Re: [Spud] Additional SPUD use-cases

Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch> Thu, 19 March 2015 18:09 UTC

Return-Path: <mirja.kuehlewind@tik.ee.ethz.ch>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BA811A8A45 for <spud@ietfa.amsl.com>; Thu, 19 Mar 2015 11:09:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.91
X-Spam-Level:
X-Spam-Status: No, score=-3.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YsEC0iZ_Hjup for <spud@ietfa.amsl.com>; Thu, 19 Mar 2015 11:09:17 -0700 (PDT)
Received: from smtp.ee.ethz.ch (smtp.ee.ethz.ch [129.132.2.219]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC0E01A8935 for <spud@ietf.org>; Thu, 19 Mar 2015 11:09:16 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by smtp.ee.ethz.ch (Postfix) with ESMTP id 6E7C1D9305; Thu, 19 Mar 2015 19:09:15 +0100 (MET)
X-Virus-Scanned: by amavisd-new on smtp.ee.ethz.ch
Received: from smtp.ee.ethz.ch ([127.0.0.1]) by localhost (.ee.ethz.ch [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 8K6z3dqAqFr7; Thu, 19 Mar 2015 19:09:15 +0100 (MET)
Received: from 172-27-222-211.dynapool.nyu.edu (NYUFWA-BORDERNAT-GUEST-02.NET.NYU.EDU [192.76.177.125]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: mirjak) by smtp.ee.ethz.ch (Postfix) with ESMTPSA id 36509D9304; Thu, 19 Mar 2015 19:09:14 +0100 (MET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2070.6\))
From: =?utf-8?Q?Mirja_K=C3=BChlewind?= <mirja.kuehlewind@tik.ee.ethz.ch>
In-Reply-To: <CAL02cgSf-2RzVQCQOwNp=Xqmk729kDV5_TcQeXSeYZ+tVsWViw@mail.gmail.com>
Date: Thu, 19 Mar 2015 14:09:12 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <57464AD5-C804-4D94-B81A-842FAEF1A27A@tik.ee.ethz.ch>
References: <B57E4F68-A0C6-44D8-A729-47B1BED309C9@cisco.com> <CA+9kkMB4kfmMuR61aAhHLzrhEK37dEqy9cpdaqdtzpuyoCbBfg@mail.gmail.com> <CE03DB3D7B45C245BCA0D24327794936412E51@MX104CL02.corp.emc.com> <73D46BA8-DB33-481F-B0FB-DDD3B1F0F7FB@cisco.com> <16D94942-1D53-4F7B-8098-29B52781EDA0@tik.ee.ethz.ch> <E6385C88-2236-40EC-BABB-61A97E129EBB@cisco.com> <CAL02cgSf-2RzVQCQOwNp=Xqmk729kDV5_TcQeXSeYZ+tVsWViw@mail.gmail.com>
To: Richard Barnes <rlb@ipv.sx>
X-Mailer: Apple Mail (2.2070.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/QjZXcpyyy9HZhIYoTtvKlL59Ios>
Cc: "Pal Martinsen \(palmarti\)" <palmarti@cisco.com>, "Black, David" <david.black@emc.com>, "spud@ietf.org" <spud@ietf.org>, Mike Jones <Michael.Jones@microsoft.com>, "Joe Hildebrand \(jhildebr\)" <jhildebr@cisco.com>, "Matt Miller \(mamille2\)" <mamille2@cisco.com>, Carsten Bormann <cabo@tzi.org>
Subject: Re: [Spud] Additional SPUD use-cases
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Mar 2015 18:09:19 -0000

Okay, the question is than rather, how can we avoid that non-spud-aware middleboxes accidentally modify spud information which can hinder spud deployment is the same way other approaches failed…? I think we should at least be somehow able to detect these kind of unintentional modifications.

Mirja


> Am 19.03.2015 um 13:56 schrieb Richard Barnes <rlb@ipv.sx>sx>:
> 
> Honestly, this seems quixotic.  Can we just specify that SPUD has a stack of messages, and leave it at that?
> 
> Since there's no authentication of the middleboxes, the endpoint can't tell the difference between a middlebox changing a value and just deleting it and replacing it, which it can still do in this scheme.  
> 
> You might think you could prevent middleboxes from seeing each others' messages, but since there's no authentication on the *endpoint* keys, a middlebox could just replace the key and send the messages on, then take things on the return path, snarf whatever messages it wants, and re-encrypt them to the real key.
> 
> So there is very limited benefit here, if at all.
> 
> On Thu, Mar 19, 2015 at 1:17 PM, Joe Hildebrand (jhildebr) <jhildebr@cisco.com> wrote:
> On 3/19/15, 9:38 AM, "Mirja Kühlewind" <mirja.kuehlewind@tik.ee.ethz.ch> wrote:
> 
> >just a quick though on our comment regarding basically ‚why does DSCP not work inter-domain‘. One answer to this question is that is it mostly used intra-domain and that’s okay. That’s why we look at SPUD because we actually what something inter-domain (at least to signal information without negotiation). Therefore the questions for SPUD are for me:
> >
> >- How can we ensure that information provided by the end-point does not get modified?
> >
> >and more complicated
> >
> >- How can we ensure that information a middlebox puts in is not (wrongly) modified by another middlebox (as there are cases, we we want one middlebox to override data of another middlebox…?)
> 
> I'm CC'ing in some people that I know are interested in working on "COSE", a recoding of JOSE into CBOR, but who may not be subscribed to the SPUD list.
> 
> One approach we could take is have the client put a (tube-specific? time-limited?) public key into each OPEN packet in a path-accessible way.  Assertions from the application could be signed with the corresponding private key, assertions from the path could be encrypted with the public key.
> 
> I'm worried about the CPU overhead for middleboxen, but we could both make this optional in the protocol and required-by-default in the library to see what the market shakes out as use cases.
> 
> --
> Joe Hildebrand
> 
> 
> 
>