Re: [Spud] on trust and lying
Salvatore Loreto <salvatore.loreto@ericsson.com> Wed, 25 March 2015 19:20 UTC
Return-Path: <salvatore.loreto@ericsson.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 9C7F21B2A38
for <spud@ietfa.amsl.com>; Wed, 25 Mar 2015 12:20:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001]
autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id Mn4j9KQ8a7O9 for <spud@ietfa.amsl.com>;
Wed, 25 Mar 2015 12:20:02 -0700 (PDT)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45])
(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id C28381B2ACA
for <spud@ietf.org>; Wed, 25 Mar 2015 12:20:01 -0700 (PDT)
X-AuditID: c1b4fb2d-f79a46d0000006b4-da-55130a5fec56
Received: from ESESSHC024.ericsson.se (Unknown_Domain [153.88.253.124])
by sessmg23.ericsson.net (Symantec Mail Security) with SMTP id
95.30.01716.F5A03155; Wed, 25 Mar 2015 20:20:00 +0100 (CET)
Received: from ESESSMB109.ericsson.se ([169.254.9.246]) by
ESESSHC024.ericsson.se ([153.88.183.90]) with mapi id 14.03.0210.002; Wed, 25
Mar 2015 20:19:59 +0100
From: Salvatore Loreto <salvatore.loreto@ericsson.com>
To: Eliot Lear <lear@cisco.com>
Thread-Topic: [Spud] on trust and lying
Thread-Index: AQHQZy2GvCD/AF7sBUm9j9wy38KslJ0tgj2A
Date: Wed, 25 Mar 2015 19:19:59 +0000
Message-ID: <95859196-9247-4162-B175-6A1E4405BE0C@ericsson.com>
References: <551304ED.7080601@cisco.com>
In-Reply-To: <551304ED.7080601@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [153.88.183.149]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <44A71BFF42D17949A60421D8C73FFBE8@ericsson.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmplkeLIzCtJLcpLzFFi42KZGfG3RjeBSzjUYOJNTouv/zpYLBZdeMro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-At: <http://mailarchive.ietf.org/arch/msg/spud/kby7Do0Pl0Q1OfL0REjsJF8rR_8>
Cc: "spud@ietf.org" <spud@ietf.org>
Subject: Re: [Spud] on trust and lying
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>,
<mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>,
<mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2015 19:20:03 -0000
I do think that we need a way to establish a trust relationship not only between the endpoints but also among the end points and the middle boxes as well as among the middle boxes br Salvatore > On 25 Mar 2015, at 13:56, Eliot Lear <lear@cisco.com> wrote: > > A comment was made at the microphone that middle boxes will lie to end > hosts and end hosts will lie to middle boxes. That is not strictly > true, and we have an existence proof of when it is not: that is TCP. > The intended point of Joe's slide to map SPUD states to TCP wasn't just > a simple example. The behavior of TCP on the hosts can be observed by > the middle box and based on that behavior the middlebox can make > appropriate decisions. The most classic example of this is simply > blocking inbound SYNs to block opening of new connections. New > connections do not establish absent that first naked SYN. Similarly, > the network can assume that only connections that are already open will > contain an ACK, knowing that a host will reject an unsolicited packet > that contains that flag. That three way handshake is in effect an > implicit behavior contract between the end host and middle boxes. > > Whatever SPUD becomes, it has to establish, at the very least, that > implicit behavior contract for UDP. Today it simply doesn't exist in > the general sense, although there are may be a higher few protocols that > allow for that. > > Eliot > > > _______________________________________________ > Spud mailing list > Spud@ietf.org > https://www.ietf.org/mailman/listinfo/spud
- [Spud] on trust and lying Eliot Lear
- Re: [Spud] on trust and lying Salvatore Loreto
- Re: [Spud] on trust and lying Roland Bless
- Re: [Spud] on trust and lying Bob Briscoe