[tsvwg] Review of draft-fairhurst-tsvwg-transport-encrypt
Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Tue, 08 May 2018 17:22 UTC
Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 22286127077 for <tsvwg@ietfa.amsl.com>; Tue, 8 May 2018 10:22:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GJ5CnxvpTV-e for <tsvwg@ietfa.amsl.com>; Tue, 8 May 2018 10:22:57 -0700 (PDT)
Received: from mail-io0-x236.google.com (mail-io0-x236.google.com [IPv6:2607:f8b0:4001:c06::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9980A12D877 for <tsvwg@ietf.org>; Tue, 8 May 2018 10:22:57 -0700 (PDT)
Received: by mail-io0-x236.google.com with SMTP id f21-v6so39344595iob.13 for <tsvwg@ietf.org>; Tue, 08 May 2018 10:22:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=udbU4Tu8eNTD9pUE+D4oqPMBOUPNaX5p6PK274lxNUI=; b=fC2hswrcejc81M+i3M7TgqfY/Q+AS4Lz61gX36VIGW/+xoOlOw+of5Cqf28fuBSjEq PxSJml9ByYgkr3uaFMRf/qIOaT47vVYTfKGlxhqB4R6qyjsoLLCkRWLF1UrkogYUWPSY y+iCek/9aIE0nyhStIgzcK7zycRbubb9kz/Ny/DLerd3nfrjXxg0aZ8kDEbi1Kf6ovnv e3pCvbE040QVYn/aZcbX/h3e0/krhBvZ/X6YENJaEliUVL0TcYqbXp/guLso2+RYvp+t QajsRAhH2kBnZfI67k8ac+AEobW7LNIHXRupSrpm0fXIdaxXQDGVLXMzNE2eDglSCDAf NiGQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=udbU4Tu8eNTD9pUE+D4oqPMBOUPNaX5p6PK274lxNUI=; b=qisWP2X7lISAJcdX1wKwg75/GyOjU2zgaIJh9wVMbZ3E3tUMd5lPqdAM8uEcQsa2wD 3uYcxAoqeBKA02Qc51tNe507wNd7iBmF2w+UAhSvr509RAcBo71/UyWclJXuhQRmR9tX sPXQst8wOqqevhxe2xmfQ/GGGGjh5b7Z7KHGSCEeMqu4aVyRe9csfazDjyl5AkJw94Wx t+miWNVd+u5P3ZyWqVa1Wf99OLpYWYCqkKxGZdFhRLKJkCn0v48FIRGgwOMaGmiXECz1 LOozud4+H6kYWudStNuyBMFwA8mVMFqKBYWiHY9M6ax9+kLuvtBokKjxKQJV25aYhoJj OD7Q==
X-Gm-Message-State: ALQs6tD2SP0n5gM35OrM1WHeDe2bX0T15ajk3zlLMfR4WmZ5RPldTnH7 Mn9RhowMwLAy3AYTKBkPmmaBmMTfDp1LR5MvFceN6g==
X-Google-Smtp-Source: AB8JxZo1gcBV5kBDzTJUQ8vCf9P1u8qKOu7b/B45jCZx2Jv+Zfl+MBcnMGTGTb6h8MLKjaKoEXvNlJK22bLIszxNfu4=
X-Received: by 2002:a6b:9a05:: with SMTP id c5-v6mr37374489ioe.142.1525800176894; Tue, 08 May 2018 10:22:56 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.192.188.19 with HTTP; Tue, 8 May 2018 10:22:16 -0700 (PDT)
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Tue, 08 May 2018 13:22:16 -0400
Message-ID: <CAHbuEH7DND0uz9bv9YSD_9BW02AfWB+YmONHMBMV+Xg7w-RDPw@mail.gmail.com>
To: tsvwg@ietf.org, Gorry Fairhurst <gorry@erg.abdn.ac.uk>, Colin Perkins <csp@csperkins.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/G99HJIH2uziTG4ejxwr9av520Tw>
Subject: [tsvwg] Review of draft-fairhurst-tsvwg-transport-encrypt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 May 2018 17:22:59 -0000
Hello Gorry & Colin, Thanks for your work on this draft. In my opinion, it is very important to dig through the implications of encrypting transport headers. The document is well written and easy to read, thanks for that as well. Al and I had a hard time with that since ours was contribution driven and controversial. Here's some feedback from my review that I hope you find helpful: General: If you added section references to mm-wg-encrypt where it is referenced, that may be helpful to the reader. Specific feedback: The apps side will object to this phrasing as they don't see the need for any 'help'. I agree with your point, just warning of the obstacle in case you can reword it to prevent objections. Choosing to encrypt all information may reduce the ability for networks to "help" (e.g., in response to tracing issues, making appropriate QoS decisions). Section 3 intro text Encrypted traffic can also be profiled to identify threat actors. This will continue to be important as threat actors may have advanced capabilities and may modify the encrypted streams in identifiable ways that can differentiate their traffic from others. I was expecting to see some text toward the end of 3 on adoption of these protocols. We can put out protocols, but it's up to industry to decide when and where to adopt protocols. From a few recent talks, what I saw from the audiences is that those aware of QUIC are outright blocking it. The business imperative is not there for the applications using QUIC to justify it's use within the business network, at least not yet. Section 3.3 Do you want to make this specific to IPsec tunnel mode since that hides the true end points as well? Transport mode isn't well deployed because of interoperability issues and not current use case driving it's usage, but that does leave the true IP source and destination addresses exposed, more than what you see with tunnel mode. Section 5.3 This is starting to touch on NetNeutrality and if you are going to go there, you should state it explicitly. At the enterprise level (it doesn't seem like you are covering that in this draft), I am hearing QUIC is outright blocked by those that are aware of it on the network, so it's not just NetNeutrality that will impact it's deployment. Perhaps rephrasing may help? Here's the text I'm talking about: A lack of data reduces the level of precision with which mechanisms are applied, and this needs to be considered when evaluating the impact of designs for transport encryption. This could lead to increased use of rate limiting, circuit breaker techniques [RFC8084], or even blocking of uncharacterised traffic. This would hinder deployment of new mechanisms and/or protocols. Section 5.4 I think you have a typo here: Integrity checks can undetected modification of protocol fields by network devices, -- Best regards, Kathleen
- [tsvwg] Review of draft-fairhurst-tsvwg-transport… Kathleen Moriarty
- Re: [tsvwg] Review of draft-fairhurst-tsvwg-trans… Gorry Fairhurst
- Re: [tsvwg] Review of draft-fairhurst-tsvwg-trans… Spencer Dawkins at IETF
- Re: [tsvwg] Review of draft-fairhurst-tsvwg-trans… Kathleen Moriarty