Re: [Spud] Possible WG-forming follow-on to SPUD BoF

Szilveszter Nadas <Szilveszter.Nadas@ericsson.com> Wed, 01 June 2016 16:02 UTC

Return-Path: <Szilveszter.Nadas@ericsson.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 141AF12D5C7 for <spud@ietfa.amsl.com>; Wed, 1 Jun 2016 09:02:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7HH_vURUbiP8 for <spud@ietfa.amsl.com>; Wed, 1 Jun 2016 09:02:38 -0700 (PDT)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E434112D5CD for <spud@ietf.org>; Wed, 1 Jun 2016 09:02:27 -0700 (PDT)
X-AuditID: c1b4fb3a-f79386d00000467b-d8-574f0712b757
Received: from ESESSHC010.ericsson.se (Unknown_Domain [153.88.183.48]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id C0.00.18043.2170F475; Wed, 1 Jun 2016 18:02:26 +0200 (CEST)
Received: from ESESSMB303.ericsson.se ([169.254.3.158]) by ESESSHC010.ericsson.se ([153.88.183.48]) with mapi id 14.03.0294.000; Wed, 1 Jun 2016 18:02:25 +0200
From: Szilveszter Nadas <Szilveszter.Nadas@ericsson.com>
To: Brian Trammell <ietf@trammell.ch>
Thread-Topic: [Spud] Possible WG-forming follow-on to SPUD BoF
Thread-Index: AQHRtnlqOXzJTGLhXEipvO9ff0Zg+5/JmyqAgAAoIsCACNtMAIACLM+w
Date: Wed, 01 Jun 2016 16:02:25 +0000
Message-ID: <EA4C43BE752A194597B002779DF69BAE240FDC69@ESESSMB303.ericsson.se>
References: <2b0e574586dd955-00039.Richmail.00049889758880203458@139.com> <CALx6S352MynSJRHYo3J+SCh8TbMha_w4-66Jcv9OfK84rzVimw@mail.gmail.com> <EA4C43BE752A194597B002779DF69BAE240EA3F9@ESESSMB303.ericsson.se> <FC7CBE59-B21F-446A-ACBE-20BBCBBE34F5@trammell.ch>
In-Reply-To: <FC7CBE59-B21F-446A-ACBE-20BBCBBE34F5@trammell.ch>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [153.88.183.19]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupikeLIzCtJLcpLzFFi42KZGbHdQFeI3T/cYPdBIYuNLe/YLBZdeMro wOSxZMlPJo8n+2eyBDBFcdmkpOZklqUW6dslcGWse9XLVvBLreLg9tlsDYw98l2MnBwSAiYS r059YYOwxSQu3FsPZHNxCAkcYZSYe+AAO4SzmFGid+NkFpAqNgELiYaVm8E6RARUJbobL7GD 2MwCEhKLJn1iArGFBWwl7v+axAxRYydxcdF2dgjbTeL/xC2MIDaLgIrE2strwWbyCvhK7Pl9 gxliWSeTxOHVs8ASnAL2EuefLwNbxgh03vdTa5gglolL3HoynwnibAGJJXvOM0PYohIvH/9j hbAVJdqfNjBC1OtILNj9iQ3C1pZYtvA1M8RiQYmTM5+wTGAUm4Vk7CwkLbOQtMxC0rKAkWUV o2hxanFxbrqRkV5qUWZycXF+nl5easkmRmAMHdzy22oH48HnjocYBTgYlXh4Ezj9woVYE8uK K3MPMUpwMCuJ8Dqy+IcL8aYkVlalFuXHF5XmpBYfYpTmYFES5/V/qRguJJCeWJKanZpakFoE k2Xi4JRqYLSY90HExDZ3zRPlXfLnj1wtqZpVcIDhtLTEtvSe5DMSx1v3V7m3qhXe13MLizu6 /EDT0gd3PLWZPki8/DO79Y6ZnVoUn6bzghkvjE0Y3eWftHzI3FSuqafpZsYXZa23VPCy284H shV/SnZ22S5RYNj64reHNP/eqZ7VZTriiQ9m/J0quTLLRImlOCPRUIu5qDgRAFIQzrOdAgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/z4CuGyqm-IpDMX-gEqR1OM91K1M>
Cc: spud <spud@ietf.org>
Subject: Re: [Spud] Possible WG-forming follow-on to SPUD BoF
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jun 2016 16:02:41 -0000

Hi Brian,

Thanks. Some further comments inside.

Cheers,
Sz.

> > -"allow applications and transport protocols to explicitly provide limited
> information in cleartext to devices on path" vs. "sending endpoint", "receiving
> endpoints". The terminology is not 100% clear to me. What is the difference
> between "applications and transport protocols" and "endpoints" here?
> 
> Some information to be exposed (e.g. expected constant data rate) might
> come from the application layer, and some information (e.g. transport
> reordering tolerance, measurement headers that look something like those in
> the PDM DO header the IPPM WG is currently working on) comes from the
> transport layer. In this case, the transport should always allow the application
> to know what is being sent, and to have control over whether it is sent, but
> may keep the application from changing the values exposed. This is up to the
> transport/app API.

I see. And now I can ask my real question: is it intentional to limit declarations to "applications" and "transport protocols" in the "endpoint"? What about other entities like a middleware? Or an OS level function which acts on behalf of the user's interest vs. the applications being maybe too selfish? 

(I refer to Fig. 1. of https://www.iab.org/wp-content/IAB-uploads/2015/08/MaRNEW_1_paper_16.pdf  )

> > -What do we gain by limited vocabulary ("limited information")? Is not any
> set of declarations too much for some users/countries/whatever and too few
> for others? Is not it forcing the WG participant's ethics by protocol design?
> 
> A few things; mostly, we gain some control at the process level against
> subversion of endpoint control.

Please elaborate it more. I do not get it.

> > -There was a comment "PLUS header would make this behavior visible to
> *everyone* on the network. That alone is IMO a reason it wouldn't be
> deployed in this way". I agree with this, PLUS would/shall make every non-e2e
> conversation as explicit as possible. Is that protection enough? Is it possible to
> make this explicitness as transparent as possible? Is it necessary to have further
> protection as e.g. limited vocabulary?
> 
> WRT "limited vocabulary", the thing it's hard to defend against here is
> someone defining their own declaration, the meaning of which is secret and
> the name obfuscated. If I see that an app is radiating something to the path
> over PLUS, but I can't understand it, well, I do know that app may be up to no
> good, but I don't know what *kind* of no good. It's not clear to me whether
> that's enough to qualify as "transparent".

Another way to implement it in the long run is to delegate the task of declarations to a trusted piece of software (again like in the marnew paper). Then this trusted piece could decide whether to send any data, and to encrypt it also.

Of course it is hard to prevent steganography in both cases.

> I'll note that if there was a "app-to-path-cleartext-supercookie" information
> element in PLUS (which I don't think would be a useful one to have, nor would
> it meet any goal we have), it would *not* be removable by a middlebox, since
> it would be integrity protected end-to-end. A supercookie mitigation box in
> PLUS would have to notice the existence of the supercookie, drop the packet,
> and send back a direct feedback message that said "I'm sorry, I don't permit
> supercookies, please reset the superstrate transport session and try again
> without the supercookie."

This makes inserting any middlebox declaration to the packet impossible. That was discussed before, is it not in scope anymore? 

> > -The charter still says "goal is to enable the deployment of new, encrypted
> transport protocols". I think that whether to encrypt or not is the decision of
> the TP, and while I agree that encryption really helps there by avoiding further
> ossification, I think it shall not be the scope/decision of PLUS.
> 
> Yes, but: in order for integrity protection of declared information to work,
> PLUS needs a mechanism to share a secret between endpoints, so it either
> needs its own keying or it needs to borrow a key generated from the
> superstrate's session key. And if we are to meet the requirement to prevent
> future ossification of the transport layer (or rather, to re-ossify around the
> path layer provided by PLUS), then we need to encrypt the transport layer
> headers. So IMO this is very much in scope.

This definitely makes sense. I am not sure whether this is the best compromise though. 

The requirement is to be able to provide some kind of integrity protection and encryption capabilities in PLUS, in a lightweight way. Reusing TP security context is definitely a solution, there might be issues with that, not sure.