Re: [tsvwg] Regarding DTLS and UDP options

Tom Herbert <tom@herbertland.com> Mon, 17 April 2017 20:48 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F2F3129449 for <tsvwg@ietfa.amsl.com>; Mon, 17 Apr 2017 13:48:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lolTsv8tFIdV for <tsvwg@ietfa.amsl.com>; Mon, 17 Apr 2017 13:48:01 -0700 (PDT)
Received: from mail-qk0-x22a.google.com (mail-qk0-x22a.google.com [IPv6:2607:f8b0:400d:c09::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 00CEB127977 for <tsvwg@ietf.org>; Mon, 17 Apr 2017 13:48:00 -0700 (PDT)
Received: by mail-qk0-x22a.google.com with SMTP id h67so114776380qke.0 for <tsvwg@ietf.org>; Mon, 17 Apr 2017 13:48:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=GkFaw8jrCrnAuSUbT5LImPRvobS2b07fqm+ArPfDYy0=; b=Bd5SezoBav7SJEKf32CZ7fxgwOXhb70c9IlzqKFhi4hEkhxWu34VQkrJ8fJzkezLkq o67MVSWUUZpNdM6NAu8IfZ7ZvQ86WEFE8XOc3Rd39ONtW3FnPLOrtUvw8AOI89Mrv47p lZwh6ZuCtEGZrx6iRtMOvCE6ksPmlAuAK3lSeAtpfiaFD8BgNsR58FoNhZacGVm33gqI ywdInQiOJdqImteqVXhsjnGsPZuK9ewdg0B7DB+tdtCoXIykY75WCZlOOln2x+oYPZcH X/8HJbVTMWV9K9nmKMpgqw9JAht3/6y/YDHcZ5Js7EF1GjOwW08XtSonNQ/doOM+f+nq xIfQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=GkFaw8jrCrnAuSUbT5LImPRvobS2b07fqm+ArPfDYy0=; b=njwj5vT8hfaaDvt2xY4Ic0bB6eEtEQ7DJNw44GOLmTuGQI6LLFgCYqkVf3xos8KET0 jJHFync5New/uSfVz2zGEZihdQAYS9grbH3sEab08MQnZ/S4hc7286k2sOQ+MnKB1vhg 7DFjuEIfCaQdJ5flMvAuu6FHj1qosXrckhZe9bKhmI5cttD0OnkjzDgbc8an5vi8wnpH 0QmYfSVZapZaYoYTSGaJp0uNDWVHucigOoTVC489u5LY0UT6Id1SR+iSe8i0gS57TvZ1 lhc7R5rQPZgCS+Q35dT2QHfDApH2Abr/tuKPcjk1LxCx5rUulUwUVedYtFJPu+23MUZL zGVw==
X-Gm-Message-State: AN3rC/4Lw5IOA+RtTSAcZOzeQCayIs+YgK3qmjSjUQyDNwuOZ/npUZAK 0o2Oe738PHbp3YILck1ufVj/GDyqKg==
X-Received: by 10.55.140.65 with SMTP id o62mr10998672qkd.270.1492462080013; Mon, 17 Apr 2017 13:48:00 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.140.97.10 with HTTP; Mon, 17 Apr 2017 13:47:59 -0700 (PDT)
In-Reply-To: <8b1829ba-4e8d-5ee1-e24c-f42962f47dde@isi.edu>
References: <CACL_3VFeJs7KzG9Bchh15bfZ3CmaOPWcfisEreNoGYK5CsEJ+g@mail.gmail.com> <3a4a6b78-8146-de4c-6246-7bd09de44f1c@isi.edu> <CACL_3VFkr3mGe-yTbvHrTZcKVCpEv3FeSOyoShUxCK5+9Tdqqg@mail.gmail.com> <c79fe3d0-8567-ea7d-72fc-bd33732df60e@isi.edu> <CACL_3VHmoCSo23OWqQFq7upw749CqMK7iazXrBKZARzwbzY5mw@mail.gmail.com> <f97f08d4-0070-437a-e22a-8782497c76eb@isi.edu> <4e36af95-84c3-bc7e-b18a-614f8bfab662@isi.edu> <58F48403.8080302@erg.abdn.ac.uk> <a0f656e8-e847-db54-6046-2078364d428b@isi.edu> <CALx6S36HYHdbGoJHNb+mVY6reu9RLikLxDJqrPgwO9tF1EfSgQ@mail.gmail.com> <8b1829ba-4e8d-5ee1-e24c-f42962f47dde@isi.edu>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 17 Apr 2017 13:47:59 -0700
Message-ID: <CALx6S36=7KbTtv9QNUBTg6gPYQQighsPD_+mWNc=wUQTX70VBQ@mail.gmail.com>
To: Joe Touch <touch@isi.edu>
Cc: "gorry@erg.abdn.ac.uk" <gorry@erg.abdn.ac.uk>, tsvwg <tsvwg@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/BpERZiqkfwsTdn8mibs2ar_xacg>
Subject: Re: [tsvwg] Regarding DTLS and UDP options
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Apr 2017 20:48:02 -0000

On Mon, Apr 17, 2017 at 1:34 PM, Joe Touch <touch@isi.edu> wrote:
>
>
> On 4/17/2017 1:29 PM, Tom Herbert wrote:
>> On Mon, Apr 17, 2017 at 12:11 PM, Joe Touch <touch@isi.edu> wrote:
>>> FYI - draft 08 has just been uploaded to address this issue in the
>>> security considerations section.
>>>
>>> I would like to ask that the chairs to ask the WG to consider adopting
>>> this as a standards track doc.
>>>
>> Joe,
>>
>> The draft lists intended status as experimental, but above you're
>> asking for adoption for standard track?
>
> That's correct.
>
>> I would be worried about
>> making this standard if it retroactively defines all cases where IP
>> length is greater than UDP length as now containing UDP options.
>
> It does exactly that, but has checksums to validate when that happens.
>
>>
>> One thing that might be missing from the draft is middle box handling.
> This is already discussed extensively in the document, including in
> response to previous TSVWG discussion. That's why we now default to
> using the OCS and a length validation. Do you have specific concerns?
>
>> I suspect your intent is that options are meant only for end to end
>> consumption
>
> That's frankly true of all transport options, not just these in UDP.
>
>> and so middleboxes must pass packets with UDP options,
>> should not attempt to parse the UDP options, and must not modify
>> options.
> We already addressed that in the doc.

I'm sorry, which section is this info in?

Thanks,
Tom

>
> Joe
>
>>
>> Tom
>>
>>> Joe
>>>
>>> A new version of I-D, draft-touch-tsvwg-udp-options-08.txt
>>> has been successfully submitted by Joe Touch and posted to the
>>> IETF repository.
>>>
>>> Name:           draft-touch-tsvwg-udp-options
>>> Revision:       08
>>> Title:          Transport Options for UDP
>>> Document date:  2017-04-17
>>> Group:          Individual Submission
>>> Pages:          25
>>> URL:            https://www.ietf.org/internet-drafts/draft-touch-tsvwg-udp-options-08.txt
>>> Status:         https://datatracker.ietf.org/doc/draft-touch-tsvwg-udp-options/
>>> Htmlized:       https://tools.ietf.org/html/draft-touch-tsvwg-udp-options-08
>>> Htmlized:       https://datatracker.ietf.org/doc/html/draft-touch-tsvwg-udp-options-08
>>> Diff:           https://www.ietf.org/rfcdiff?url2=draft-touch-tsvwg-udp-options-08
>>>
>>>
>>> On 4/17/2017 1:59 AM, Gorry Fairhurst wrote:
>>>> Thanks Joe,
>>>>
>>>> That seems to be exactly the question the WG asked to explore. I agree
>>>> your next update should add a small susbsection on how DTLS should be
>>>> handled.
>>>>
>>>> Gorry
>>>>
>>>> On 15/04/2017, 00:56, Joe Touch wrote:
>>>>> Hi, all,
>>>>>
>>>>> Christian Huitema a question about the interaction between DTLS and UDP
>>>>> options during my remote presentation at IETF 98.
>>>>>
>>>>> I took a closer look and consulted with Eric Rescorla (DTLS author). He
>>>>> and I agreed as follows:
>>>>> - DTLS would currently not cover UDP options; DTLS protects only the UDP
>>>>> payload
>>>>> - the situation is analogous to TCP options, which are not covered by
>>>>> TLS
>>>>> I.e., both TLS and DTLS are transport *payload* security only, despite
>>>>> their names.
>>>>>
>>>>> Christian noted that this may be a reason QUIC prefers UDP (to avoid the
>>>>> need to protection transport options), however QUIC does not (and
>>>>> cannot) deprecate UDP payloads that are smaller than the IP payload.
>>>>> That would require a change to RFC 768.
>>>>>
>>>>> I'll add a clarification on this point to the next rev of the UDP
>>>>> options document.
>>>>>
>>>>> Joe
>