Re: [tsvwg] Review of draft-ietf-tsvwg-udp-options-32
Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com> Tue, 30 April 2024 10:41 UTC
Return-Path: <zahed.sarker.ietf@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48522C14CE52; Tue, 30 Apr 2024 03:41:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vdhC-aqVTQlU; Tue, 30 Apr 2024 03:41:26 -0700 (PDT)
Received: from mail-pg1-x52e.google.com (mail-pg1-x52e.google.com [IPv6:2607:f8b0:4864:20::52e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 77EC8C14CF18; Tue, 30 Apr 2024 03:41:26 -0700 (PDT)
Received: by mail-pg1-x52e.google.com with SMTP id 41be03b00d2f7-5d4d15ec7c5so4307741a12.1; Tue, 30 Apr 2024 03:41:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714473686; x=1715078486; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=6zDMnblFE70SwxgwxB//MESaNEpZuhGW+sWiCz5bGwg=; b=W5OIU4LzV8N8F1RlLEoZATpAUI4O0gBK0GAIvb6eJ9qnhz6b0cq1jFGJpiDrn6yvex gKZfL4N8U6PUCZz7rnyjPJsgch71Zv/T71XUccj6L7qXPHasAkmHWqqypUwI3mgFQhEO rwK1xL/TrvoxzRSkVgfV7dgxFC4L19n48zy+BA29jTRZecOdPE0zHN0M5OMyvaOZUBG8 ratMA0EZedtDCAQTnR0RwOSKYpwT/ExBgeZHRnZEziFu2W5n1ifUolmHfuETv5BD0I0h +0d3fCo/9WAme6kmkTOXbxlcocWQ8Kgfg4Qpe7BgLxHw3G3ij/D3E7OKqumyHGxEXFxd J3Qw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714473686; x=1715078486; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=6zDMnblFE70SwxgwxB//MESaNEpZuhGW+sWiCz5bGwg=; b=kVB0uIVl8Sh8uo5MvpKco4UR4WBAUfkoT3cTbfgwgNQ3lorfh92R9QzFOoU7boVdSa QOTX6CZK6rvJPyYM/TqwQD12l3q76naEYgyU6/fnia7ttvQS1ndeLpVYa2NmGumeghu+ H51qKp1+7EQ69MhVpApGOa3TRzH9InxebxQXLIWq+2c4g+qjUXeRffev1lRj28wEKHVm 8G2+4rM89xiiqeyOxRtngmDuZ0jIq1zii6szkVY7CSSZm/IumdADkKrqZaeSyg7Tr0+2 i7PVfQBqNKUZ5tsKRzCCwTFTIopc6QbrfK+DPW49cN6wZHDSjGmL+TUJoc7RCTPtI2mr M38Q==
X-Forwarded-Encrypted: i=1; AJvYcCX6iPifjZ7A4uJaAWVYrfGF9tEfxYR/2DcOs7XeHmDyJ0wFWds1BNNAnALfrw1MDFbezPt/G05IKOW44sBqutb9rwQbTE+YT6U7eS/VL+4O5uLjBCooKf6+gkpCvQ1RRuKrsg4VYP06EDM=
X-Gm-Message-State: AOJu0Yz9Kp90oyvMUoARJfWLHnOY6EXE7G86xSma+xXUhEYwXropQsN3 bd6xBnQND+o3dZTKPeymfTtzexRant2gPqAxBSVPm3ugEwvAKXbT2oSBl7vnNHYnUgThYYHvI2O nN3hFm+Dzfd0iuJMrspsDkF4K+aU=
X-Google-Smtp-Source: AGHT+IH/n42jpvHMlFSBrHW1JbGxamkr2TL7f9PrBIFyMDAsS1qH4dAQ6skgl6ZJQaWm0c948qE2t9H0hBle8DCYSl8=
X-Received: by 2002:a17:90a:e50d:b0:2af:b977:363a with SMTP id t13-20020a17090ae50d00b002afb977363amr12607167pjy.43.1714473685554; Tue, 30 Apr 2024 03:41:25 -0700 (PDT)
MIME-Version: 1.0
References: <CAM4esxSpwRF5E3Xc_hotgvCSdKVe4BY_zRUKAzHvW48JEtWqTA@mail.gmail.com> <CACL_3VGOLkJU1m7pqSXRRouCKwdQ6yrbmaPwoa22Jr-N3FZNzA@mail.gmail.com> <fccb92b0-dbc8-4cb2-b49c-1f603297d721@huitema.net> <CAEh=tcd2FzQxgbSivuX2cEg2FpsnkoqdFw5gMhrx3pkT_JV88Q@mail.gmail.com> <F36164D6-8685-4AB2-AED3-147E4D6D8FF8@strayalpha.com> <CAEh=tce1nU4P2NZVn7NVsWKgmKLhtUzDpfbf3wzJRjgbryy9+w@mail.gmail.com> <CACL_3VGhwuEgHM=nSftYNJBUOm2yHyav+x=NUTZfWTfOeK4XcQ@mail.gmail.com>
In-Reply-To: <CACL_3VGhwuEgHM=nSftYNJBUOm2yHyav+x=NUTZfWTfOeK4XcQ@mail.gmail.com>
From: Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com>
Date: Tue, 30 Apr 2024 12:41:14 +0200
Message-ID: <CAEh=tccCjNq_boPKEmCuH7EKdQObgJV+VWgOrPvuZ72O4SnULA@mail.gmail.com>
To: "C. M. Heard" <heard@pobox.com>
Cc: Gorry Fairhurst <gorry@erg.abdn.ac.uk>, Joe Touch <touch@strayalpha.com>, tsvwg <tsvwg@ietf.org>, draft-ietf-tsvwg-udp-options.all@ietf.org
Content-Type: multipart/alternative; boundary="000000000000011eca06174e0376"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/53zlBB1iGy5rFrnP1o63bdxh4j8>
Subject: Re: [tsvwg] Review of draft-ietf-tsvwg-udp-options-32
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Apr 2024 10:41:27 -0000
On Mon, Apr 29, 2024 at 11:24 PM C. M. Heard <heard@pobox.com> wrote: > On Thu, Apr 11, 2024 at 4:16 AM Zaheduzzaman Sarker < > zahed.sarker.ietf@gmail.com> wrote: > >> >> >> On Tue, Apr 9, 2024 at 5:01 PM touch@strayalpha.com <touch@strayalpha.com> >> wrote: >> >>> Hi, all, >>> >>> On Apr 9, 2024, at 3:31 AM, Zaheduzzaman Sarker < >>> zahed.sarker.ietf@gmail.com> wrote: >>> >>> The questions I would like to get answer is - >>> >>> Is it OK for the endpoints to send information in UDP options >>> which can be read (only) by the transit nodes and react to it? if NO, then >>> how to prevent that to happen? >>> >>> //Zahed >>> >>> >>> We can prevent that if/when we proceed with the UDP encryption option or >>> using IPsec. >>> >> >> I wanted to make sure we have a consensus here that it is good enough to >> do so. >> >> >>> >>> But all this talk about transport protocols and their vulnerability to >>> on-path mods strikes me as hollow. We have had such protections for TCP for >>> a generation (over 25 yrs) with TCP-MD5 and its successor TCP-AO. Neither >>> one protects packets from on-path tampering with IP options, but we’ve had >>> that for just as long too. >>> >>> What we don’t have is a widely enough deployed key infrastructure. Until >>> that happens, it’s difficult to understand how raising these issues >>> obligates protocol designers. >>> >> >> (I am not sure why that is not widely deployed yet :-).) >> >> The obligation here is that we have thought about the possibilities, >> understand the pros and cons, made the right choice, and well describe them >> on what we published. I am not AD reviewing the document now, but I would >> not like wait till my AD review to express what I would be looking for. Now >> you know and can just tell me yes we have done those thoughts and in >> section XXX we have described it well. >> > > This is now Issue #45 > <https://github.com/tsvwg/draft-ietf-tsvwg-udp-options/issues/45> in the > github tracker. > > As was noted earlier in this thread, the issue was discussed previously on > the TSVWG mailing list: > > On Fri, Apr 5, 2024 at 9:49 AM Martin Duke wrote: > >> On Thu, Apr 4, 2024 at 2:22 PM C. M. Heard wrote: >> >>> TSVWG went over this ground, to some extent at least, during the initial >>> discussions of the initial versions of draft-reddy-tsvwg-explcit-signal >>> (now expired) and draft-kaippallimalil-tsvwg-media-hdr-wireless (still >>> active). After several threads in which the merits of using UDP options for >>> host-to-network signaling was discussed (see, e.g., Challenges for host >>> to network signaling via UDP Options >>> <https://mailarchive.ietf.org/arch/msg/tsvwg/SpcVd6EB1Zi6FUhhyn2-o6nxuq4/> and >>> other messages in that thread), I think most in the WG came around to the >>> position of *not* wanting to see UDP options used for host-to-network >>> signaling, The chairs are, or course, the folks who can make authoritative >>> statements, but that was my impression, at least. The current version of >>> draft-kaippallimalil-tsvwg-media-hdr-wireless does propose to use UDP >>> options for signaling, but as part of a tunnel encapsulation arrangement, >>> which does not conflict with the desired E2E nature of UDP options. >>> >> >> Thanks for the pointer. I'm glad that the WG has already done what I've >> asked. >> > > I cited only one of the relevant threads. Would it be helpful if I were to > go back through the mailing list archives and add links to all of the > relevant threads in a comment? That will be a fair amount of work, but I am > willing to do it, *if* it will help the AD, the chairs, and the WG. > > Please let me know. > For me, I have the same understanding from the email discussions as you described above, so you can save some energy for other great things. I however, not aware of any consensus declared in the WG, may be the chairs want to do that to close the loop. //Zahed > > Mike Heard >
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… C. M. Heard
- [tsvwg] Review of draft-ietf-tsvwg-udp-options-32 Martin Duke
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… C. M. Heard
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… touch@strayalpha.com
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Christian Huitema
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Martin Duke
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Martin Duke
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Zaheduzzaman Sarker
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Gorry (erg)
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Zaheduzzaman Sarker
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Christian Huitema
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Tom Herbert
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Christian Huitema
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Tom Herbert
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Christian Huitema
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Joe Touch
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… touch@strayalpha.com
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Sebastian Moeller
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… touch@strayalpha.com
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Zaheduzzaman Sarker
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Zaheduzzaman Sarker
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… C. M. Heard
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… C. M. Heard
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… touch@strayalpha.com
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Martin Duke
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… C. M. Heard
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… C. M. Heard
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Christian Huitema
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Christian Huitema
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… C. M. Heard
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Erik Auerswald
- [tsvwg] Discarding the UDP surplus area when prot… C. M. Heard
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… C. M. Heard
- Re: [tsvwg] Discarding the UDP surplus area when … Tom Herbert
- [tsvwg] github issue long term archiving[ wa… Sebastian Moeller
- Re: [tsvwg] Discarding the UDP surplus area when … Gorry Fairhurst
- Re: [tsvwg] Review of draft-ietf-tsvwg-udp-option… Zaheduzzaman Sarker
- [tsvwg] Resolving UDP Options Issue #52 C. M. Heard
- [tsvwg] Re: Resolving UDP Options Issue #52 C. M. Heard
- [tsvwg] Re: Resolving UDP Options Issue #52 C. M. Heard