Re: [Spud] Additional SPUD use-cases
Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch> Thu, 19 March 2015 18:09 UTC
Return-Path: <mirja.kuehlewind@tik.ee.ethz.ch>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 7BA811A8A45
for <spud@ietfa.amsl.com>; Thu, 19 Mar 2015 11:09:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.91
X-Spam-Level:
X-Spam-Status: No, score=-3.91 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-2.3,
T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id YsEC0iZ_Hjup for <spud@ietfa.amsl.com>;
Thu, 19 Mar 2015 11:09:17 -0700 (PDT)
Received: from smtp.ee.ethz.ch (smtp.ee.ethz.ch [129.132.2.219])
(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id EC0E01A8935
for <spud@ietf.org>; Thu, 19 Mar 2015 11:09:16 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1])
by smtp.ee.ethz.ch (Postfix) with ESMTP id 6E7C1D9305;
Thu, 19 Mar 2015 19:09:15 +0100 (MET)
X-Virus-Scanned: by amavisd-new on smtp.ee.ethz.ch
Received: from smtp.ee.ethz.ch ([127.0.0.1])
by localhost (.ee.ethz.ch [127.0.0.1]) (amavisd-new, port 10024)
with LMTP id 8K6z3dqAqFr7; Thu, 19 Mar 2015 19:09:15 +0100 (MET)
Received: from 172-27-222-211.dynapool.nyu.edu
(NYUFWA-BORDERNAT-GUEST-02.NET.NYU.EDU [192.76.177.125])
(using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
(No client certificate requested) (Authenticated sender: mirjak)
by smtp.ee.ethz.ch (Postfix) with ESMTPSA id 36509D9304;
Thu, 19 Mar 2015 19:09:14 +0100 (MET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2070.6\))
From: =?utf-8?Q?Mirja_K=C3=BChlewind?= <mirja.kuehlewind@tik.ee.ethz.ch>
In-Reply-To: <CAL02cgSf-2RzVQCQOwNp=Xqmk729kDV5_TcQeXSeYZ+tVsWViw@mail.gmail.com>
Date: Thu, 19 Mar 2015 14:09:12 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <57464AD5-C804-4D94-B81A-842FAEF1A27A@tik.ee.ethz.ch>
References: <B57E4F68-A0C6-44D8-A729-47B1BED309C9@cisco.com>
<CA+9kkMB4kfmMuR61aAhHLzrhEK37dEqy9cpdaqdtzpuyoCbBfg@mail.gmail.com>
<CE03DB3D7B45C245BCA0D24327794936412E51@MX104CL02.corp.emc.com>
<73D46BA8-DB33-481F-B0FB-DDD3B1F0F7FB@cisco.com>
<16D94942-1D53-4F7B-8098-29B52781EDA0@tik.ee.ethz.ch>
<E6385C88-2236-40EC-BABB-61A97E129EBB@cisco.com>
<CAL02cgSf-2RzVQCQOwNp=Xqmk729kDV5_TcQeXSeYZ+tVsWViw@mail.gmail.com>
To: Richard Barnes <rlb@ipv.sx>
X-Mailer: Apple Mail (2.2070.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/QjZXcpyyy9HZhIYoTtvKlL59Ios>
Cc: "Pal Martinsen \(palmarti\)" <palmarti@cisco.com>, "Black,
David" <david.black@emc.com>, "spud@ietf.org" <spud@ietf.org>,
Mike Jones <Michael.Jones@microsoft.com>,
"Joe Hildebrand \(jhildebr\)" <jhildebr@cisco.com>,
"Matt Miller \(mamille2\)" <mamille2@cisco.com>,
Carsten Bormann <cabo@tzi.org>
Subject: Re: [Spud] Additional SPUD use-cases
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>,
<mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>,
<mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Mar 2015 18:09:19 -0000
Okay, the question is than rather, how can we avoid that non-spud-aware middleboxes accidentally modify spud information which can hinder spud deployment is the same way other approaches failed…? I think we should at least be somehow able to detect these kind of unintentional modifications. Mirja > Am 19.03.2015 um 13:56 schrieb Richard Barnes <rlb@ipv.sx>sx>: > > Honestly, this seems quixotic. Can we just specify that SPUD has a stack of messages, and leave it at that? > > Since there's no authentication of the middleboxes, the endpoint can't tell the difference between a middlebox changing a value and just deleting it and replacing it, which it can still do in this scheme. > > You might think you could prevent middleboxes from seeing each others' messages, but since there's no authentication on the *endpoint* keys, a middlebox could just replace the key and send the messages on, then take things on the return path, snarf whatever messages it wants, and re-encrypt them to the real key. > > So there is very limited benefit here, if at all. > > On Thu, Mar 19, 2015 at 1:17 PM, Joe Hildebrand (jhildebr) <jhildebr@cisco.com> wrote: > On 3/19/15, 9:38 AM, "Mirja Kühlewind" <mirja.kuehlewind@tik.ee.ethz.ch> wrote: > > >just a quick though on our comment regarding basically ‚why does DSCP not work inter-domain‘. One answer to this question is that is it mostly used intra-domain and that’s okay. That’s why we look at SPUD because we actually what something inter-domain (at least to signal information without negotiation). Therefore the questions for SPUD are for me: > > > >- How can we ensure that information provided by the end-point does not get modified? > > > >and more complicated > > > >- How can we ensure that information a middlebox puts in is not (wrongly) modified by another middlebox (as there are cases, we we want one middlebox to override data of another middlebox…?) > > I'm CC'ing in some people that I know are interested in working on "COSE", a recoding of JOSE into CBOR, but who may not be subscribed to the SPUD list. > > One approach we could take is have the client put a (tube-specific? time-limited?) public key into each OPEN packet in a path-accessible way. Assertions from the application could be signed with the corresponding private key, assertions from the path could be encrypted with the public key. > > I'm worried about the CPU overhead for middleboxen, but we could both make this optional in the protocol and required-by-default in the library to see what the market shakes out as use cases. > > -- > Joe Hildebrand > > > >
- [Spud] Additional SPUD use-cases Pal Martinsen (palmarti)
- Re: [Spud] Additional SPUD use-cases Ted Hardie
- Re: [Spud] Additional SPUD use-cases Black, David
- Re: [Spud] Additional SPUD use-cases Pal Martinsen (palmarti)
- Re: [Spud] Additional SPUD use-cases Pal Martinsen (palmarti)
- Re: [Spud] Additional SPUD use-cases Black, David
- Re: [Spud] Additional SPUD use-cases Aaron Falk
- Re: [Spud] Additional SPUD use-cases gorry
- Re: [Spud] Additional SPUD use-cases Eggert, Lars
- Re: [Spud] Additional SPUD use-cases Aaron Falk
- Re: [Spud] Additional SPUD use-cases Black, David
- Re: [Spud] Additional SPUD use-cases Mirja Kühlewind
- Re: [Spud] Additional SPUD use-cases Richard Barnes
- Re: [Spud] Additional SPUD use-cases Joe Hildebrand (jhildebr)
- Re: [Spud] Additional SPUD use-cases Joe Hildebrand (jhildebr)
- Re: [Spud] Additional SPUD use-cases Richard Barnes
- Re: [Spud] Additional SPUD use-cases Mirja Kühlewind