Re: [Spud] Additional SPUD use-cases
Richard Barnes <rlb@ipv.sx> Thu, 19 March 2015 19:03 UTC
Return-Path: <rlb@ipv.sx>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id D64041A878A
for <spud@ietfa.amsl.com>; Thu, 19 Mar 2015 12:03:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.677
X-Spam-Level:
X-Spam-Status: No, score=-1.677 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001,
MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-0.7] autolearn=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id jFyoBXsUMjFf for <spud@ietfa.amsl.com>;
Thu, 19 Mar 2015 12:03:55 -0700 (PDT)
Received: from mail-la0-f52.google.com (mail-la0-f52.google.com
[209.85.215.52])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 43D041A8742
for <spud@ietf.org>; Thu, 19 Mar 2015 12:03:55 -0700 (PDT)
Received: by labjg1 with SMTP id jg1so70011430lab.2
for <spud@ietf.org>; Thu, 19 Mar 2015 12:03:53 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20130820;
h=x-gm-message-state:mime-version:in-reply-to:references:date
:message-id:subject:from:to:cc:content-type;
bh=aJmvJlv26Si3vj4/05foVGDodD010QoYAmb6i4yLngo=;
b=A9u+yl0hfS40qx1GvZFSH9/c04cH2OLxvnyu8EJzPksXMNOuMAqWRRlH6f9PC85Qxz
irFdalNj4HxjS0WNa5MoM/iY11a1uBlkVem0iect8eK+eTz8kbEkSUQmmIN6IItWD7Ac
MvJJzGc62PoFLqLWMm0qdPSe+fgb6OWKRFyZOLlklV9tUSC0R31LKWTP1eM34vFayLrJ
N1lY0aJCaGz16YeqflJ5R6QjNAkZ5HkP9aAknfsfLv+R0ZivI9Niv9PJZCDrVXjU2yyg
WczeIzHyMZS+8YyRQVlAupZbQF/OlQxZ1NTOaPg3sMgMBqEpOn+nUgxRG+fUWO1jHbmn
qcMw==
X-Gm-Message-State: ALoCoQnxRSCh3h6aGGXmPrKNWST06LvUZUG9SxFXZTn1hOPi1uuBFKRvl1lGVAIfU24m2o+EHdxM
MIME-Version: 1.0
X-Received: by 10.112.98.201 with SMTP id ek9mr70299309lbb.68.1426791833669;
Thu, 19 Mar 2015 12:03:53 -0700 (PDT)
Received: by 10.25.135.4 with HTTP; Thu, 19 Mar 2015 12:03:53 -0700 (PDT)
In-Reply-To: <57464AD5-C804-4D94-B81A-842FAEF1A27A@tik.ee.ethz.ch>
References: <B57E4F68-A0C6-44D8-A729-47B1BED309C9@cisco.com>
<CA+9kkMB4kfmMuR61aAhHLzrhEK37dEqy9cpdaqdtzpuyoCbBfg@mail.gmail.com>
<CE03DB3D7B45C245BCA0D24327794936412E51@MX104CL02.corp.emc.com>
<73D46BA8-DB33-481F-B0FB-DDD3B1F0F7FB@cisco.com>
<16D94942-1D53-4F7B-8098-29B52781EDA0@tik.ee.ethz.ch>
<E6385C88-2236-40EC-BABB-61A97E129EBB@cisco.com>
<CAL02cgSf-2RzVQCQOwNp=Xqmk729kDV5_TcQeXSeYZ+tVsWViw@mail.gmail.com>
<57464AD5-C804-4D94-B81A-842FAEF1A27A@tik.ee.ethz.ch>
Date: Thu, 19 Mar 2015 15:03:53 -0400
Message-ID: <CAL02cgQxxJaZb+CrDvZSwxdAU7htzoSpVdHu7hfAK-GUUYkXUA@mail.gmail.com>
From: Richard Barnes <rlb@ipv.sx>
To: =?UTF-8?Q?Mirja_K=C3=BChlewind?= <mirja.kuehlewind@tik.ee.ethz.ch>
Content-Type: multipart/alternative; boundary=001a11345c8c6a2af70511a8dc32
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/FCViYG0GRcXJU95dFY1fvTNIcv4>
Cc: "Pal Martinsen \(palmarti\)" <palmarti@cisco.com>, "Black,
David" <david.black@emc.com>, "spud@ietf.org" <spud@ietf.org>,
Mike Jones <Michael.Jones@microsoft.com>,
"Joe Hildebrand \(jhildebr\)" <jhildebr@cisco.com>,
"Matt Miller \(mamille2\)" <mamille2@cisco.com>,
Carsten Bormann <cabo@tzi.org>
Subject: Re: [Spud] Additional SPUD use-cases
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>,
<mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>,
<mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Mar 2015 19:03:57 -0000
I see. That's a different question. Seems like some sort of basic consistency check / checksum would be sufficient? On Thu, Mar 19, 2015 at 2:09 PM, Mirja Kühlewind < mirja.kuehlewind@tik.ee.ethz.ch> wrote: > Okay, the question is than rather, how can we avoid that non-spud-aware > middleboxes accidentally modify spud information which can hinder spud > deployment is the same way other approaches failed…? I think we should at > least be somehow able to detect these kind of unintentional modifications. > > Mirja > > > > Am 19.03.2015 um 13:56 schrieb Richard Barnes <rlb@ipv.sx>sx>: > > > > Honestly, this seems quixotic. Can we just specify that SPUD has a > stack of messages, and leave it at that? > > > > Since there's no authentication of the middleboxes, the endpoint can't > tell the difference between a middlebox changing a value and just deleting > it and replacing it, which it can still do in this scheme. > > > > You might think you could prevent middleboxes from seeing each others' > messages, but since there's no authentication on the *endpoint* keys, a > middlebox could just replace the key and send the messages on, then take > things on the return path, snarf whatever messages it wants, and re-encrypt > them to the real key. > > > > So there is very limited benefit here, if at all. > > > > On Thu, Mar 19, 2015 at 1:17 PM, Joe Hildebrand (jhildebr) < > jhildebr@cisco.com> wrote: > > On 3/19/15, 9:38 AM, "Mirja Kühlewind" <mirja.kuehlewind@tik.ee.ethz.ch> > wrote: > > > > >just a quick though on our comment regarding basically ‚why does DSCP > not work inter-domain‘. One answer to this question is that is it mostly > used intra-domain and that’s okay. That’s why we look at SPUD because we > actually what something inter-domain (at least to signal information > without negotiation). Therefore the questions for SPUD are for me: > > > > > >- How can we ensure that information provided by the end-point does not > get modified? > > > > > >and more complicated > > > > > >- How can we ensure that information a middlebox puts in is not > (wrongly) modified by another middlebox (as there are cases, we we want one > middlebox to override data of another middlebox…?) > > > > I'm CC'ing in some people that I know are interested in working on > "COSE", a recoding of JOSE into CBOR, but who may not be subscribed to the > SPUD list. > > > > One approach we could take is have the client put a (tube-specific? > time-limited?) public key into each OPEN packet in a path-accessible way. > Assertions from the application could be signed with the corresponding > private key, assertions from the path could be encrypted with the public > key. > > > > I'm worried about the CPU overhead for middleboxen, but we could both > make this optional in the protocol and required-by-default in the library > to see what the market shakes out as use cases. > > > > -- > > Joe Hildebrand > > > > > > > > > >
- [Spud] Additional SPUD use-cases Pal Martinsen (palmarti)
- Re: [Spud] Additional SPUD use-cases Ted Hardie
- Re: [Spud] Additional SPUD use-cases Black, David
- Re: [Spud] Additional SPUD use-cases Pal Martinsen (palmarti)
- Re: [Spud] Additional SPUD use-cases Pal Martinsen (palmarti)
- Re: [Spud] Additional SPUD use-cases Black, David
- Re: [Spud] Additional SPUD use-cases Aaron Falk
- Re: [Spud] Additional SPUD use-cases gorry
- Re: [Spud] Additional SPUD use-cases Eggert, Lars
- Re: [Spud] Additional SPUD use-cases Aaron Falk
- Re: [Spud] Additional SPUD use-cases Black, David
- Re: [Spud] Additional SPUD use-cases Mirja Kühlewind
- Re: [Spud] Additional SPUD use-cases Richard Barnes
- Re: [Spud] Additional SPUD use-cases Joe Hildebrand (jhildebr)
- Re: [Spud] Additional SPUD use-cases Joe Hildebrand (jhildebr)
- Re: [Spud] Additional SPUD use-cases Richard Barnes
- Re: [Spud] Additional SPUD use-cases Mirja Kühlewind