Re: [Spud] Additional SPUD use-cases

Richard Barnes <rlb@ipv.sx> Thu, 19 March 2015 17:56 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E67D41A8907 for <spud@ietfa.amsl.com>; Thu, 19 Mar 2015 10:56:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level:
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zt_w8tFNs0rx for <spud@ietfa.amsl.com>; Thu, 19 Mar 2015 10:56:04 -0700 (PDT)
Received: from mail-la0-f51.google.com (mail-la0-f51.google.com [209.85.215.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CED7C1A88F6 for <spud@ietf.org>; Thu, 19 Mar 2015 10:56:03 -0700 (PDT)
Received: by ladw1 with SMTP id w1so68543313lad.0 for <spud@ietf.org>; Thu, 19 Mar 2015 10:56:02 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=gfckzfETLPxqPqPIO5bFQASWlpPoDwOd/mmRvR0gRm4=; b=WGkwuf/4Umm5GBsPOx0NmyPc5VccDDeLIdPijhhhd8EwPtwr5ZYaI/BtbYYSmZouTB XXMb0ioCaHB1Fq60yHL8RsuUe2o5u49EswvHPl1awZxhGltzecjFB+HuZq7NkVOWWOjL kc2inyUQLMDR6eS+8TcoVo2km8xwEsmfRy3bNGLTCZjon78P4SCiAsQpDxG94zvSZ5xY Rn6gVz1fQyKKBHWkRTiqIEjUFIuIpHCM/O5tnHiXiG3AfruEHMb6RwdZbK1mqXF79Ev2 CS8cS6oN1pWMFRpJzWXUE9meAqYmPu/+LjA4bDckj1bP89s/sXXFMsr+hVeRf7GIdnwa ogMw==
X-Gm-Message-State: ALoCoQnzlCVrYbZDI9tpVwh+LeLS1raszXz6wERQP2UOQ8pl7uL6BE6DqGgvUFyamaJ9wjX8tHB9
MIME-Version: 1.0
X-Received: by 10.112.155.65 with SMTP id vu1mr40430068lbb.61.1426787762274; Thu, 19 Mar 2015 10:56:02 -0700 (PDT)
Received: by 10.25.135.4 with HTTP; Thu, 19 Mar 2015 10:56:02 -0700 (PDT)
In-Reply-To: <E6385C88-2236-40EC-BABB-61A97E129EBB@cisco.com>
References: <B57E4F68-A0C6-44D8-A729-47B1BED309C9@cisco.com> <CA+9kkMB4kfmMuR61aAhHLzrhEK37dEqy9cpdaqdtzpuyoCbBfg@mail.gmail.com> <CE03DB3D7B45C245BCA0D24327794936412E51@MX104CL02.corp.emc.com> <73D46BA8-DB33-481F-B0FB-DDD3B1F0F7FB@cisco.com> <16D94942-1D53-4F7B-8098-29B52781EDA0@tik.ee.ethz.ch> <E6385C88-2236-40EC-BABB-61A97E129EBB@cisco.com>
Date: Thu, 19 Mar 2015 13:56:02 -0400
Message-ID: <CAL02cgSf-2RzVQCQOwNp=Xqmk729kDV5_TcQeXSeYZ+tVsWViw@mail.gmail.com>
From: Richard Barnes <rlb@ipv.sx>
To: "Joe Hildebrand (jhildebr)" <jhildebr@cisco.com>
Content-Type: multipart/alternative; boundary=089e01183042bd9d8d0511a7e92c
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/GdIe3tFZ1ZJbCRa7ruuhilzEVFo>
X-Mailman-Approved-At: Thu, 19 Mar 2015 11:02:05 -0700
Cc: "Pal Martinsen \(palmarti\)" <palmarti@cisco.com>, "Black, David" <david.black@emc.com>, "spud@ietf.org" <spud@ietf.org>, Mike Jones <Michael.Jones@microsoft.com>, =?UTF-8?Q?Mirja_K=C3=BChlewind?= <mirja.kuehlewind@tik.ee.ethz.ch>, "Matt Miller \(mamille2\)" <mamille2@cisco.com>, Carsten Bormann <cabo@tzi.org>
Subject: Re: [Spud] Additional SPUD use-cases
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Mar 2015 17:56:11 -0000

Honestly, this seems quixotic.  Can we just specify that SPUD has a stack
of messages, and leave it at that?

Since there's no authentication of the middleboxes, the endpoint can't tell
the difference between a middlebox changing a value and just deleting it
and replacing it, which it can still do in this scheme.

You might think you could prevent middleboxes from seeing each others'
messages, but since there's no authentication on the *endpoint* keys, a
middlebox could just replace the key and send the messages on, then take
things on the return path, snarf whatever messages it wants, and re-encrypt
them to the real key.

So there is very limited benefit here, if at all.

On Thu, Mar 19, 2015 at 1:17 PM, Joe Hildebrand (jhildebr) <
jhildebr@cisco.com> wrote:

> On 3/19/15, 9:38 AM, "Mirja Kühlewind" <mirja.kuehlewind@tik.ee.ethz.ch>
> wrote:
>
> >just a quick though on our comment regarding basically ‚why does DSCP not
> work inter-domain‘. One answer to this question is that is it mostly used
> intra-domain and that’s okay. That’s why we look at SPUD because we
> actually what something inter-domain (at least to signal information
> without negotiation). Therefore the questions for SPUD are for me:
> >
> >- How can we ensure that information provided by the end-point does not
> get modified?
> >
> >and more complicated
> >
> >- How can we ensure that information a middlebox puts in is not (wrongly)
> modified by another middlebox (as there are cases, we we want one middlebox
> to override data of another middlebox…?)
>
> I'm CC'ing in some people that I know are interested in working on "COSE",
> a recoding of JOSE into CBOR, but who may not be subscribed to the SPUD
> list.
>
> One approach we could take is have the client put a (tube-specific?
> time-limited?) public key into each OPEN packet in a path-accessible way.
> Assertions from the application could be signed with the corresponding
> private key, assertions from the path could be encrypted with the public
> key.
>
> I'm worried about the CPU overhead for middleboxen, but we could both make
> this optional in the protocol and required-by-default in the library to see
> what the market shakes out as use cases.
>
> --
> Joe Hildebrand
>
>
>
>