Re: [Spud] Additional SPUD use-cases

Richard Barnes <rlb@ipv.sx> Thu, 19 March 2015 19:03 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D64041A878A for <spud@ietfa.amsl.com>; Thu, 19 Mar 2015 12:03:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.677
X-Spam-Level:
X-Spam-Status: No, score=-1.677 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-0.7] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jFyoBXsUMjFf for <spud@ietfa.amsl.com>; Thu, 19 Mar 2015 12:03:55 -0700 (PDT)
Received: from mail-la0-f52.google.com (mail-la0-f52.google.com [209.85.215.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 43D041A8742 for <spud@ietf.org>; Thu, 19 Mar 2015 12:03:55 -0700 (PDT)
Received: by labjg1 with SMTP id jg1so70011430lab.2 for <spud@ietf.org>; Thu, 19 Mar 2015 12:03:53 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=aJmvJlv26Si3vj4/05foVGDodD010QoYAmb6i4yLngo=; b=A9u+yl0hfS40qx1GvZFSH9/c04cH2OLxvnyu8EJzPksXMNOuMAqWRRlH6f9PC85Qxz irFdalNj4HxjS0WNa5MoM/iY11a1uBlkVem0iect8eK+eTz8kbEkSUQmmIN6IItWD7Ac MvJJzGc62PoFLqLWMm0qdPSe+fgb6OWKRFyZOLlklV9tUSC0R31LKWTP1eM34vFayLrJ N1lY0aJCaGz16YeqflJ5R6QjNAkZ5HkP9aAknfsfLv+R0ZivI9Niv9PJZCDrVXjU2yyg WczeIzHyMZS+8YyRQVlAupZbQF/OlQxZ1NTOaPg3sMgMBqEpOn+nUgxRG+fUWO1jHbmn qcMw==
X-Gm-Message-State: ALoCoQnxRSCh3h6aGGXmPrKNWST06LvUZUG9SxFXZTn1hOPi1uuBFKRvl1lGVAIfU24m2o+EHdxM
MIME-Version: 1.0
X-Received: by 10.112.98.201 with SMTP id ek9mr70299309lbb.68.1426791833669; Thu, 19 Mar 2015 12:03:53 -0700 (PDT)
Received: by 10.25.135.4 with HTTP; Thu, 19 Mar 2015 12:03:53 -0700 (PDT)
In-Reply-To: <57464AD5-C804-4D94-B81A-842FAEF1A27A@tik.ee.ethz.ch>
References: <B57E4F68-A0C6-44D8-A729-47B1BED309C9@cisco.com> <CA+9kkMB4kfmMuR61aAhHLzrhEK37dEqy9cpdaqdtzpuyoCbBfg@mail.gmail.com> <CE03DB3D7B45C245BCA0D24327794936412E51@MX104CL02.corp.emc.com> <73D46BA8-DB33-481F-B0FB-DDD3B1F0F7FB@cisco.com> <16D94942-1D53-4F7B-8098-29B52781EDA0@tik.ee.ethz.ch> <E6385C88-2236-40EC-BABB-61A97E129EBB@cisco.com> <CAL02cgSf-2RzVQCQOwNp=Xqmk729kDV5_TcQeXSeYZ+tVsWViw@mail.gmail.com> <57464AD5-C804-4D94-B81A-842FAEF1A27A@tik.ee.ethz.ch>
Date: Thu, 19 Mar 2015 15:03:53 -0400
Message-ID: <CAL02cgQxxJaZb+CrDvZSwxdAU7htzoSpVdHu7hfAK-GUUYkXUA@mail.gmail.com>
From: Richard Barnes <rlb@ipv.sx>
To: =?UTF-8?Q?Mirja_K=C3=BChlewind?= <mirja.kuehlewind@tik.ee.ethz.ch>
Content-Type: multipart/alternative; boundary=001a11345c8c6a2af70511a8dc32
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/FCViYG0GRcXJU95dFY1fvTNIcv4>
Cc: "Pal Martinsen \(palmarti\)" <palmarti@cisco.com>, "Black, David" <david.black@emc.com>, "spud@ietf.org" <spud@ietf.org>, Mike Jones <Michael.Jones@microsoft.com>, "Joe Hildebrand \(jhildebr\)" <jhildebr@cisco.com>, "Matt Miller \(mamille2\)" <mamille2@cisco.com>, Carsten Bormann <cabo@tzi.org>
Subject: Re: [Spud] Additional SPUD use-cases
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Mar 2015 19:03:57 -0000

I see.  That's a different question.  Seems like some sort of basic
consistency check / checksum would be sufficient?

On Thu, Mar 19, 2015 at 2:09 PM, Mirja Kühlewind <
mirja.kuehlewind@tik.ee.ethz.ch> wrote:

> Okay, the question is than rather, how can we avoid that non-spud-aware
> middleboxes accidentally modify spud information which can hinder spud
> deployment is the same way other approaches failed…? I think we should at
> least be somehow able to detect these kind of unintentional modifications.
>
> Mirja
>
>
> > Am 19.03.2015 um 13:56 schrieb Richard Barnes <rlb@ipv.sx>sx>:
> >
> > Honestly, this seems quixotic.  Can we just specify that SPUD has a
> stack of messages, and leave it at that?
> >
> > Since there's no authentication of the middleboxes, the endpoint can't
> tell the difference between a middlebox changing a value and just deleting
> it and replacing it, which it can still do in this scheme.
> >
> > You might think you could prevent middleboxes from seeing each others'
> messages, but since there's no authentication on the *endpoint* keys, a
> middlebox could just replace the key and send the messages on, then take
> things on the return path, snarf whatever messages it wants, and re-encrypt
> them to the real key.
> >
> > So there is very limited benefit here, if at all.
> >
> > On Thu, Mar 19, 2015 at 1:17 PM, Joe Hildebrand (jhildebr) <
> jhildebr@cisco.com> wrote:
> > On 3/19/15, 9:38 AM, "Mirja Kühlewind" <mirja.kuehlewind@tik.ee.ethz.ch>
> wrote:
> >
> > >just a quick though on our comment regarding basically ‚why does DSCP
> not work inter-domain‘. One answer to this question is that is it mostly
> used intra-domain and that’s okay. That’s why we look at SPUD because we
> actually what something inter-domain (at least to signal information
> without negotiation). Therefore the questions for SPUD are for me:
> > >
> > >- How can we ensure that information provided by the end-point does not
> get modified?
> > >
> > >and more complicated
> > >
> > >- How can we ensure that information a middlebox puts in is not
> (wrongly) modified by another middlebox (as there are cases, we we want one
> middlebox to override data of another middlebox…?)
> >
> > I'm CC'ing in some people that I know are interested in working on
> "COSE", a recoding of JOSE into CBOR, but who may not be subscribed to the
> SPUD list.
> >
> > One approach we could take is have the client put a (tube-specific?
> time-limited?) public key into each OPEN packet in a path-accessible way.
> Assertions from the application could be signed with the corresponding
> private key, assertions from the path could be encrypted with the public
> key.
> >
> > I'm worried about the CPU overhead for middleboxen, but we could both
> make this optional in the protocol and required-by-default in the library
> to see what the market shakes out as use cases.
> >
> > --
> > Joe Hildebrand
> >
> >
> >
> >
>
>