[Spud] endpoint control

"Smith, Kevin, (R&D) Vodafone Group" <Kevin.Smith@vodafone.com> Tue, 28 June 2016 10:42 UTC

Return-Path: <Kevin.Smith@vodafone.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CFA612DDD2 for <spud@ietfa.amsl.com>; Tue, 28 Jun 2016 03:42:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iuvQNYJx_IJB for <spud@ietfa.amsl.com>; Tue, 28 Jun 2016 03:42:21 -0700 (PDT)
Received: from mail1.bemta5.messagelabs.com (mail1.bemta5.messagelabs.com [195.245.231.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92C5212DDEF for <spud@ietf.org>; Tue, 28 Jun 2016 03:42:03 -0700 (PDT)
Received: from [85.158.136.83] by server-7.bemta-5.messagelabs.com id 66/A7-10476-97452775; Tue, 28 Jun 2016 10:42:01 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrDIsWRWlGSWpSXmKPExsVy+MWXdt3KkKJ wgzkiFhtb3rFZLLrwlNGByWPJkp9MHk/2z2QJYIpizcxLyq9IYM34v9ql4A97xbbOj8wNjBfY uhi5OIQE9jJKHF3dwwLhrGSUOPBhBpSznEmif8YDVgjnCKNE440VUD2bGSWWTN8ClOHkYBNwl Ti66w57FyMHh4iAlUTTck2QMLOAssSMhbsYQcLCAgoSx/cUgoRFBFQl+nsnsEPYehIzn29hBr FZgOIHrjxiA7F5BUIl2ua9ArMZBWQlvjSuZoYYKS5x68l8JhBbQkBAYsme88wQtqjEy8f/WCF qdCQW7P7EBmFrSyxb+JoZYqagxMmZT1gmMIrMQjJqFpKWWUhaZiFpWcDIsopRozi1qCy1SNfQ QC+pKDM9oyQ3MTMHyDPVy00tLk5MT81JTCrWS87P3cQIjBUGINjBuGaq8yFGSQ4mJVHeBQxF4 UJ8SfkplRmJxRnxRaU5qcWHGGU4OJQkeP2DgXKCRanpqRVpmTnAqIVJS3DwKInwKoGkeYsLEn OLM9MhUqcYFaXEeTNBEgIgiYzSPLg2WKK4xCgrJczLCHSIEE9BalFuZgmq/CtGcQ5GJWFefpA pPJl5JXDTXwEtZgJazFqdD7K4JBEhJdXAGP7IWWvK+8kTLxXMyPOZ+bBSedcLroDtt5WeTtvG rdcdFK51ht2zLGXFPFuBlFdBZbsehHZP/XXL/cahOs6jUnWPMjav6WL6Y7Zne1Uk19QrU5d41 Dptfff7X2XCV4a24CPPp5339lko+G7RmZwdS6+ob6x03zvR51f04VdG91aY/BK0MCgwL1FiKc 5INNRiLipOBAAtqaMHDwMAAA==
X-Env-Sender: Kevin.Smith@vodafone.com
X-Msg-Ref: server-16.tower-36.messagelabs.com!1467110520!42107333!1
X-Originating-IP: [195.232.244.135]
X-StarScan-Received:
X-StarScan-Version: 8.46; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 18329 invoked from network); 28 Jun 2016 10:42:00 -0000
Received: from mailout03.vodafone.com (HELO mailout03.vodafone.com) (195.232.244.135) by server-16.tower-36.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 28 Jun 2016 10:42:00 -0000
Received: from mailint02.vodafone.com (mailint02.vodafone.com [195.232.244.199]) by mailout03.vodafone.com (Postfix) with ESMTP id 3rf2Rr4XWpz17HLk; Tue, 28 Jun 2016 12:42:00 +0200 (CEST)
Received: from mailint02.vodafone.com (localhost [127.0.0.1]) by mailint02.vodafone.com (Postfix) with ESMTP id 3rf2Rr3GrfzQyfr; Tue, 28 Jun 2016 12:42:00 +0200 (CEST)
Received: from VOEXC01W.internal.vodafone.com (voexc01w.dc-ratingen.de [145.230.101.21]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailint02.vodafone.com (Postfix) with ESMTPS id 3rf2Rr2x09zQyfj; Tue, 28 Jun 2016 12:42:00 +0200 (CEST)
Received: from AVOEXH03W.internal.vodafone.com (145.230.15.141) by VOEXC01W.internal.vodafone.com (145.230.101.21) with Microsoft SMTP Server (TLS) id 14.3.224.2; Tue, 28 Jun 2016 12:41:58 +0200
Received: from VOEXM17W.internal.vodafone.com ([169.254.1.75]) by AVOEXH03W.internal.vodafone.com ([145.230.15.141]) with mapi id 14.03.0224.002; Tue, 28 Jun 2016 12:41:53 +0200
From: "Smith, Kevin, (R&D) Vodafone Group" <Kevin.Smith@vodafone.com>
To: "Brian Trammell (ietf@trammell.ch)" <ietf@trammell.ch>
Thread-Topic: [Spud] endpoint control
Thread-Index: AdHRKB6Rk1yBi0AtT2GnUMPMbLGi+g==
Date: Tue, 28 Jun 2016 10:41:52 +0000
Message-ID: <A4BAAB326B17CE40B45830B745F70F10EE37ACAE@VOEXM17W.internal.vodafone.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/spud/J7Vm-ARCDIKawP1UY69pbk2zTq4>
Cc: "spud@ietf.org" <spud@ietf.org>
Subject: [Spud] endpoint control
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Jun 2016 10:42:25 -0000

Hi Brian,

I think Mobile Throughput Guidance would be a good candidate for PLUS path-to-endpoint signalling. The latest (albeit expired) MTG draft [1] is bound to TCP Options, and was considering use of TCP-AO for authentication; PLUS could allow MTG for both TCP and UDP-based flows. However it seems that proposed PLUS mechanism:

>(1) For forward signaling, the sending endpoint must place "scratch space" in the packet with a label on it stating that it's okay to modify; this okay-to-modify state is enforced by a MAC which only verifies the length but not the content of the scratch space.

...may not provide the guarantee that (1) the MTG information was indeed injected by the cellular network and (2) that it has not been modified by another node. Have I got that right? Or would such an authentication/integrity check applicable to path data be in scope of PLUS?

Cheers,
Kevin
Vodafone R&D

[1] https://www.ietf.org/archive/id/draft-flinck-mobile-throughput-guidance-03.txt , expired