[tsvwg] New Version Notification for draft-ietf-tsvwg-transport-encrypt-14.txt

Gorry Fairhurst <gorry@erg.abdn.ac.uk> Fri, 03 April 2020 15:42 UTC

Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 139043A19A9 for <tsvwg@ietfa.amsl.com>; Fri, 3 Apr 2020 08:42:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id HAee5LhV2tT6 for <tsvwg@ietfa.amsl.com>; Fri, 3 Apr 2020 08:42:06 -0700 (PDT)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk []) by ietfa.amsl.com (Postfix) with ESMTP id 779123A19B7 for <tsvwg@ietf.org>; Fri, 3 Apr 2020 08:42:06 -0700 (PDT)
Received: from GF-MacBook-Pro.local (fgrpf.plus.com []) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPSA id A198E1B000AD for <tsvwg@ietf.org>; Fri, 3 Apr 2020 16:42:03 +0100 (BST)
References: <158592758395.17690.7856857618466779244@ietfa.amsl.com>
To: "tsvwg@ietf.org" <tsvwg@ietf.org>
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
X-Forwarded-Message-Id: <158592758395.17690.7856857618466779244@ietfa.amsl.com>
Message-ID: <705b66b2-b329-5338-7f8a-916b81ef1855@erg.abdn.ac.uk>
Date: Fri, 3 Apr 2020 16:42:02 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:68.0) Gecko/20100101 Thunderbird/68.6.0
MIME-Version: 1.0
In-Reply-To: <158592758395.17690.7856857618466779244@ietfa.amsl.com>
Content-Type: multipart/alternative; boundary="------------AE1942702A2643A1947B836C"
Content-Language: en-GB
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/77Kh8qEEMgrO6tU3V8djoMrNQmk>
Subject: [tsvwg] New Version Notification for draft-ietf-tsvwg-transport-encrypt-14.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 15:42:09 -0000


We have finally posted a new revision of the encryption draft (below). 
This represents a compromise between different viewpoints and seeks to 
provide something that we can use to move forward. In particular, we're 
grateful for behind the scenes work by many people to form this text, 
and in particular for David's patience as the document shepherd. We 
extracted some text from section 5 into a new section 6. This seems (in 
retrospect) a useful place to bring together observations on eplicitly 
exposing information, rather than the OEM use-case (now the focus on 
section 5). In seeking useful words, we borrowed some throughts from 
Ted's IAB document (and specifically the security considerations of RFC 

We'd love to go further with this topic to discuss about what comes 
next, but as has been said before, this document is about 
considerations. I'm very conscious that this should have been published 
years ago, in preparation for the emergence of growing encyption. Alas, 
we did not have the foresight to do this. Hopefully this will be a basis 
to new thinking about how transport designs should evolve in a world of 
increased encryption. So, my question to the group: is it possible we 
can live with the current text and publish this?

Gorry & Colin

(with no-hats, as simple document editors)

-------- Forwarded Message --------
Subject: 	New Version Notification for 
Date: 	Fri, 03 Apr 2020 08:26:23 -0700
From: 	internet-drafts@ietf.org
To: 	Colin Perkins <csp@csperkins.org>rg>, Gorry Fairhurst 
<gorry@erg.abdn.ac.uk>uk>, Godred Fairhurst <gorry@erg.abdn.ac.uk>

A new version of I-D, draft-ietf-tsvwg-transport-encrypt-14.txt
has been successfully submitted by Godred Fairhurst and posted to the
IETF repository.

Name: draft-ietf-tsvwg-transport-encrypt
Revision: 14
Title: Considerations around Transport Header Confidentiality, Network 
Operations, and the Evolution of Internet Transport Protocols
Document date: 2020-04-03
Group: tsvwg
Pages: 51
Status: https://datatracker.ietf.org/doc/draft-ietf-tsvwg-transport-encrypt/
Htmlized: https://tools.ietf.org/html/draft-ietf-tsvwg-transport-encrypt-14

To protect user data and privacy, Internet transport protocols have
supported payload encryption and authentication for some time. Such
encryption and authentication is now also starting to be applied to
the transport protocol headers. This helps avoid transport protocol
ossification by middleboxes, while also protecting metadata about the
communication. Current operational practice in some networks inspect
transport header information within the network, but this is no
longer possible when those transport headers are encrypted. This
document discusses the possible impact when network traffic uses a
protocol with an encrypted transport header. It suggests issues to
consider when designing new transport protocols or features. These
considerations arise from concerns such as network operations,
prevention of network ossification, enabling transport protocol
evolution and respect for user privacy.

Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat