Re: [Spud] SPUD Scope?

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Fri, 05 June 2015 23:12 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D14B31ABD35 for <spud@ietfa.amsl.com>; Fri, 5 Jun 2015 16:12:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.001
X-Spam-Level:
X-Spam-Status: No, score=-0.001 tagged_above=-999 required=5 tests=[BAYES_20=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V4v-JgERZgxs for <spud@ietfa.amsl.com>; Fri, 5 Jun 2015 16:12:27 -0700 (PDT)
Received: from che.mayfirst.org (che.mayfirst.org [209.234.253.108]) by ietfa.amsl.com (Postfix) with ESMTP id 8CBAE1AC398 for <spud@ietf.org>; Fri, 5 Jun 2015 16:11:46 -0700 (PDT)
Received: from fifthhorseman.net (unknown [38.109.115.130]) by che.mayfirst.org (Postfix) with ESMTPSA id C1D66F984; Fri, 5 Jun 2015 19:11:43 -0400 (EDT)
Received: by fifthhorseman.net (Postfix, from userid 1000) id 1AD8A20304; Fri, 5 Jun 2015 19:11:21 -0400 (EDT)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: Szilveszter Nadas <Szilveszter.Nadas@ericsson.com>, Christian Huitema <huitema@microsoft.com>, "spud\@ietf.org" <spud@ietf.org>
In-Reply-To: <EA4C43BE752A194597B002779DF69BAE23D48602@ESESSMB303.ericsson.se>
References: <EA4C43BE752A194597B002779DF69BAE23D47A3E@ESESSMB303.ericsson.se> <87h9qn1dkr.fsf@alice.fifthhorseman.net> <DM2PR0301MB0655E175AD817C6D896F7E7DA8B30@DM2PR0301MB0655.namprd03.prod.outlook.com> <EA4C43BE752A194597B002779DF69BAE23D48602@ESESSMB303.ericsson.se>
User-Agent: Notmuch/0.20.1 (http://notmuchmail.org) Emacs/24.4.1 (x86_64-pc-linux-gnu)
Date: Fri, 05 Jun 2015 19:11:21 -0400
Message-ID: <87oaktvjhi.fsf@alice.fifthhorseman.net>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/hb5KMCx_2_uP587T86AtVI61Vqo>
Subject: Re: [Spud] SPUD Scope?
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jun 2015 23:12:30 -0000

On Fri 2015-06-05 06:37:53 -0400, Szilveszter Nadas wrote:

> My concern is whether the whole SPUD exercise is worth the effort
> without extensibility. Assume that we can agree in a minimal set for
> b). What if in a few years' time we realize that we need more? Have
> not we already ossified the middlebox layer?

I think the "ossification of the network stack" means something
different than what you're using it to mean here.

On the networks i deal with, the ossification comes from middleboxes
being too fancy, and not just passing traffic the way that edge devices
expect.  As a result, the software running at the edge squeezes itself
into a very limited profile of network traffic just to avoid
harrassment/breakage by the (often unknown) middleboxes that might sit
on-path to any of its peers.

> About "metadata that our protocols leak", I completely agree that
> protocols should minimize this leaking. I think that explicit
> conversation is not leaking though and hopefully also discourages the
> middlebox owners to try to look into the protocol data itself.

how does the endpoint know that it is talking to an actual middlebox
that is relevant to its communication?  the endpoint wants to talk to
someone *other* than the middlebox (it wants to talk to the remote peer,
the middlebox is just a postal carrier), and it puts itself (and maybe
its peer) at risk if it entertains any "explicit conversation" from an
adversary posing as a middlebox.

There will always be middlebox vendors who think their business is the
deepest of packet inspection, whether they claim to offer Data Loss
Prevention or Malware Detection or some other unattainable goal.  I
don't see how any SPUD-like mechanism would deter those vendors from
cracking open any layer they can try to crack open.  And it sounds like
it would give them some points of leverage to start with, as well.

> Any device/firmware/Operating System/app still have and will have ways
> to leak whatever it wants, just by not allowing extensibility in SPUD
> we cannot stop it. At the same time extensible SPUD can be an engine
> for "good" cooperation.

Let's hear some examples of that "good" cooperation, and make sure they
include protections against abuse.  So far, the only example i've heard
is the ability for peers to mark each packet as delay-tolerant ("please
queue") or disposable ("please discard"), so that the middleboxes can
make a marginally better guess what to with it do under load.  The
argument for start/stop signalling for UDP still seems weak to me.

> About "keeping the smarts at the edge" the IAB program at least
> includes a goal to "(2) Improving path transparency in the presence of
> firewalls and middleboxes: guidelines for the detection of and
> cooperation with these devices to evolve away from present limitations
> on which protocols can be used across network boundaries, in order to
> facilitate innovation in transport protocol development. ".

You know why we can't innovate in transport protocol development, right?
Because too many middleboxes like to block traffic that they find
surprising.  If they were to stop blocking much of that traffic, we
could run things like SCTP or TCPCrypt reliably on the open Internet
instead of everyone pretending to be TLS-on-port-443, without the need
of anything like SPUD.

> About the UI/UX concern. This is definitely an issue and not an easy
> one to solve. Trust chains, delegation of trust, market apps
> controlling app rights are pieces of the puzzle to solve this. I think
> it is possible to find a solution for this with a good balance of ease
> of use and control.

I've seen no evidence of this (i also don't know what "market apps
controlling app rights" means). I'd love to see some pointers to
examples of UI/UX mockups that we can reason about (though i don't know
if SPUD is the right place to do this).

Regards,

     --dkg