Re: [Stackevo] Fwd: New Version Notification for draft-hardie-path-signals-02.txt
Ted Hardie <ted.ietf@gmail.com> Tue, 02 January 2018 17:52 UTC
Return-Path: <ted.ietf@gmail.com>
X-Original-To: stackevo@ietfa.amsl.com
Delivered-To: stackevo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A57BC127863 for <stackevo@ietfa.amsl.com>; Tue, 2 Jan 2018 09:52:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QarmF3RNHpCb for <stackevo@ietfa.amsl.com>; Tue, 2 Jan 2018 09:52:31 -0800 (PST)
Received: from mail-qk0-x22b.google.com (mail-qk0-x22b.google.com [IPv6:2607:f8b0:400d:c09::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7921C12773A for <stackevo@iab.org>; Tue, 2 Jan 2018 09:52:31 -0800 (PST)
Received: by mail-qk0-x22b.google.com with SMTP id g81so32499947qke.1 for <stackevo@iab.org>; Tue, 02 Jan 2018 09:52:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=FmBzbAlZ0wBPqIEJunoWugERebgezLvWfx+BUNjvwd8=; b=PkkWqp1F84EZ7V3rJVNMt/uMy7fH9jroUgdt6tMrNUJHBZAPxfCEJ5agelqmVmYUjN TICIvm0//Oc4Qhap6co0ZbW8jQ0hzovj2DmOQAY4quwd5c73LhA5nWqa4rBZduaAak3z TNNZT5r5f6v9tzbyLzJ096cs9XhiBYW+mEjNV1iAZkEJ/qFr8BMY0W0hgUapI15KofGg qKY7gvYkBqQTp/IciLRxhjRNJ1zqfoDd2+R4EN0Jb8oEyfVhfgu5S4+3b2HStRBZyKVT gr3Vyym3C+mKe5xoPt5m4LS+hQxnR+AVj6SE8ETj1Krws8muOt3QCnUjZG+fbXVUZjyb OO1Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=FmBzbAlZ0wBPqIEJunoWugERebgezLvWfx+BUNjvwd8=; b=LqUmcdgSWPUaDhU0GzWMubmspI7W+KPG7HSQswRjWpwv666WYX25OKTfk/RN0dv1a+ eziJkmtQ1JuyVpRQkc9sMEZuBsfLuwHZIBlQc80x8VY1aSDR2b7jqg/Myvx7JAWj4NgI WGuUdCb6BPiqZqqUSTpSi6ioMsZxCCqwqmdpJB5uys6+2/13KTAS56UT/4k4ryLxFwat /mnCJmNxJNdtbXsmw1j5R+trgTOyy0cg2vO6kLdqQsEraBO0202t23IsfUnYo5vB6AUV 4U38P0/IeqcQ4z9//HR2bF6gu+pfM6gnFPMgxfeVeXlZQ8yFdfbm/V4G9mXvHmwXOJxL 9psw==
X-Gm-Message-State: AKGB3mL+FL1WkyJSdK1XSPAMVhV8zpZajv7vYjXhKZxmg/5ACZxM87+r XyB91D8vt5nrCXCog+GYTxdbhi4jXRq6M/NjnRE=
X-Google-Smtp-Source: ACJfBot2FJLXWaGMUoXaQ3gW06KQSFofIhXtiXnw8QinJq1npxgqKmeH07zWj2IUoTFjROJ+fVEmtPTWx1xQHPXpScI=
X-Received: by 10.55.170.21 with SMTP id t21mr56905791qke.84.1514915550290; Tue, 02 Jan 2018 09:52:30 -0800 (PST)
MIME-Version: 1.0
Received: by 10.237.36.169 with HTTP; Tue, 2 Jan 2018 09:51:59 -0800 (PST)
In-Reply-To: <CABkgnnVV66b=L8o7DKFayLb85eRGjfBzP8vWOTufsWgc2xyf2Q@mail.gmail.com>
References: <151208514657.11969.10317537698734955463.idtracker@ietfa.amsl.com> <CA+9kkMAFdXX2YJ=pBiMc5Jsp7GwkW+ovcn-dwiMZE9DK_cmsbA@mail.gmail.com> <1809c3fe-78b4-a151-87e5-b42c9c0c6f9c@cisco.com> <CABkgnnVV66b=L8o7DKFayLb85eRGjfBzP8vWOTufsWgc2xyf2Q@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
Date: Tue, 02 Jan 2018 09:51:59 -0800
Message-ID: <CA+9kkMCHX5M9H5CzpdkA0F+xVm-7QsCGZ2xHF+Vtb2wrkB_VTA@mail.gmail.com>
To: Martin Thomson <martin.thomson@gmail.com>
Cc: Eliot Lear <lear@cisco.com>, Stackevo <stackevo@iab.org>
Content-Type: multipart/alternative; boundary="001a114d5e0c3d68230561cec3f0"
Archived-At: <https://mailarchive.ietf.org/arch/msg/stackevo/9LuKAjZuhf_2ux0xX24jFJ0uUp0>
Subject: Re: [Stackevo] Fwd: New Version Notification for draft-hardie-path-signals-02.txt
X-BeenThere: stackevo@iab.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IP Stack Evolution Program Mailing List <stackevo.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/stackevo>, <mailto:stackevo-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stackevo/>
List-Post: <mailto:stackevo@iab.org>
List-Help: <mailto:stackevo-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/stackevo>, <mailto:stackevo-request@iab.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jan 2018 17:52:35 -0000
On Mon, Jan 1, 2018 at 9:14 PM, Martin Thomson <martin.thomson@gmail.com> wrote: > I also think that we should explicitly identify not encrypting as an > option. We could still have integrity protection. Of course, we > should then make it clear that rampant misguided inference is why we > are encrypting. I'd put something in the introduction to Section 4 > there. > > I have one consideration to add, probably to security considerations > (more on that below). Explicit signals can be disconnected from the > protocol signaling machinery. Doing so might be necessary to avoid > path entities inferring more from the signal than is intended. As a confirmation/friendly amendment, does rephrasing this as "protocol state machinery" work for you? If so, I would actually strengthen this to "should be disconnected". Ideally, I would like the path elements to consume the signals explicitly for them even if there is an unencrypted portion of a flow; inferring from that tends to ossify things and avoiding that is a key part of our aim. > If > QUIC takes a spin bit, that's a clear example of where we take RTT > information and signal that, but we separate that signal from all of > the rich acknowledgment information the protocol really needs. > However, this split creates a potential for those signals to be > incorrect or even for them to be falsified, presumably with the intent > of manipulating path entities in some way. > > I don't think that we need any specific mitigation, but we should > recognize that this is a natural consequence of the recommendations in > the draft. That isn't strictly a negative outcome either. One > conceivable - but actually highly unlikely - outcome of designing > explicit signals is that intermediaries might insist on a certain set > of signals before a packet is allowed to pass ("give me SNI or I kill > your flow"). A signal that isn't directly coupled to the actual > protocol machinery can be falsified to appease a middlebox, even in > cases where the endpoint might otherwise prefer not to provide the > information. I wouldn't include all that exposition though, just note > that falsification is possible, without affecting the e2e protocol > operation. > > On structure, I think that the bulk of the security considerations are > better moved elsewhere. The bullet list seems to belong in Section 5. > > (I agree with Eliot regarding editing. There are quite a number of > typos that I would have sent a PR for, had there been a destination > that a PR could be directed toward.) > > I'll get it onto github. Since I generally start that by cloning one of your repos, which is the current one to crib from? Ted > On Fri, Dec 22, 2017 at 12:00 AM, Eliot Lear <lear@cisco.com> wrote: > > Hi Ted, > > > > Following up on Brian's comment, as I wrote to you the last time, I > really > > like this draft. For some reason, Section 3.1.1 seems to have suffered > > editorially and needs just a bit of work. > > > > Eliot > > > > > > On 01.12.17 00:40, Ted Hardie wrote: > > > > As discussed in the last meeting, I have updated this slightly and > brought > > it back into circulation. The changes are very small (updating a > reference, > > slightly enlarged pointer to fingerprinting risk). > > > > Hack away, > > > > Ted > > > > > > ---------- Forwarded message ---------- > > From: <internet-drafts@ietf.org> > > Date: Thu, Nov 30, 2017 at 3:39 PM > > Subject: New Version Notification for draft-hardie-path-signals-02.txt > > To: Ted Hardie <ted.ietf@gmail.com> > > > > > > > > A new version of I-D, draft-hardie-path-signals-02.txt > > has been successfully submitted by Ted Hardie and posted to the > > IETF repository. > > > > Name: draft-hardie-path-signals > > Revision: 02 > > Title: Path signals > > Document date: 2017-11-30 > > Group: Individual Submission > > Pages: 8 > > URL: > > https://www.ietf.org/internet-drafts/draft-hardie-path-signals-02.txt > > Status: https://datatracker.ietf.org/ > doc/draft-hardie-path-signals/ > > Htmlized: https://tools.ietf.org/html/draft-hardie-path-signals-02 > > Htmlized: > > https://datatracker.ietf.org/doc/html/draft-hardie-path-signals-02 > > Diff: > > https://www.ietf.org/rfcdiff?url2=draft-hardie-path-signals-02 > > > > Abstract: > > TCP's state mechanics uses a series of well-known messages that are > > exchanged in the clear. Because these are visible to network > > elements on the path between the two nodes setting up the transport > > connection, they are often used as signals by those network elements. > > In transports that do not exchange these messages in the clear, on- > > path network elements lack those signals. This document discusses > > the nature of the signals as they are seen by on-path elements and > > reflects on best practices for transports which encrypt their state > > mechanics. > > > > > > > > > > Please note that it may take a couple of minutes from the time of > submission > > until the htmlized version and diff are available at tools.ietf.org. > > > > The IETF Secretariat > > > > > > > > > > _______________________________________________ > > Stackevo mailing list > > Stackevo@iab.org > > https://www.iab.org/mailman/listinfo/stackevo > > > > > > > > _______________________________________________ > > Stackevo mailing list > > Stackevo@iab.org > > https://www.iab.org/mailman/listinfo/stackevo > > >
- [Stackevo] Fwd: New Version Notification for draf… Ted Hardie
- Re: [Stackevo] New Version Notification for draft… Brian Trammell (IETF)
- Re: [Stackevo] Fwd: New Version Notification for … Eliot Lear
- Re: [Stackevo] Fwd: New Version Notification for … Martin Thomson
- Re: [Stackevo] New Version Notification for draft… Ted Hardie
- Re: [Stackevo] Fwd: New Version Notification for … Ted Hardie
- Re: [Stackevo] Fwd: New Version Notification for … Ted Hardie
- Re: [Stackevo] Fwd: New Version Notification for … Martin Thomson
- Re: [Stackevo] Fwd: New Version Notification for … Ted Hardie
- Re: [Stackevo] Fwd: New Version Notification for … Eliot Lear
- Re: [Stackevo] Fwd: New Version Notification for … Martin Thomson
- Re: [Stackevo] Fwd: New Version Notification for … Eliot Lear
- Re: [Stackevo] New Version Notification for draft… Brian Trammell (IETF)
- Re: [Stackevo] New Version Notification for draft… Brian Trammell (IETF)