Re: [tsvwg] Fwd: New Version Notification for draft-reddy-tsvwg-explcit-signal-00.txt

tirumal reddy <kondtir@gmail.com> Wed, 22 February 2023 05:12 UTC

Return-Path: <kondtir@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B3D2C19E110 for <tsvwg@ietfa.amsl.com>; Tue, 21 Feb 2023 21:12:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.094
X-Spam-Level:
X-Spam-Status: No, score=-7.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yfSUhBwnE-rR for <tsvwg@ietfa.amsl.com>; Tue, 21 Feb 2023 21:12:25 -0800 (PST)
Received: from mail-lj1-x231.google.com (mail-lj1-x231.google.com [IPv6:2a00:1450:4864:20::231]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 830F5C1782C4 for <tsvwg@ietf.org>; Tue, 21 Feb 2023 21:12:25 -0800 (PST)
Received: by mail-lj1-x231.google.com with SMTP id by8so1673014ljb.7 for <tsvwg@ietf.org>; Tue, 21 Feb 2023 21:12:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=xAO3xz5gH45sUMS63DdWNAuQwTqJZp3sQmPhCeJW1I0=; b=dF9iPE/msqh3vzqHUL3aBAopV4KNLIONE+fYDY0k396UOkefdA9M2BwxnGp/1o0XK/ b3aVfZStSG3AoPCdb0xtJj4cKXvZ+GZXft6WRaWYkgz1y3Q/c2BgzWzRa5aHzMB85hNL 0wPjV2VfTCNeARHj55nxoBwybwx4eKyIwlu/eG8EIrZlsr3dDTjnccK9l85/YnsnGb71 BYnDzyGY3nSxn11O32dxpVcQOFCeGbWR7vmyB+Ldxdj7AfmAS2Qi7iz5JlNN1RRQWWBs +yozacKDD9FF11uR/RoR7J9vs4i0NPtAm5WmlbbXZB7Vu244654tM510YHuFOmY+nvbK G5cg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=xAO3xz5gH45sUMS63DdWNAuQwTqJZp3sQmPhCeJW1I0=; b=2BFZwCIm/wm/BJWNYyagt50joo+jQrvVpSGyFnuciBfi+D17EqZwu2iARpd816sLy7 3asSQHETvQ5ZiNBNPQXu/PGwm1xAlp41V3jAPAdVr8wIdq3VKEXNnZnofH2bHHJ52La+ hEueW6ZEZ/3JXq6ryHyT08+1olKhgEE+YahOlzCyDwNnGRKF9FMUGToMMVx6ZJ+KBi/f e7LtJjvjrpSXE3zqy5y4tlKr5btpokXSvWzOdfAS/yweuDta7PuaDXDwUJ6V7XgZJWxQ Vv2Z8jplcBQGakS+V1kYr6cXVvJGKb1Ib/Ovuzx7lmpg0ESiuY8IsCxGHigfzN47B/Pe 1trA==
X-Gm-Message-State: AO0yUKVAALCKT9u9rV/ZJ5JZUcM9ANvvVj40IKgQl4DxsP+K5MQ4yXYO wLQco5WfXqvGlQ5Ejv2W9GV/bQeVSDbuHgQOz2U=
X-Google-Smtp-Source: AK7set/NskbXHa/xsAKzwlZHtO882S97i57xPK/vd2SgwUjq7N6BZfXrIc23Mkm4VZdsNDHIldIVV4TRtygJexnACXE=
X-Received: by 2002:a05:651c:b9b:b0:295:945d:b382 with SMTP id bg27-20020a05651c0b9b00b00295945db382mr855274ljb.4.1677042742815; Tue, 21 Feb 2023 21:12:22 -0800 (PST)
MIME-Version: 1.0
References: <167592939329.52949.17763475463632062767@ietfa.amsl.com> <CAFpG3gdFojRowTpo-DBDh2czC9d-KemSetmeaOC3VZ=COqvOgg@mail.gmail.com> <CACL_3VE5KectHscwWLy3QfuqT_N1g8d=jFuL_Ar0zV=kdniG6w@mail.gmail.com> <CAFpG3gfYKdRQOsJ-NqAT64dRYJ3BX2yVcb4V=aw+TmPvJN-wOQ@mail.gmail.com> <CACL_3VEtHHSSecMPNyzSP442GieKexpZXHk7yyvwGFNUirfm0w@mail.gmail.com>
In-Reply-To: <CACL_3VEtHHSSecMPNyzSP442GieKexpZXHk7yyvwGFNUirfm0w@mail.gmail.com>
From: tirumal reddy <kondtir@gmail.com>
Date: Wed, 22 Feb 2023 10:42:11 +0530
Message-ID: <CAFpG3gfbd3wkF9euAyhb79OdNY-5hj=x6hMDN2RWcXakohQiAw@mail.gmail.com>
To: "C. M. Heard" <heard@pobox.com>
Cc: tsvwg@ietf.org
Content-Type: multipart/alternative; boundary="000000000000f5710805f542f012"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/F4oUTE-oN7QnGEO4AYnvCLdKk70>
Subject: Re: [tsvwg] Fwd: New Version Notification for draft-reddy-tsvwg-explcit-signal-00.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Feb 2023 05:12:29 -0000

On Tue, 21 Feb 2023 at 20:14, C. M. Heard <heard@pobox.com> wrote:

> On Tue, Feb 21, 2023 at 4:17 AM tirumal reddy <kondtir@gmail.com> wrote:
> >
> > On Tue, 21 Feb 2023 at 04:56, C. M. Heard <heard@pobox.com> wrote:
> >>
> >> One overall question: per
> https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-udp-options#section-14
> ,
> >>
> >>    UDP options are transport options. Generally, transport headers,
> >>    options, and data are not intended to be modified in-transit. UDP
> >>    options are no exception and here are specified as "MUST NOT" be
> >>    altered in transit. However, the UDP option mechanism provides no
> >>    specific protection against in-transit modification of the UDP
> >>    header, UDP payload, or surplus area, except as provided by the
> >>    OCS or the options selected (e.g., AUTH, or UENC).
> >>
> >>
> >> Does this draft comply with this requirement?
> >
> > Yes, the draft does not suggest any in-transit modification of the
> > UDP option.
>
> But, to be clear, the UDP options defined in this draft are designed to
> be inspected by cooperating intermediate nodes.
>

Yes, the data in the UDP options will be encrypted by the endpoint and can
be only decrypted by authorized network elements. It follows the
recommendations and guidance given in RFC8858 and
draft-iab-path-signals-collaboration to convey encrypted explicit signals
only when the signal's originator intends that it be used by authorized
on-path network elements.

-Tiru


>
> Mike Heard
>