Re: [tsvwg] Comment on draft-ietf-tsvwg-transport-encrypt

Tom Herbert <tom@herbertland.com> Sat, 29 February 2020 02:29 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE70B3A09A0 for <tsvwg@ietfa.amsl.com>; Fri, 28 Feb 2020 18:29:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BPOJKD0xWg04 for <tsvwg@ietfa.amsl.com>; Fri, 28 Feb 2020 18:29:33 -0800 (PST)
Received: from mail-ed1-x535.google.com (mail-ed1-x535.google.com [IPv6:2a00:1450:4864:20::535]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E3A43A099C for <tsvwg@ietf.org>; Fri, 28 Feb 2020 18:29:33 -0800 (PST)
Received: by mail-ed1-x535.google.com with SMTP id g19so5654669eds.11 for <tsvwg@ietf.org>; Fri, 28 Feb 2020 18:29:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Rzuzmgn/0JNR9Dt4Jcjl4tsypxPNds7ed/XMsejMIt4=; b=LQAWApzIJ0o8l0vUcw5yJs5cCGXMW9Iqnbn36q9eI1ZCKHrdZnNFwWgEI9FKHh85Qe JvNELo+X+RpLQeY0agw6FblWSsXkC0l0pZbQ26lv8KA43yWhajUL5HR4sMF0tTV3sqqT 4gxUhTOE36ki5eziXRbwtdRISguAXP03ksNow+eOlBJ4EkVmXlen7mJKUEguwSsLWzxh pv/clyEHNAdb+529CroXtrVNB/zUggTk+MU77ff+lpNiHSZcHr+lHjfX8U06Mhkh5Hum Lt7n/N2WMeD1e7kI4dReNXcSgDvEeCUy20nOD24mPj8P5IYTfgj05GUiSEOuswuo9Y0s fbbA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Rzuzmgn/0JNR9Dt4Jcjl4tsypxPNds7ed/XMsejMIt4=; b=FKDM/a3NH8ijbirSltQefx2DfvnD2D+IJmIJCY7OQQhQEJv0ronsnq2i/Jt6crFQ8Y hDnyw+wvNzRHaluNigmqsN2CVrc/W0DkSoYnS7LA9AoOerKWlolAeK1iNGBFE4XZ1IPr SAGotaOfOltY5ITNhUsCLbX+8eoLfnSbuxEoX9N4GTYEdUaunHTfC11Ln2P2A+onANtV HgtcbgnytHlZW1mAvwavePp8rp4ketNENZhs+RQNria8/JQa38eRj4acyFeNiVTEkIeb AXxqQgtxc8vvaQ9r6tHDTx8ZScFmvn9e3cq2dF3bdO9ZMPweUeL0c/VF+Yjwh+5lw24v 0G7g==
X-Gm-Message-State: APjAAAWwcrMgzIO7is9Nzxx5ilI/VbsqN4qWYUq4/TUpbrgajgh9j1eA KKODHUESL88xpOMtXiK72m82Yu8XdWBEKe8WUwT8tw==
X-Google-Smtp-Source: APXvYqzGKOsfc6k8KGG0K3379uPP27u532gWQksTMV9PxSMynlu1rT3R4943W4886rXJp4w2xFcQFYqPef7zpeBzbYo=
X-Received: by 2002:aa7:d505:: with SMTP id y5mr7174569edq.370.1582943371891; Fri, 28 Feb 2020 18:29:31 -0800 (PST)
MIME-Version: 1.0
References: <CALx6S37iBDc7KxOL60=HC_QkWH06-5MU2rqrK=w+mqiKkSdc0w@mail.gmail.com> <5C993764-1D9A-4B04-A217-2B444008EBE2@strayalpha.com> <CALx6S37KLMLGKnhPs4tfuR7zSA63SUqcL9tA+uo8RBFf+MX82Q@mail.gmail.com> <94B9E18E-6E8E-43F7-83D4-6FAC40579ED8@strayalpha.com>
In-Reply-To: <94B9E18E-6E8E-43F7-83D4-6FAC40579ED8@strayalpha.com>
From: Tom Herbert <tom@herbertland.com>
Date: Fri, 28 Feb 2020 18:29:20 -0800
Message-ID: <CALx6S35kYjmv9PZx6rFc8O3dirE9e-=JLS9NB=fKxc-9yN4XOw@mail.gmail.com>
To: Joseph Touch <touch@strayalpha.com>
Cc: tsvwg <tsvwg@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000061c013059fadb9c9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/OsGls0oiPq9AfJPFXiI5sSN9sys>
Subject: Re: [tsvwg] Comment on draft-ietf-tsvwg-transport-encrypt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Feb 2020 02:29:35 -0000

On Fri, Feb 28, 2020, 6:23 PM Joseph Touch <touch@strayalpha.com> wrote:

>
>
> On Feb 28, 2020, at 6:17 PM, Tom Herbert <tom@herbertland.com> wrote:
>
>
>
> On Fri, Feb 28, 2020, 6:03 PM Joseph Touch <touch@strayalpha.com> wrote:
>
>> On Feb 28, 2020, at 12:30 PM, Tom Herbert <tom@herbertland.com> wrote:
>> >
>> > While the draft certainly has improved both in tone and content, I
>> > still feel like there is one area that is very under-represented.
>> > Namely the possibility of using extension headers to carry necessary
>> > transport information that the network needs. I have brought this up
>> > several times, and don't believe it has been adequately addressed.
>>
>> Tom,
>>
>> I thought the draft explains (IMO correctly) that the transport layer can
>> make info available to the network layer, but that’s how it works. We
>> shouldn’t expect that the transport header itself is available (for
>> security and privacy reasons).
>>
>
> Joe,
>
> If I understand the draft correctly, it is describing a number of use
> cases where intermediate nodes are extracting information directly from
> transport headers. When transport layer header is encrypted that ability is
> lost and the network can't use transport layer information to the benefit
> of the user. The idea of putting the necessary information elsewhere in the
> packet in cleartext is what HBH could provide.
>
>
> Certainly - but the HBH header would be at the network layer, not
> transport, right? (I got the impression you were hinting at a cleartext
> part of the transport header for this purpose)
>

Right, that's a proposal for sender to explicitly put transport related
information in network layer for consumption by the network. I think the
draft advocates that transport designers consider selectively not
encrypting fields in transport header for benefit of network.

Tom

>
> Joe
>
>