Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, -> logging

"Scharf, Michael" <Michael.Scharf@hs-esslingen.de> Sun, 13 October 2019 18:40 UTC

Return-Path: <Michael.Scharf@hs-esslingen.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 22CE71200FE for <tsvwg@ietfa.amsl.com>; Sun, 13 Oct 2019 11:40:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hs-esslingen.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PM3ZImUNqKog for <tsvwg@ietfa.amsl.com>; Sun, 13 Oct 2019 11:40:38 -0700 (PDT)
Received: from mail.hs-esslingen.de (mail.hs-esslingen.de [134.108.32.78]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 57A8B120071 for <tsvwg@ietf.org>; Sun, 13 Oct 2019 11:40:38 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.hs-esslingen.de (Postfix) with ESMTP id 73B7925A19; Sun, 13 Oct 2019 20:40:36 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hs-esslingen.de; s=mail; t=1570992036; bh=Kc1X3K2EoUb6QxwxBaaaZ/f8ujjD2f1bJn8hCxrSZIQ=; h=From:To:CC:Subject:Date:References:In-Reply-To:From; b=VNHgqsXJvdRCyykc08XjbuFUDHSY3uqr+1/aT/+4PPJBbBRDOI6S9P0U2bgi1yVpN zZa9FRpSYmh3Hs+gQTQ9Ni0+8PVNx5+htipliazaJAjV7ZWlK3fTf7OSPkyY90z/tf +4caCSMlCoZRQCd4JSdvDyh9MRRdt4FMZuaV1Hgk=
X-Virus-Scanned: by amavisd-new-2.7.1 (20120429) (Debian) at hs-esslingen.de
Received: from mail.hs-esslingen.de ([127.0.0.1]) by localhost (hs-esslingen.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vF5-2Fa3xfiR; Sun, 13 Oct 2019 20:40:34 +0200 (CEST)
Received: from rznt8102.rznt.rzdir.fht-esslingen.de (rznt8102.rznt.rzdir.fht-esslingen.de [134.108.29.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mail.hs-esslingen.de (Postfix) with ESMTPS; Sun, 13 Oct 2019 20:40:34 +0200 (CEST)
Received: from RZNT8114.rznt.rzdir.fht-esslingen.de ([169.254.3.61]) by rznt8102.rznt.rzdir.fht-esslingen.de ([fe80::f977:d5e6:6b09:56ac%10]) with mapi id 14.03.0468.000; Sun, 13 Oct 2019 20:40:34 +0200
From: "Scharf, Michael" <Michael.Scharf@hs-esslingen.de>
To: Joe Touch <touch@strayalpha.com>
CC: "gorry@erg.abdn.ac.uk" <gorry@erg.abdn.ac.uk>, Christian Huitema <huitema@huitema.net>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, -> logging
Thread-Index: AQHVgNGSDIfjAjkL+kK7oTbHLS/7PKdYFOwZgACGIQCAAE6zTw==
Date: Sun, 13 Oct 2019 18:40:33 +0000
Message-ID: <6EC6417807D9754DA64F3087E2E2E03E2D49CA05@rznt8114.rznt.rzdir.fht-esslingen.de>
References: <CE03DB3D7B45C245BCA0D2432779493630766752@MX307CL04.corp.emc.com> <e8c30f3f-606f-0c0d-a7dd-b2bb6f31a9fd@huitema.net> <5DA18567.9060400@erg.abdn.ac.uk> <6EC6417807D9754DA64F3087E2E2E03E2D499E66@rznt8114.rznt.rzdir.fht-esslingen.de>, <3C4DEE60-5642-469C-A2B1-FC7AFFC80674@strayalpha.com>
In-Reply-To: <3C4DEE60-5642-469C-A2B1-FC7AFFC80674@strayalpha.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: multipart/alternative; boundary="_000_6EC6417807D9754DA64F3087E2E2E03E2D49CA05rznt8114rzntrzd_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/G9Da_RceORHDMbooU1b9aRp63W0>
Subject: Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, -> logging
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Oct 2019 18:40:52 -0000

I guess almost every university with EE or CS study programs has a networking 101 course, and there are hundreds of textbooks. So, my own preferences may not matter. But since you ask:


  1.  There are well-known open source alternatives. Having said this, I think VPNs are often introduced in networking courses after the unencrypted network and the transport layer (and, e.g., after TLS). So the encryption may not be so much of an issue for understanding the overall concept.



  1.  I think in Europe that there are laws in this space, so it is not an ethical question only. The solution is to capture own traffic. Now, which existing undergraduate textbook introduces how to extract keys in the chapter on the Internet transport layer? As far as I can tell, this assumes that encryption, key management, and security is introduced in that course before the Internet Transport layer. Well, that is not impossible, but most existing textbooks I am aware of have a different table of content…

Anyway, others know that space better than me. But to me it is not clear how easy it will be to replace PCAPs in teaching the basics of the Internet.

Michael


Von: Joe Touch<mailto:touch@strayalpha.com>
Gesendet: Sonntag, 13. Oktober 2019 17:59
An: Scharf, Michael<mailto:Michael.Scharf@hs-esslingen.de>
Cc: gorry@erg.abdn.ac.uk<mailto:gorry@erg.abdn.ac.uk>; Christian Huitema<mailto:huitema@huitema.net>; tsvwg@ietf.org<mailto:tsvwg@ietf.org>
Betreff: Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, -> logging

FWIW, I’m wondering:

a) how these students study IPsec

b) what you’re teaching you’re students about ethics by snooping on other peoples data without asking
(if you ask, you can log the key and encryption wouldn’t matter)

Joe

On Oct 12, 2019, at 10:58 PM, Scharf, Michael <Michael.Scharf@hs-esslingen.de<mailto:Michael.Scharf@hs-esslingen.de>> wrote:

+ Students



I guess many generations of young engineers and future software developers have learnt TCP/IP by looking at the IP and TCP headers in PCAP files. Apparently, it has worked to some extend in the last 35 years or so… Of course, there are alternatives in teaching transport protocols to those who are not on IETF e-mail list (so far). But do we really know whether it will work well?



Anyway, Gorry and others on the list may understand that „use case“ much better than me ;-) So I’ll better shut up.



Michael







Von: Gorry Fairhurst<mailto:gorry@erg.abdn.ac.uk>
Gesendet: Samstag, 12. Oktober 2019 09:49
An: Christian Huitema<mailto:huitema@huitema.net>
Cc: tsvwg@ietf.org<mailto:tsvwg@ietf.org>
Betreff: Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, -> logging



I'm intrigued by how far we can understand opportunities for open client
logs to replace pcap dumps, and would like to delve a little deeper into
what we understand - there seem many possible actors and that may be
interesting to look at a few viewpoints:

* a user of a transport protocol (e.g., understanding cost/benefit of
feature choices);
* a protocol developer (e.g.,  debugging transport interactions end to end);
* a service provider (e.g., trying to understand performance impairments
in the network);
* researchers/equipment developers seeking to correlate/tune transport
timing with network policies (e.g., interactions between congestion
control and link scheduling);
* exploring traffic archives (e.g., trends in what is supported or
determine when an anomoly appeared).

I've taken all of these viewpoints at some time using pcap to look at TCP.

Clearly when we use QUIC, there can be alternatives and there is now
some experience with client (and server) logs, what do you think we can
usefully say in addition to or instead of what the draft says about
logging (currently mentioned only briefly in section 6.1) ?

The text on spin-bit could indeed be developed a little (the present
text predates the spin bit being incorporated as an optional part of the
base spec). What do you think should be said (currently at the end of 6.4)?

Gorry


On 09/10/2019, 15:32, Christian Huitema wrote:
>
> As the draft mentions:
>
>     The use of transport layer authentication and encryption exposes a
>     tussle between middlebox vendors, operators, applications developers
>     and users
>
> Much of the draft reads like a lamentation of the horrible
> consequences of encrypting transport headers, which looks very much
> like embracing the point of view of the middlebox vendors. Expressing
> that point of view is of course fine, and it might be enough to change
> the title, abstract and introduction to reflect that this is an
> opinion piece. But as a transport working group document I would like
> something a bit more balanced. It should spend more time acknowledging
> the ossification and privacy issues. It should ideally lay the ground
> work for alternative management solutions, such as controlled exposure
> like the spin bit in QUIC, IP header information, or standardized logs
> like the QLOG effort.
>
> -- Christian Huitema
>
>
> On 10/8/2019 2:08 PM, Black, David wrote:
>>
>> FYI – some OPS area and SEC area eyes on this TSVWG draft now (during
>> WGLC) would be a good thing ;-).
>>
>> Thanks, --David (TSVWG co-chair)
>>
>> *From:* Black, David <david.black@emc.com<mailto:david.black@emc.com>>
>> *Sent:* Tuesday, October 8, 2019 5:06 PM
>> *To:* tsvwg@ietf.org<mailto:tsvwg@ietf.org>
>> *Cc:* Black, David
>> *Subject:* WGLC: draft-ietf-tsvwg-transport-encrypt-08, closes 23
>> October 2019
>>
>> This email announces a TSVWG Working Group Last Call (WGLC) on:
>>
>> The Impact of Transport Header Confidentiality on Network Operation and
>>
>>                        Evolution of the Internet
>>
>>                  draft-ietf-tsvwg-transport-encrypt-08
>>
>> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-transport-encrypt/
>>
>> This draft is intended to become an Informational RFC.
>>
>> This WGLC will run through the end of the day on Wednesday, October 23.
>>
>> That should allow time before the Singapore draft submission cutoff for
>>
>> the authors to revise the draft with any changes that result from WGLC.
>>
>> Comments should be sent to the tsvwg@ietf.org<mailto:tsvwg@ietf.org> <mailto:tsvwg@ietf.org>
>> list, although purely
>>
>> editorial comments may be sent directly to the authors. Please cc: the
>>
>> WG chairs at tsvwg-chairs@ietf.org<mailto:tsvwg-chairs@ietf.org> <mailto:tsvwg-chairs@ietf.org>  if
>> you would like the chairs to
>>
>> track such editorial comments as part of the WGLC process.
>>
>> No IPR disclosures have been submitted directly on this draft.
>>
>> Thanks,
>>
>> David, Gorry and Wes
>>
>> (TSVWG Co-Chairs)
>>
>>
>> _______________________________________________
>> saag mailing list
>> saag@ietf.org<mailto:saag@ietf.org>
>> https://www..ietf.org/mailman/listinfo/saag<https://www.ietf.org/mailman/listinfo/saag>