Re: [tsvwg] 3rd WGLC (limited-scope): draft-ietf-tsvwg-transport-encrypt-15, closes 29 June 2020

Mike Bishop <mbishop@evequefou.be> Wed, 10 June 2020 15:45 UTC

Return-Path: <mbishop@evequefou.be>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 05FE63A086A for <tsvwg@ietfa.amsl.com>; Wed, 10 Jun 2020 08:45:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=evequefou.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tHcy0doLDYJt for <tsvwg@ietfa.amsl.com>; Wed, 10 Jun 2020 08:45:53 -0700 (PDT)
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2135.outbound.protection.outlook.com [40.107.92.135]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C97B3A085A for <tsvwg@ietf.org>; Wed, 10 Jun 2020 08:45:52 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=B2r/9Z0HXrpX9UilcMAtFvvFCPSmSduoYKlF/E+WIBAa5olsfF1Fps9oSD5bRw8QlVxWX1xylG/6COiRnTXeB3MBBFH4pZdW6AM6w0Pz2UpvT8U73dVJHn3ulah1vqkjCSWxnJeeNrCQPVFZh9Q/IZ1ICBy2ipVl0T+oOW6LzQHaTPSLJ1TlwXp5WLLGtphf+01Jbg01ruMi+gVW9167kBJTYGdDw6RdRUmhJzJ+Zs3Jq+jZDE8MWC9IHvZn/zcrwgt0xSOhxik2Gp8UzXbZipmvggA6a0jev/HgLuHg2/RyyQOIMcvNOMbMFRnRSwSQ1rntjpqqtXp40apbde85oQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8X+yPuyxT3FH//WgiKA00I/+hGmNDveu2oogQY5HpYQ=; b=dBJymjgiaWIxo3G1oRN5k0mxUu9kWrAP2A/93PK8QMOU9hEdfPt9yqVARAQSQrrjmCJilnfmQrZVEZ7DWmJsGc2leQ7X34Q+HIWTkC/BxKZ/EP65rJFtVn7wtEM34Kcq6q84K8107eJHkdEff7o+CbV0sPbeZwVCn8gvOU0b/8y1dtFaZf6yqeK+Kvkc2/Fr4tE+mmAzPiFolPwHmrabjHHl7he7KQx7K8JYMGowN3kejcB7c0TPP+LOpfabl5lJAItCxM7EDcZhhmM+oeiJojVrDSnEGRQ4QuTiwSk+GLpMMCvTnFGsD2x6k6jKQYI9l/IG0tEmC1UZU+0FwW86ug==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=evequefou.be; dmarc=pass action=none header.from=evequefou.be; dkim=pass header.d=evequefou.be; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=evequefou.onmicrosoft.com; s=selector2-evequefou-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8X+yPuyxT3FH//WgiKA00I/+hGmNDveu2oogQY5HpYQ=; b=rIiPM/DykpUkOAHeisG6bL98NRxcPHM1pm1h8f6XoegFNnVJ+iUwmohYH3xpRdLsBPdpE4CndcrHRK41Rv4E7cTlKE+KLS+kR+t39IdX8bEE1hTRYsglz6P7GLtwrsWVtG4K+e3/kpDpjmPlqfM9X2hSk4q3Rof3ZqoKyOGXSeM=
Received: from MN2PR22MB2093.namprd22.prod.outlook.com (2603:10b6:208:207::15) by MN2PR22MB1806.namprd22.prod.outlook.com (2603:10b6:208:20a::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3088.21; Wed, 10 Jun 2020 15:45:50 +0000
Received: from MN2PR22MB2093.namprd22.prod.outlook.com ([fe80::3944:6ec8:fc47:65c5]) by MN2PR22MB2093.namprd22.prod.outlook.com ([fe80::3944:6ec8:fc47:65c5%4]) with mapi id 15.20.3066.023; Wed, 10 Jun 2020 15:45:50 +0000
From: Mike Bishop <mbishop@evequefou.be>
To: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] 3rd WGLC (limited-scope): draft-ietf-tsvwg-transport-encrypt-15, closes 29 June 2020
Thread-Index: AQHWPv5dRzbBr1UI6kahWxlqNSrGA6jR7Guw
Date: Wed, 10 Jun 2020 15:45:50 +0000
Message-ID: <MN2PR22MB20937288EA97CC6713196657DA830@MN2PR22MB2093.namprd22.prod.outlook.com>
References: <MN2PR19MB40450EE357BEECD723AB06F183820@MN2PR19MB4045.namprd19.prod.outlook.com> <63DFB8B9-83DA-445E-AB71-1486D7BA33B4@eggert.org>
In-Reply-To: <63DFB8B9-83DA-445E-AB71-1486D7BA33B4@eggert.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=evequefou.be;
x-originating-ip: [2600:2b00:9309:6a01:1013:6e7:4b3a:5b0f]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 85f11d42-0dd0-4dbe-4422-08d80d5559e5
x-ms-traffictypediagnostic: MN2PR22MB1806:
x-microsoft-antispam-prvs: <MN2PR22MB180673DFA85712965D7EFE97DA830@MN2PR22MB1806.namprd22.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0430FA5CB7
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: of4gCiLXRI2xgrzo8gIDlWz8MLBkd55UwUJ8UpQCnf/KEhqdt3HSb0mRO8jQ1TzBCHu9uZmYBuWgNXFPXFaLC9GrRo/KINHD7UbEa6qhbWu4NfI86+2khE0jWqL2Ry8aY7z1DEY3/EAlj8FtD46iNGtcwJU/O3U/M3riDNVOzGBSFUr2exc7TiG80XLCCIXPTlTzeWYCHWPxbTfGRta/aBIc2bBj+ERWN/8DFo3ez9pM3WeCPXDJARmWAYTUx7xqqySL02AUZF64cfyHUS7YtofzU4kE0NMWDK8QdMqncOUegi1fexG+9aWn9AemyW0PEeesRhm9nR8/7kN/0uWQXV/y2B+asvtVYU41r2tGQM/Ornv9A4Vo64rbtMme/+aL6CR5Hg0AC4wzaBu6QnPjdg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR22MB2093.namprd22.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(396003)(136003)(39830400003)(376002)(346002)(366004)(66946007)(52536014)(76116006)(66476007)(83380400001)(66556008)(66446008)(64756008)(66574014)(166002)(33656002)(316002)(86362001)(186003)(6506007)(53546011)(7696005)(5660300002)(2906002)(71200400001)(55016002)(8936002)(6916009)(966005)(9686003)(508600001)(8676002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR22MB20937288EA97CC6713196657DA830MN2PR22MB2093namp_"
MIME-Version: 1.0
X-OriginatorOrg: evequefou.be
X-MS-Exchange-CrossTenant-Network-Message-Id: 85f11d42-0dd0-4dbe-4422-08d80d5559e5
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Jun 2020 15:45:50.2582 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 41eaf50b-882d-47eb-8c4c-0b5b76a9da8f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: RpsHyE/4PiPDyge7YqCD2FtJWJWzJ9ys3yvhucSXHzByQgfMD3GzqB7uWC9pNbBAqtcAysA5X5tbztbD8Jh7Zg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR22MB1806
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/p0F-zda_vGweoLP3QBDtOq5_5yM>
Subject: Re: [tsvwg] 3rd WGLC (limited-scope): draft-ietf-tsvwg-transport-encrypt-15, closes 29 June 2020
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jun 2020 15:45:56 -0000

At a high level, I find myself agreeing with David and Ekr: this document doesn’t tell you whether to encrypt, it describes what breaks if you do.  According to the Conclusion, that is its goal.

   This document has described some current practises, and the

   implications for some stake holders, when transport layer header

   encryption is used.  It does not judge whether these practises are

   necessary, or endorse the use of any specific practise.

I was surprised, however, that it doesn’t go into equal depth about what breaks if you don’t encrypt.  While both sides of the coin are present in the document, one side is presented in considerably more detail than the other.  This document starts off fairly balanced; I found Section 2 to be an excellent discussion of the trade-offs in this space.  Section 3 turns a corner into an extensive discussion of all the things inspection of the transport headers are used for today, weighing in at 14 pages.  Interestingly, this includes at least one example of exactly the behavior that’s discussed as a problem in Section 2:

      A network operator can observe the headers of transport protocols
      layered above UDP to understand if the datagram flows comply with
      congestion control expectations.

Dropping packets which don’t comply with the operator’s “expectations” in a protocol they don’t understand is exactly why new protocols and evolution of existing protocols want to limit the ability of these devices to inspect their traffic.

Section 4.1 devotes all of one page to the reasons why protocol developers might choose to encrypt; the rest of section 4 describes various forms of integrity and confidentiality mechanisms in extant protocols.  The remainder of the document discusses alternative ways to enable the scenarios of Section 3 in the presence of encryption.


On the whole, I think this document could be suitable for publication as an Informational RFC; it provides real-world context for a trade-off that every protocol designer needs to consider carefully.  However, I don’t believe its current state reflects, in Ekr’s words, “the IETF community's view of the relative priority of these concerns.”


From: QUIC <quic-bounces@ietf.org> On Behalf Of Lars Eggert
Sent: Wednesday, June 10, 2020 4:08 AM
To: IETF QUIC WG <quic@ietf.org>
Subject: Fwd: [tsvwg] 3rd WGLC (limited-scope): draft-ietf-tsvwg-transport-encrypt-15, closes 29 June 2020

FYI


Begin forwarded message:

From: "Black, David" <David.Black@dell.com<mailto:David.Black@dell.com>>
Subject: [tsvwg] 3rd WGLC (limited-scope): draft-ietf-tsvwg-transport-encrypt-15, closes 29 June 2020
Date: June 9, 2020 at 4:41:40 GMT+3
To: "tsvwg@ietf.org<mailto:tsvwg@ietf.org>" <tsvwg@ietf.org<mailto:tsvwg@ietf.org>>
Cc: int-area <int-area@ietf.org<mailto:int-area@ietf.org>>, IETF SAAG <saag@ietf.org<mailto:saag@ietf.org>>

This email announces a limited-scope 3rd TSVWG Working Group Last Call (WGLC) on:

    Considerations around Transport Header Confidentiality, Network
     Operations, and the Evolution of Internet Transport Protocols
                 draft-ietf-tsvwg-transport-encrypt-15
https://datatracker.ietf.org/doc/draft-ietf-tsvwg-transport-encrypt/

This draft is intended to become an Informational RFC.  This WGLC has
been cc:’d to the SAAG and INT-AREA lists courtesy of the breadth of
interest in this draft, but WGLC discussion will take place on the TSVWG
list (tsvwg@ietf.org<mailto:tsvwg@ietf.org>) – please don’t remove that list address if/when
replying with WGLC comments.

This 3rd WGLC will run through the end of the day on Monday, June 29,
2 weeks before the draft submission cutoff for IETF 108.

This 3rd WGLC is limited to the following two topics:


  1.  Whether or not to proceed with a request for RFC publication
of the draft.   The decision on whether or not to proceed will
be based on rough consensus of the WG, see RFC 7282.
During the 2nd WGLC, Eric Rescorla and David Schinazi expressed
strong views that this draft should not be published –  those
concerns have not been resolved and are carried forward to
this WGLC.  This email message was an attempt to summarize
those concerns:
https://mailarchive.ietf.org/arch/msg/tsvwg/i4qyY1HRqKwm0Jme9UtEb6DyhXU/
Further explanation from both Eric Rescorla and David Schinazi
is welcome and encouraged to ensure that their concerns are
clearly understood.


  1.  Review of changes made since the -12 version of the draft that
was the subject of the second WGLC (e.g., whether or not they
suffice to resolve concerns raised during that WGLC, other
than overall objections to publishing this draft as an RFC):
https://www.ietf.org/rfcdiff?url1=draft-ietf-tsvwg-transport-encrypt-12&url2=draft-ietf-tsvwg-transport-encrypt-15

Comments should be sent to the tsvwg@ietf.org<mailto:tsvwg@ietf.org> list, although purely
editorial comments may be sent directly to the authors.  Please cc: the
WG chairs at tsvwg-chairs@ietf.org<mailto:tsvwg-chairs@ietf.org>  if you would like the chairs to
track such editorial comments as part of the WGLC process.

No IPR disclosures have been submitted directly on this draft.

Thanks,
David and Wes (TSVWG Co-Chairs – Gorry is recused as a draft author)