Re: [tsvwg] I-D Action: draft-ietf-tsvwg-transport-encrypt-04.txt

<Ruediger.Geib@telekom.de> Thu, 28 February 2019 09:14 UTC

Return-Path: <Ruediger.Geib@telekom.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3DF3130E7D for <tsvwg@ietfa.amsl.com>; Thu, 28 Feb 2019 01:14:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IEAfZokr-_nh for <tsvwg@ietfa.amsl.com>; Thu, 28 Feb 2019 01:14:39 -0800 (PST)
Received: from mailout21.telekom.de (MAILOUT21.telekom.de [194.25.225.215]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 66D88130E25 for <tsvwg@ietf.org>; Thu, 28 Feb 2019 01:14:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1551345278; x=1582881278; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=Hz6NmrtentDbbxXAVyxwLC4bHzF3qWaCMroPhs7GyPE=; b=QBHO51UvHxecMe5F1HywRqjFdBemNcpsZt9C63iALuFYUhUmMKqJ6EcQ lASAefnUDvvRqU54ajLS6jJf8bm9mLZgZsqzM+3f2Mul2ACkqJQjBLWet ZCASxU/jPuBex+x0RupJvkbUb52eKgdh6abWzPpex1xUAqB8H26U2I7Z5 +MgL10eicLRcmvGEX+bD4mHLlZKkV+1kLAl3kSL1tKgl/CJbh4ekGW8MF Dz+t+pig6yF1Im4jWkCgyGq/zqAQopgRr0THiVPhrRc+T08uyIEy7pttJ 2Vl+Wh2ik2afoqAEdKB6gxS1EM735AhSotNDAHmQJ6h8iC25f+geW+Dx+ w==;
Received: from qde9xy.de.t-internal.com ([10.171.254.32]) by MAILOUT21.dmznet.de.t-internal.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 28 Feb 2019 10:14:36 +0100
X-IronPort-AV: E=Sophos;i="5.58,422,1544482800"; d="scan'208";a="235934140"
Received: from he105871.emea1.cds.t-internal.com ([10.169.118.68]) by QDE9Y1.de.t-internal.com with ESMTP/TLS/AES256-SHA; 28 Feb 2019 09:54:37 +0100
Received: from HE105715.EMEA1.cds.t-internal.com (10.169.118.51) by HE105871.emea1.cds.t-internal.com (10.169.118.68) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 28 Feb 2019 09:54:37 +0100
Received: from HE104160.emea1.cds.t-internal.com (10.171.40.36) by HE105715.EMEA1.cds.t-internal.com (10.169.118.51) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Thu, 28 Feb 2019 09:54:37 +0100
Received: from GER01-LEJ-obe.outbound.protection.outlook.de (51.5.80.22) by O365mail03.telekom.de (172.30.0.232) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 28 Feb 2019 09:54:34 +0100
Received: from LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE (10.158.142.153) by LEJPR01MB0458.DEUPRD01.PROD.OUTLOOK.DE (10.158.142.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1643.18; Thu, 28 Feb 2019 08:54:36 +0000
Received: from LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE ([fe80::849c:7800:cb78:e940]) by LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE ([fe80::849c:7800:cb78:e940%5]) with mapi id 15.20.1643.022; Thu, 28 Feb 2019 08:54:36 +0000
From: Ruediger.Geib@telekom.de
To: tom@herbertland.com
CC: gorry@erg.abdn.ac.uk, tsvwg@ietf.org
Thread-Topic: [tsvwg] I-D Action: draft-ietf-tsvwg-transport-encrypt-04.txt
Thread-Index: AQHUyRZ5QALK2xYK3keZ6ppDOdPifKXonVUwgAAz0QCAAAEY8IAAFv4AgADv4iCAAI2rAIAA9MSQgACqtoCABCNcIIAED0MAgAC3OrA=
Date: Thu, 28 Feb 2019 08:54:36 +0000
Message-ID: <LEJPR01MB04601AD62AED2EC7F3C3E0239C750@LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE>
References: <155052226474.25978.1700439564007128149@ietfa.amsl.com> <CALx6S34o08DY-v-1S59VAerwpnf3wD6puNGe-Jq90aswYdK8Xw@mail.gmail.com> <5C6C3F9C.1070601@erg.abdn.ac.uk> <CALx6S35WuRra0njfY=HOCaF8v9ampkTG612nbjKwid=CHQNumQ@mail.gmail.com> <072547E4-D84D-4313-BEEE-0CB66A3C6A1C@csperkins.org> <LEJPR01MB0460F9AB6E2113F4CBF246EA9C7D0@LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE> <CALx6S37RjKafmj9V3CifCDVSTK7Xz+kWfJGmAbq6udWHJzTGxQ@mail.gmail.com> <LEJPR01MB0460EF67D703C8340A976DF39C7D0@LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE> <CALx6S34BbkeMumZ5-D2N9GOJ=bx=n-m6TGR0CVqU9iWVc0rH0w@mail.gmail.com> <LEJPR01MB046097E5E99F79B9F9A2C97A9C7E0@LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE> <CALx6S34ZFFO8uzFAt5aQ+ACTUXwH1t5jChewvxNuROpnPqdOjA@mail.gmail.com> <LEJPR01MB04609B9A82FC9FE960D445449C7F0@LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE> <CALx6S37DBmWpW_PDzm8P_X70qCGiHcFz=8DY5ZUhUk1dWgXgNQ@mail.gmail.com> <LEJPR01MB046073E87F7278B21A26E7FB9C7A0@LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE> <CALx6S341BDig0WGjjbbvjUCEY_3uA4vJ7=mKTGM=YP6J6+-Zmg@mail.gmail.com>
In-Reply-To: <CALx6S341BDig0WGjjbbvjUCEY_3uA4vJ7=mKTGM=YP6J6+-Zmg@mail.gmail.com>
Accept-Language: en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [164.19.3.6]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4a8bff78-dbb5-43d7-4a9f-08d69d5a5d8f
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:LEJPR01MB0458;
x-ms-traffictypediagnostic: LEJPR01MB0458:
x-microsoft-antispam-prvs: <LEJPR01MB0458CDBBC5EBDFAA7ACECB059C750@LEJPR01MB0458.DEUPRD01.PROD.OUTLOOK.DE>
x-forefront-prvs: 0962D394D2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(376002)(346002)(366004)(136003)(39860400002)(189003)(199004)(446003)(75402003)(71190400001)(7696005)(305945005)(71200400001)(11346002)(97736004)(81166006)(81156014)(66574012)(5660300002)(26005)(85202003)(85182001)(7736002)(66066001)(105586002)(106356001)(86362001)(476003)(30864003)(68736007)(8676002)(53936002)(316002)(33656002)(3846002)(52396003)(8936002)(2906002)(6116002)(72206003)(478600001)(76176011)(486006)(561944003)(55016002)(6916009)(93886005)(14454004)(54906003)(256004)(186003)(14444005)(6346003)(74482002)(9686003)(4326008)(53546011)(102836004)(777600001); DIR:OUT; SFP:1101; SCL:1; SRVR:LEJPR01MB0458; H:LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: telekom.de does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Ruediger.Geib@telekom.de;
x-microsoft-exchange-diagnostics: 1;LEJPR01MB0458;23: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
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: baEOmGfWPe/LhjkYHFsnEY3EdYVUrYHPIR+BBXgIa1bjt9LuW7TmghrAsT9eQVmf7zIhnnt0pZX2/PBUQlR8k3aFcB+E7mzsMb4ujS4zGo/gcN/balTlIdONVjRVfLU/xKu6TdUyECdrJtNSFpe2JSND7nkv2wH7cAcf6QLVx/5F8Z9S6J0uKWDNTVB3f7NhZ/dB1XMGvGr6okxWUwSElbwzajvWm0hdE4Z4el9O/jghjpYwcaVX7GDljr4JknMApfdKGjDTqLM+7mDxqlTlIjo3/mZFvnTahSROOHujn5pB6E8H2XMaOKISN0pjC/VeL0bDf71UV3V8NWZ86RkGt6PG5mK4+8+h4GpVuc5qXKr6oMwt7o2mHWH0NKsIaZ58saTUh3a+DRJ+Ft5R/cEC824lv9bi/8Tjucgsy9mmDVc=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 4a8bff78-dbb5-43d7-4a9f-08d69d5a5d8f
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Feb 2019 08:54:36.0622 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LEJPR01MB0458
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/8PMBZSgCOenXPt32n96Olr1h7NY>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-transport-encrypt-04.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2019 09:14:42 -0000

Hi Tom

what I'd prefer is a standardized default exposure of the discussed information by $transport_protocol. Something that's reliably part of commodity code. Evaluation of RTT information is passive, the nodes don't have to read the information, it's to be forwarded unchanged.

The window size optimization is a different story, as it requires active communication of nodes and terminals along a path. Got no expertise. My guts feeling is, that a simplistic generic mechanism may be feasible (not a perfect one).

As I mentioned, my transport know how is limited and I rely on others to judge, whether your draft and other proposals may find consent. It would be great to solve the issues once and maintain some generic design guidance, so that we don't have to have the whole discussion with every new transport protocol. 

Regards,

Ruediger


On Sun, Feb 24, 2019 at 11:52 PM <Ruediger.Geib@telekom.de> wrote:
>
> Tom,
>
> if consensus and a standard on your proposals for IPv4 and IPv6 can be reached, I'm ok. I'm not a transport protocol expert however (my expertise is QoS and network/transport QoS related QoE - I use the information to be gathered). Others can judge transport protocol related aspects better.

Hi Ruediger,

My proposal is to put network signaling and transport layer information an node wishes to expose in the common network layer.
Extension headers have been designed for this purpose, but they are only defined for IPv6 and some intermediate nodes don't like them anyway. I posted  draft-herbert-ipv4-udpencap-eh-00 as a proposed solution.

Tom

>
> Regards,
>
> Ruediger
>
>
> -----Ursprüngliche Nachricht-----
> From: Tom Herbert <tom@herbertland.com>
>
> [RG] I've re-ordered that, Tom's response above my last mail now...
>
> Ruediger,
>
> Yes, ECN is good example of an IP layer mechanism that carries information of interest to various transport layer protocols. A router can set ECN with no regard to the transport or payload so the mechanism works with TCP, QUIC, SCTP, etc. But, ECN bits are in the IP header and there really are no reserved bits in either IPv4 or IPv6 headers and no bits that can be easily repurposed for other uses (people have tried, there have been several proposals to repurpose bits in the IPv6 flow label for instance).
>
> The correct solution is put the exposed transport information, or more generally host to network signals, in an extensible lower protocol (i.e. in the network layer). In IPv6 that would be Hop-by-Hop options.
> For IPv4, it's a little more difficult to find a good solution, some sort of shim header might work (SPUD was proposed for that). The third high order bit of Hop-by-Hop options indicates whether the option can be modified in-flight and non-modifiable data can be authenticated so it is robust. There are other considerations such as ensuring that signals can't be spoofed to gain an unfair advantage and that exposed data might need to be scoped somehow (for instance I might be willing to share information with my local provider, but not to the whole Internet).
>
> Tom
>
>
> On Thu, Feb 21, 2019 at 11:33 PM <Ruediger.Geib@telekom.de> wrote:
> >
> >
> >
> > [TH]  The RTT and other information can only be extracted from transport layer headers under very specific circumstances (header has the right fields, transport header is visible and in cleartext, intermediate devices can parse the transport layer protocol, etc.).
> >
> > [RG] Agree. By chance TCP allows to determine RTT within the network. RTT monitoring allows network providers optimize router buffers and supports QoE estimates. I'm out for simple solutions. My take is, IETF should provide hints to transport  protocol designers. If transport protocol features are impacted by network properties, then allow the network to detect these. Transport depending on determination of the bandwidth delay product is impacted network features. Classic TCP shows (by chance) that exposing RTT information is feasible and it is beneficial for endpoints as well as for network providers.
> >
> > [RG] As general guidance I suggest: if a new transport protocol depends on bandwidth delay product optimization then expose the relevant information by design to those partys in your chain operation, which may impact the bandwidth-delay-product.
> >
> > [TH] If you want a win-win than provide a solution that works with all protocols, promotes security, minimizes effort, and ends protocol ossification. I don't see that this draft proposes anything resembling such a solution. The idea seems to be that transport protocol designers should consider purposely sending some fields in the clear.
> > Okay, but what exactly are the requirements? How is it simple if this needs to be done independently for every transport protocol? What are the realities of that to be feasible? Is the requirements and assumption that all transport protocols have to provide the same information as TCP? What about network mechanisms that want to modify fields like the receive window-- how does that work robustly in other transport protocols?
> >
> > [RG] Requirements: see above. I don't advocate to recommend RTT communication exactly like it is done for TCP - I'm open for discussion between involved experts. I prefer a single recommended approach. As you note yourself, "works with all protocols" and "independently for every transport" - the networks of today can't do per transport protocol or per flow optimization. Fast forwarding and some generic filter edge policies, that's it. Measurements for QoS based QoE estimation and RTT are done passive. I'm not aware of any approach distinguishing transport protocols down to every detail (UDP, TCP, the latter TLS or not and QUIC ... ). Router buffer dimensioning isn't done per transport protocol. A commercial provider network is optimized to service the majority of the users fairly well. "Corner cases" are all those transport protocols which have a share of, say, a low single digit percentage in a commercial network.
> >
> > [TH] What about network mechanisms that want to modify fields like the receive window-- how does that work robustly in other transport protocols?
> >
> > [RG] Above I talk about passive measurements. Here you talk about a kind of active communication between routers and of transport protocols (if I get you right - I got no expertise). To me, you mix things which need to be discussed separately. If routers are to support transport features actively, mechanisms need to be standardized to a high degree. Let's take ECN is an example. Two well defined IP layer bits. It took years to switch from the early standardized interpretation to experimental ones. I think, well defined fields and a simple general standard support are the only way to enable routers to communicate information to transport protocols (apart for communicating by "packet drop").
> >
> > Regards, Ruediger
> >
> >
> > -----Ursprüngliche Nachricht-----
> > Von: Tom Herbert <tom@herbertland.com>
> > Gesendet: Donnerstag, 21. Februar 2019 16:46
> > An: Geib, Rüdiger <Ruediger.Geib@telekom.de>
> > Cc: Gorry Fairhurst <gorry@erg.abdn.ac.uk>; tsvwg <tsvwg@ietf.org>
> > Betreff: Re: [tsvwg] I-D Action:
> > draft-ietf-tsvwg-transport-encrypt-04.txt
> >
> > On Wed, Feb 20, 2019 at 11:46 PM <Ruediger.Geib@telekom.de> wrote:
> > >
> > > To find a definition for bulk usage transport and set apart corner 
> > > cases (like tunnels, SCTP and so on),
> >
> > I still don't understand what "corner case" means with respect to standard IETF protocols. Can you please define this? What are the requirments for a protocol being a corner case on the Internet or not?
> > Who makes this determination?
> >
> > > please have a read into state-of-the-art QoE estimation research. There's ample literature on that. In the recent years, QoE research is mostly based on the evaluation of several thousand flows. In many cases captured by commodity terminals connected to consumer Internet products.
> > >
> > > TCP or QUIC measure RTT by design. As we all know, RTT can easily be measured by evaluating transport protocol information, if exposed. This information helps to optimize provider networks.  What you recommend is to add an extra header to have a surrogate RTT measurement (if standardisation works out well, IOAM isn't  commodity network feature). I prefer simple solutions. The RTT information can be extracted from the transport layer, as we all know.
> >
> > No, we don't all know that. The RTT and other information can only be extracted from transport layer headers under very specific circumstances (header has the right fields, transport header is visible and in cleartext, intermediate devices can parse the transport layer protocol, etc.).
> > >
> > > The solutions you advocate result in monitoring strategies 
> > > requiring monitoring applications on consumer terminals. To me, 
> > > that threatens security of those consumers willing to support such 
> > > an
> >
> > Applications are already heavily monitored as endpoints. The information that can be gathered about an application from some random point in the network is extremely limited. Application developers rely on the data collected at endpoints to make their decisions. The only time we need drill down to see what is happening in the network is when we see particular networks are messing things up (for instance, when we noticed that some  network devices we're drop SYNs with data when TFO was being developed).
> >
> > > approach more that exposing some network related information in transport headers. IOAM is an approach which might work some day. QoS and QoE monitoring based on applications in consumer terminals is deployed today. I expect the latter to spread, and to spread faster, the less network related information is exposed to network operators.
> > >
> > > I don't think that TCP/IP is the one and only and I don't think that things never change, as I'm changing them myself. I prefer to create win-win solution based on solutions which are as simple as possible. In my experience solutions with these properties work best.
> >
> > If you want a win-win than provide a solution that works with all protocols, promotes security, minimizes effort, and ends protocol ossification. I don't see that this draft proposes anything resembling such a solution. The idea seems to be that transport protocol designers should consider purposely sending some fields in the clear.
> > Okay, but what exactly are the requirements? How is it simple if this needs to be done independently for every transport protocol? What are the realities of that to be feasible? Is the requirements and assumption that all transport protocols have to provide the same information as TCP? What about network mechanisms that want to modify fields like the receive window-- how does that work robustly in other transport protocols?
> >
> > Tom
> >
> > >
> > > Regards,
> > >
> > > Ruediger
> > >
> > >
> > >
> [snip]