Re: [tcpm] Secdir last call review of draft-ietf-tcpm-rfc793bis-24
Martin Duke <martin.h.duke@gmail.com> Wed, 08 September 2021 18:45 UTC
Return-Path: <martin.h.duke@gmail.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12F093A3254 for <tcpm@ietfa.amsl.com>; Wed, 8 Sep 2021 11:45:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RX3VTuBLOJOg for <tcpm@ietfa.amsl.com>; Wed, 8 Sep 2021 11:44:54 -0700 (PDT)
Received: from mail-il1-x132.google.com (mail-il1-x132.google.com [IPv6:2607:f8b0:4864:20::132]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 931BC3A3252 for <tcpm@ietf.org>; Wed, 8 Sep 2021 11:44:54 -0700 (PDT)
Received: by mail-il1-x132.google.com with SMTP id q14so259434ils.5 for <tcpm@ietf.org>; Wed, 08 Sep 2021 11:44:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=7h3Wpigtl21AEeVt1crG4kxdreUxP79JseycfVLAy/U=; b=LmamMO8mTx7/6OWC7A1+ESvWIY88Xvw9pumFC86hm5UgXrAW8Jw8Ys+SU+fAl0XHo2 drrxaE0hQxS0YxredxxzGHbKcMe2W7h6stclU5I2XVPRnEuKv4vYsaM59/FpfJgKU7sN 4aMxeiKv0GVCijxMm1Kjck1JV7f0jIDfZEjjhx584cwZ+L3odpimEyn5000IxdQ83DPZ ZE7vY8YWFeRP82NYx99G9slE3o6UR6/gEzXbRod18a3HxTcAdIHtdaztWdRQ0A9cguE9 BVo3xkhYo7kugnaQ/zIpCoXJG4RffipFtHndDhPaTcRQS1jfEXi0wE8fm/pWyAITO72H kC3Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=7h3Wpigtl21AEeVt1crG4kxdreUxP79JseycfVLAy/U=; b=Cvb7QFapCjXMnmJPFuDoYwnSYyYUN4ryAsYfD0rO8SEBSkEVR9d6gq4u8pqFQW5hK2 ZGcFBdtut9XT0W0iUnYR9cyVG16mz/hm6KXG9TmJBsXo2uKjJiqsm8T+tOqXNef1Zb5J esdT0K3no/4AGWoF2PGuWF9/I3AXuKqqRMirGiAQUvDXLt+jzI9VN58rxCG8FGmxtgUE 4AsLvlBpGLLAGLTiJ4yO8O9g9tPVJFpNGvU5Q19momnINc56Efxb4NbFbpQ+rZURSk4j m+mbleyHgXRD3Q4tabkA3qzejaOuHcSFVC7PTTNnIcAG+iTki30f0IojXIjEUWh0OzA1 KdrQ==
X-Gm-Message-State: AOAM533mrN0b0h7rYIr6DUMqPTKzmDchDkkkpSTdnj8+TV2h0BZHalz3 Fm3c50sd0PGPJzrmwa1HJ99JlyR9ckUOlJFKcN2CufSF
X-Google-Smtp-Source: ABdhPJzvftD8oQnb3pN7NswTLL32QaC0z3Xdw93/1OHJueZnQfaT/kFNH67gfVh/APwYVsv2O9Z1/l4ht4RXo2sH0KU=
X-Received: by 2002:a05:6e02:17cf:: with SMTP id z15mr931024ilu.103.1631126692544; Wed, 08 Sep 2021 11:44:52 -0700 (PDT)
MIME-Version: 1.0
References: <CAJU8_nXi5=6MD9cvGkd3E3xvF3o=JeR4xw4+x5NphTQxstYGbw@mail.gmail.com> <D00D6D29-226C-4C2D-85D2-D133FAF5E27A@erg.abdn.ac.uk> <64c81d66-a566-cc92-cfb0-61302ec2fabb@mti-systems.com> <CAJU8_nXn41btL6FY_e_BfC1rrN-WfNo6wJ8p+YRSExjikiBZsg@mail.gmail.com> <99a37672-8b4d-a51e-31ae-6620f9f20a0d@erg.abdn.ac.uk> <CAJU8_nXCUvf-hE39jRajTxuXua5xqsM5Lv+Y-r24yuRJpd3vzA@mail.gmail.com>
In-Reply-To: <CAJU8_nXCUvf-hE39jRajTxuXua5xqsM5Lv+Y-r24yuRJpd3vzA@mail.gmail.com>
From: Martin Duke <martin.h.duke@gmail.com>
Date: Wed, 08 Sep 2021 11:44:40 -0700
Message-ID: <CAM4esxQg9So-9-vya3gTGUzqP1qVLrZTjMyr_p64FVs6FTe3Dw@mail.gmail.com>
To: Kyle Rose <krose@krose.org>
Cc: Gorry Fairhurst <gorry@erg.abdn.ac.uk>, tcpm IETF list <tcpm@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000017c76b05cb8047b7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/UbwjK_VxzxEGqjlGKmm54rICqkU>
Subject: Re: [tcpm] Secdir last call review of draft-ietf-tcpm-rfc793bis-24
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Sep 2021 18:45:00 -0000
I'm going to move forward with taking this to the ballot, though if there's a convenient way to address this I invite Wes to do so. I don't think we want to go down the road of requiring an "ossification considerations" section at this point. On Wed, Sep 8, 2021 at 9:23 AM Kyle Rose <krose@krose.org> wrote: > Right, I agree the right sentiment is expressed there: my issue is mainly > with the reference to it in the text Wes proposed being in the > security/privacy considerations section, and with no express reference to > ossification, which is an important part of the issue (as noted in 9065). > It's placement and context that I think needs augmenting. No word beginning > with "ossif" appears anywhere in draft -25. It's possible there's an > appropriate place earlier in the doc, or maybe there should be a short > "extensibility considerations" section. Or maybe I'm simply in the rough on > this, and there's no need to link this document to the wire image > ossification issue. > > Kyle > > On Wed, Sep 8, 2021 at 11:56 AM Gorry Fairhurst <gorry@erg.abdn.ac.uk> > wrote: > >> On 08/09/2021 15:52, Kyle Rose wrote: >> >> The concern here is broader than security/privacy considerations: while >> exposing data unnecessarily to the network does create such concerns, your >> proposed text doesn't touch on the problem of protocol ossification, which >> is orthogonal to privacy even if it can be mitigated by many of the same >> mechanisms. >> >> Kyle >> >> Kyle, >> >> RFC9065 might bring some context, when it concluded: >> >> "Unencrypted transport header fields are likely to ossify rapidly, >> as network devices come to rely on their presence, making it >> difficult to change the transport in future. This argues that the >> choice to expose information to the network is made deliberately >> and with care, since it is essentially defining a stable interface >> between the transport and the network. Some protocols will want >> to make that interface as limited as possible; other protocols >> might find value in exposing certain information to signal to the >> network or in allowing the network to change certain header fields >> as signals to the transport. The visible wire image of a protocol >> should be explicitly designed." >> >> My point was that to some extent, ossification - in as much as the wire >> image is visible and usable by middleboxes, was a design decision made >> when TCP was defined. Many of the methods defined in the PILC WG for >> various types of subnetworks also utilised these features. >> Connection-tracking firewalls have been around for decades, and rely on >> this, etc. This isn't/wasn't a bug, although not making it clear what >> middleboxes should do might have been an oversight. >> Different design decisions were made for RTP/UDP and QUIC and others, >> with different implications. >> >> Gorry >> >> On Tue, Sep 7, 2021 at 11:37 PM Wesley Eddy <wes@mti-systems.com> wrote: >> >>> Hopefully wrapping this thread up ... I've just posted a -25 revision >>> that contains a new paragraph which I think now has references to all of >>> the mentioned documents. >>> >>> The concept of a protocol's "wire image" is described in RFC 8546 >>> [54], which describes how TCP's cleartext headers expose more >>> metadata to nodes on the path than is strictly required to route the >>> packets to their destination. On-path adversaries may be able to >>> leverage this metadata. Lessons learned in this respect from TCP >>> have been applied in the design of newer transports like QUIC [58]. >>> Additionally, based partly on experiences with TCP and its >>> extensions, there are considerations that might be applicable for >>> future TCP extensions and other transports that the IETF has >>> documented in RFC 9065 [59], along with IAB recommendations in RFC >>> 8558 [56] and [66]. >>> >>> >>> (where [66] is the IAB use-it-or-lose-it I-D) >>> >>> I think this should be good for Martin to move ahead with it if captures >>> the right sense of what everyone has been suggesting to add. >>> >> >> _______________________________________________ > tcpm mailing list > tcpm@ietf.org > https://www.ietf.org/mailman/listinfo/tcpm >
- [tcpm] Secdir last call review of draft-ietf-tcpm… Kyle Rose via Datatracker
- Re: [tcpm] Secdir last call review of draft-ietf-… Wesley Eddy
- Re: [tcpm] Secdir last call review of draft-ietf-… Kyle Rose
- Re: [tcpm] Secdir last call review of draft-ietf-… Gorry Fairhurst
- Re: [tcpm] Secdir last call review of draft-ietf-… Kyle Rose
- Re: [tcpm] Secdir last call review of draft-ietf-… Gorry Fairhurst
- Re: [tcpm] Secdir last call review of draft-ietf-… Wesley Eddy
- Re: [tcpm] Secdir last call review of draft-ietf-… Kyle Rose
- Re: [tcpm] Secdir last call review of draft-ietf-… Gorry Fairhurst
- Re: [tcpm] Secdir last call review of draft-ietf-… Kyle Rose
- Re: [tcpm] Secdir last call review of draft-ietf-… Martin Duke