Re: [Spud] on trust and lying

Salvatore Loreto <salvatore.loreto@ericsson.com> Wed, 25 March 2015 19:20 UTC

Return-Path: <salvatore.loreto@ericsson.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C7F21B2A38 for <spud@ietfa.amsl.com>; Wed, 25 Mar 2015 12:20:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mn4j9KQ8a7O9 for <spud@ietfa.amsl.com>; Wed, 25 Mar 2015 12:20:02 -0700 (PDT)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C28381B2ACA for <spud@ietf.org>; Wed, 25 Mar 2015 12:20:01 -0700 (PDT)
X-AuditID: c1b4fb2d-f79a46d0000006b4-da-55130a5fec56
Received: from ESESSHC024.ericsson.se (Unknown_Domain [153.88.253.124]) by sessmg23.ericsson.net (Symantec Mail Security) with SMTP id 95.30.01716.F5A03155; Wed, 25 Mar 2015 20:20:00 +0100 (CET)
Received: from ESESSMB109.ericsson.se ([169.254.9.246]) by ESESSHC024.ericsson.se ([153.88.183.90]) with mapi id 14.03.0210.002; Wed, 25 Mar 2015 20:19:59 +0100
From: Salvatore Loreto <salvatore.loreto@ericsson.com>
To: Eliot Lear <lear@cisco.com>
Thread-Topic: [Spud] on trust and lying
Thread-Index: AQHQZy2GvCD/AF7sBUm9j9wy38KslJ0tgj2A
Date: Wed, 25 Mar 2015 19:19:59 +0000
Message-ID: <95859196-9247-4162-B175-6A1E4405BE0C@ericsson.com>
References: <551304ED.7080601@cisco.com>
In-Reply-To: <551304ED.7080601@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [153.88.183.149]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <44A71BFF42D17949A60421D8C73FFBE8@ericsson.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmplkeLIzCtJLcpLzFFi42KZGfG3RjeBSzjUYOJNTouv/zpYLBZdeMro wOQx5fdGVo8lS34yBTBFcdmkpOZklqUW6dslcGWcuvOfteAqT0Xvh/nsDYwTuLoYOTgkBEwk lh4v72LkBDLFJC7cW8/WxcjFISRwhFHi7o2HrBDOEkaJ+/9eMoNUsQmYSTx/uAXMFhGQl2g9 u58VxGYWUJaYsXAXI4gtLKAmcez9RkaIGnWJvifzoeqNJGYvfMMCYrMIqErcWfoBrJdXwF7i w48N7CC2kICGROu6HrB6TgFNiT8Pr4PVMwJd9/3UGiaIXeISt57MZ4K4WkBiyZ7zzBC2qMTL x/9YIWwlibWHt7NA1OtILNj9iQ3Ctpb4+mg5VFxbYtnC18wQNwhKnJz5hGUCo/gsJCtmIWmf haR9FpL2WUjaFzCyrmIULU4tLs5NNzLWSy3KTC4uzs/Ty0st2cQIjLeDW37r7mBc/drxEKMA B6MSD+9GFaFQIdbEsuLK3EOM0hwsSuK8dsaHQoQE0hNLUrNTUwtSi+KLSnNSiw8xMnFwSjUw xt0V92V4lSl4ZYGjcMW0gohCteKU1voPF4Q517A5yxY9StfsbcwU4lLZIWfF+qftzacYnSNi 3FHql/Q6rFTMgwpfHrilveSRn69O3Bn2B2LF1i+KMw50mau+22THdNb+g8rswoKidQk67wxD S5aI7nudxj5B1r8sxE6aV8r9lafzZYc9v5RYijMSDbWYi4oTASwf4TaYAgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/kby7Do0Pl0Q1OfL0REjsJF8rR_8>
Cc: "spud@ietf.org" <spud@ietf.org>
Subject: Re: [Spud] on trust and lying
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2015 19:20:03 -0000

I do think that we need a way to establish a trust relationship 
not only between the endpoints but also among the end points and the
middle boxes as well as among the middle boxes 

br
Salvatore

> On 25 Mar 2015, at 13:56, Eliot Lear <lear@cisco.com> wrote:
> 
> A comment was made at the microphone that middle boxes will lie to end
> hosts and end hosts will lie to middle boxes.  That is not strictly
> true, and we have an existence proof of when it is not: that is TCP. 
> The intended point of Joe's slide to map SPUD states to TCP wasn't just
> a simple example.  The behavior of TCP on the hosts can be observed by
> the middle box and based on that behavior the middlebox can make
> appropriate decisions.  The most classic example of this is simply
> blocking inbound SYNs to block opening of new connections.  New
> connections do not establish absent that first naked SYN.  Similarly,
> the network can assume that only connections that are already open will
> contain an ACK, knowing that a host will reject an unsolicited packet
> that contains that flag.  That three way handshake is in effect an
> implicit behavior contract between the end host and middle boxes.
> 
> Whatever SPUD becomes, it has to establish, at the very least, that
> implicit behavior contract for UDP.  Today it simply doesn't exist in
> the general sense, although there are may be a higher few protocols that
> allow for that.
> 
> Eliot
> 
> 
> _______________________________________________
> Spud mailing list
> Spud@ietf.org
> https://www.ietf.org/mailman/listinfo/spud