Re: [Stackevo] Fwd: New Version Notification for draft-hardie-path-signals-02.txt

Ted Hardie <ted.ietf@gmail.com> Tue, 02 January 2018 17:52 UTC

Return-Path: <ted.ietf@gmail.com>
X-Original-To: stackevo@ietfa.amsl.com
Delivered-To: stackevo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A57BC127863 for <stackevo@ietfa.amsl.com>; Tue, 2 Jan 2018 09:52:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QarmF3RNHpCb for <stackevo@ietfa.amsl.com>; Tue, 2 Jan 2018 09:52:31 -0800 (PST)
Received: from mail-qk0-x22b.google.com (mail-qk0-x22b.google.com [IPv6:2607:f8b0:400d:c09::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7921C12773A for <stackevo@iab.org>; Tue, 2 Jan 2018 09:52:31 -0800 (PST)
Received: by mail-qk0-x22b.google.com with SMTP id g81so32499947qke.1 for <stackevo@iab.org>; Tue, 02 Jan 2018 09:52:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=FmBzbAlZ0wBPqIEJunoWugERebgezLvWfx+BUNjvwd8=; b=PkkWqp1F84EZ7V3rJVNMt/uMy7fH9jroUgdt6tMrNUJHBZAPxfCEJ5agelqmVmYUjN TICIvm0//Oc4Qhap6co0ZbW8jQ0hzovj2DmOQAY4quwd5c73LhA5nWqa4rBZduaAak3z TNNZT5r5f6v9tzbyLzJ096cs9XhiBYW+mEjNV1iAZkEJ/qFr8BMY0W0hgUapI15KofGg qKY7gvYkBqQTp/IciLRxhjRNJ1zqfoDd2+R4EN0Jb8oEyfVhfgu5S4+3b2HStRBZyKVT gr3Vyym3C+mKe5xoPt5m4LS+hQxnR+AVj6SE8ETj1Krws8muOt3QCnUjZG+fbXVUZjyb OO1Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=FmBzbAlZ0wBPqIEJunoWugERebgezLvWfx+BUNjvwd8=; b=LqUmcdgSWPUaDhU0GzWMubmspI7W+KPG7HSQswRjWpwv666WYX25OKTfk/RN0dv1a+ eziJkmtQ1JuyVpRQkc9sMEZuBsfLuwHZIBlQc80x8VY1aSDR2b7jqg/Myvx7JAWj4NgI WGuUdCb6BPiqZqqUSTpSi6ioMsZxCCqwqmdpJB5uys6+2/13KTAS56UT/4k4ryLxFwat /mnCJmNxJNdtbXsmw1j5R+trgTOyy0cg2vO6kLdqQsEraBO0202t23IsfUnYo5vB6AUV 4U38P0/IeqcQ4z9//HR2bF6gu+pfM6gnFPMgxfeVeXlZQ8yFdfbm/V4G9mXvHmwXOJxL 9psw==
X-Gm-Message-State: AKGB3mL+FL1WkyJSdK1XSPAMVhV8zpZajv7vYjXhKZxmg/5ACZxM87+r XyB91D8vt5nrCXCog+GYTxdbhi4jXRq6M/NjnRE=
X-Google-Smtp-Source: ACJfBot2FJLXWaGMUoXaQ3gW06KQSFofIhXtiXnw8QinJq1npxgqKmeH07zWj2IUoTFjROJ+fVEmtPTWx1xQHPXpScI=
X-Received: by 10.55.170.21 with SMTP id t21mr56905791qke.84.1514915550290; Tue, 02 Jan 2018 09:52:30 -0800 (PST)
MIME-Version: 1.0
Received: by 10.237.36.169 with HTTP; Tue, 2 Jan 2018 09:51:59 -0800 (PST)
In-Reply-To: <CABkgnnVV66b=L8o7DKFayLb85eRGjfBzP8vWOTufsWgc2xyf2Q@mail.gmail.com>
References: <151208514657.11969.10317537698734955463.idtracker@ietfa.amsl.com> <CA+9kkMAFdXX2YJ=pBiMc5Jsp7GwkW+ovcn-dwiMZE9DK_cmsbA@mail.gmail.com> <1809c3fe-78b4-a151-87e5-b42c9c0c6f9c@cisco.com> <CABkgnnVV66b=L8o7DKFayLb85eRGjfBzP8vWOTufsWgc2xyf2Q@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
Date: Tue, 02 Jan 2018 09:51:59 -0800
Message-ID: <CA+9kkMCHX5M9H5CzpdkA0F+xVm-7QsCGZ2xHF+Vtb2wrkB_VTA@mail.gmail.com>
To: Martin Thomson <martin.thomson@gmail.com>
Cc: Eliot Lear <lear@cisco.com>, Stackevo <stackevo@iab.org>
Content-Type: multipart/alternative; boundary="001a114d5e0c3d68230561cec3f0"
Archived-At: <https://mailarchive.ietf.org/arch/msg/stackevo/9LuKAjZuhf_2ux0xX24jFJ0uUp0>
Subject: Re: [Stackevo] Fwd: New Version Notification for draft-hardie-path-signals-02.txt
X-BeenThere: stackevo@iab.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IP Stack Evolution Program Mailing List <stackevo.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/stackevo>, <mailto:stackevo-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stackevo/>
List-Post: <mailto:stackevo@iab.org>
List-Help: <mailto:stackevo-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/stackevo>, <mailto:stackevo-request@iab.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jan 2018 17:52:35 -0000

On Mon, Jan 1, 2018 at 9:14 PM, Martin Thomson <martin.thomson@gmail.com>
wrote:

> I also think that we should explicitly identify not encrypting as an
> option.  We could still have integrity protection.  Of course, we
> should then make it clear that rampant misguided inference is why we
> are encrypting.  I'd put something in the introduction to Section 4
> there.
>
> I have one consideration to add, probably to security considerations
> (more on that below).  Explicit signals can be disconnected from the
> protocol signaling machinery.  Doing so might be necessary to avoid
> path entities inferring more from the signal than is intended.


As a confirmation/friendly amendment, does rephrasing this as "protocol
state machinery" work for you?  If so, I would actually strengthen this to
"should be disconnected".  Ideally, I would like the path elements to
consume the signals explicitly for them even if there is an unencrypted
portion of a flow; inferring from that tends to ossify things and avoiding
that is a key part of our aim.



> If
> QUIC takes a spin bit, that's a clear example of where we take RTT
> information and signal that, but we separate that signal from all of
> the rich acknowledgment information the protocol really needs.
> However, this split creates a potential for those signals to be
> incorrect or even for them to be falsified, presumably with the intent
> of manipulating path entities in some way.
>
> I don't think that we need any specific mitigation, but we should
> recognize that this is a natural consequence of the recommendations in
> the draft.  That isn't strictly a negative outcome either.  One
> conceivable - but actually highly unlikely - outcome of designing
> explicit signals is that intermediaries might insist on a certain set
> of signals before a packet is allowed to pass ("give me SNI or I kill
> your flow").  A signal that isn't directly coupled to the actual
> protocol machinery can be falsified to appease a middlebox, even in
> cases where the endpoint might otherwise prefer not to provide the
> information.  I wouldn't include all that exposition though, just note
> that falsification is possible, without affecting the e2e protocol
> operation.
>
> On structure, I think that the bulk of the security considerations are
> better moved elsewhere.  The bullet list seems to belong in Section 5.
>
> (I agree with Eliot regarding editing.  There are quite a number of
> typos that I would have sent a PR for, had there been a destination
> that a PR could be directed toward.)
>
>
I'll get it onto github.  Since I generally start that by cloning one of
your repos, which is the current one to crib from?

Ted


> On Fri, Dec 22, 2017 at 12:00 AM, Eliot Lear <lear@cisco.com> wrote:
> > Hi Ted,
> >
> > Following up on Brian's comment, as I wrote to you the last time, I
> really
> > like this draft.  For some reason, Section 3.1.1 seems to have suffered
> > editorially and needs just a bit of work.
> >
> > Eliot
> >
> >
> > On 01.12.17 00:40, Ted Hardie wrote:
> >
> > As discussed in the last meeting, I have updated this slightly and
> brought
> > it back into circulation.  The changes are very small (updating a
> reference,
> > slightly enlarged pointer to fingerprinting risk).
> >
> > Hack away,
> >
> > Ted
> >
> >
> > ---------- Forwarded message ----------
> > From: <internet-drafts@ietf.org>
> > Date: Thu, Nov 30, 2017 at 3:39 PM
> > Subject: New Version Notification for draft-hardie-path-signals-02.txt
> > To: Ted Hardie <ted.ietf@gmail.com>
> >
> >
> >
> > A new version of I-D, draft-hardie-path-signals-02.txt
> > has been successfully submitted by Ted Hardie and posted to the
> > IETF repository.
> >
> > Name:           draft-hardie-path-signals
> > Revision:       02
> > Title:          Path signals
> > Document date:  2017-11-30
> > Group:          Individual Submission
> > Pages:          8
> > URL:
> > https://www.ietf.org/internet-drafts/draft-hardie-path-signals-02.txt
> > Status:         https://datatracker.ietf.org/
> doc/draft-hardie-path-signals/
> > Htmlized:       https://tools.ietf.org/html/draft-hardie-path-signals-02
> > Htmlized:
> > https://datatracker.ietf.org/doc/html/draft-hardie-path-signals-02
> > Diff:
> > https://www.ietf.org/rfcdiff?url2=draft-hardie-path-signals-02
> >
> > Abstract:
> >    TCP's state mechanics uses a series of well-known messages that are
> >    exchanged in the clear.  Because these are visible to network
> >    elements on the path between the two nodes setting up the transport
> >    connection, they are often used as signals by those network elements.
> >    In transports that do not exchange these messages in the clear, on-
> >    path network elements lack those signals.  This document discusses
> >    the nature of the signals as they are seen by on-path elements and
> >    reflects on best practices for transports which encrypt their state
> >    mechanics.
> >
> >
> >
> >
> > Please note that it may take a couple of minutes from the time of
> submission
> > until the htmlized version and diff are available at tools.ietf.org.
> >
> > The IETF Secretariat
> >
> >
> >
> >
> > _______________________________________________
> > Stackevo mailing list
> > Stackevo@iab.org
> > https://www.iab.org/mailman/listinfo/stackevo
> >
> >
> >
> > _______________________________________________
> > Stackevo mailing list
> > Stackevo@iab.org
> > https://www.iab.org/mailman/listinfo/stackevo
> >
>