson.se>
References: <EA4C43BE752A194597B002779DF69BAE23D47A3E@ESESSMB303.ericsson.se>
<87h9qn1dkr.fsf@alice.fifthhorseman.net>
<DM2PR0301MB0655E175AD817C6D896F7E7DA8B30@DM2PR0301MB0655.namprd03.prod.outlook.com>
In-Reply-To: <DM2PR0301MB0655E175AD817C6D896F7E7DA8B30@DM2PR0301MB0655.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [153.88.183.20]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrNLMWRmVeSWpSXmKPExsUyM+JvrS5TTWGowfMGEYvW7s9MFk2f+xgt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Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/CL-YGh-uSODno53mA71s7gOhqyI>
Subject: Re: [Spud] SPUD Scope?
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>,
<mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>,
<mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jun 2015 10:37:58 -0000
Hi, My concern is whether the whole SPUD exercise is worth the effort without extensibility. Assume that we can agree in a minimal set for b). What if in a few years' time we realize that we need more? Have not we already ossified the middlebox layer? My vision is that SPUD shall allow both Transport Protocol evolution and Middlebox Cooperation evolution in the same flexible way. :) The goal in my mind if to not ossify transport and not ossify the cooperation functionality. Also is not b) + extensibility = c)? Or is there more in c), which is of concern? About "metadata that our protocols leak", I completely agree that protocols should minimize this leaking. I think that explicit conversation is not leaking though and hopefully also discourages the middlebox owners to try to look into the protocol data itself. Any device/firmware/Operating System/app still have and will have ways to leak whatever it wants, just by not allowing extensibility in SPUD we cannot stop it. At the same time extensible SPUD can be an engine for "good" cooperation. I believe we can potentially gain more than we lose. The only way to stop leaking is to have a "purging proxy", but even that proxy would have pretty hard time to remove all unwanted interactions. Also there are places where you simply cannot place a purging proxy e.g. between your access device and the ISP/mobile operator middlebox. About "keeping the smarts at the edge" the IAB program at least includes a goal to "(2) Improving path transparency in the presence of firewalls and middleboxes: guidelines for the detection of and cooperation with these devices to evolve away from present limitations on which protocols can be used across network boundaries, in order to facilitate innovation in transport protocol development. ". In a sense it means for me to embrace middlebox functionality, but make it much more explicit. I think that these functions are important to keep our networks working, but I agree that it has to be much more explicit than in the past. But limiting it looks like a way to keep it in the grey. I agree that security of the metadata layer will be often equally important than the security of user content. I am not quite sure whether it could/should be handled in SPUD or whether SPUD shall "only" allow secure metadata conversions as a substrate. About the UI/UX concern. This is definitely an issue and not an easy one to solve. Trust chains, delegation of trust, market apps controlling app rights are pieces of the puzzle to solve this. I think it is possible to find a solution for this with a good balance of ease of use and control. Sz. -----Original Message----- From: Christian Huitema [mailto:huitema@microsoft.com] Sent: Thursday, June 04, 2015 21:34 To: Daniel Kahn Gillmor; Szilveszter Nadas; spud@ietf.org Subject: RE: [Spud] SPUD Scope? On Thursday, June 4, 2015 12:25 PM, Daniel Kahn Gillmor wrote: > To: Szilveszter Nadas; spud@ietf.org > Subject: Re: [Spud] SPUD Scope? > > On Thu 2015-06-04 12:28:34 -0400, Szilveszter Nadas wrote: > > > The rage looked like this to me on a high level: > > > > a) only start/stop, hide everything in DTLS > > > > b) Some declarative, safe to ignore, trust but verify markings are > > OK, but it shall be minimized. > > > > c) "common, middlebox friendly connection/packet signaling layer", > > extensibility, any communication and behavior is OK as long as it is > > explicit. > > [...] > > This far-from-trivial authentication mechanism, combined with the > UI/UX concern about helping people to understand exactly who they are > leaking their metadata to, presents a really serious obstacle to > deploying something like this in a way that is safe for end users. Absolutely. This might only work if the client, server, and middleboxes incentives are well aligned. That may be the case for some basic QOS-type parameters, which is very much what (b) should be about. > ... > > I don't think something like (c) is a good idea. let's try to keep > the smarts (and the knowledge of both content and metadata) at the > edges of the network, and avoid blessing mechanisms that facilitate centralized surveillance. And a variety of security issues. The unauthenticated data channel is subject to spoofing, which enables a variety of packet injection attacks. -- Christian Huitema
- [Spud] SPUD Scope? Szilveszter Nadas
- Re: [Spud] SPUD Scope? Daniel Kahn Gillmor
- Re: [Spud] SPUD Scope? Christian Huitema
- Re: [Spud] SPUD Scope? Szilveszter Nadas
- Re: [Spud] SPUD Scope? Daniel Kahn Gillmor
- Re: [Spud] SPUD Scope? Ken Calvert
- Re: [Spud] SPUD Scope? Daniel Kahn Gillmor
- Re: [Spud] SPUD Scope? Mirja Kühlewind
- Re: [Spud] SPUD Scope? FOSSATI, Thomas (Thomas)
- Re: [Spud] SPUD Scope? Szilveszter Nadas
- Re: [Spud] SPUD Scope? Daniel Kahn Gillmor
- Re: [Spud] SPUD Scope? Tom Herbert