Re: [tsvwg] RFC 9065 on Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols
"Black, David" <David.Black@dell.com> Thu, 15 July 2021 20:12 UTC
Return-Path: <David.Black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 619153A12F0 for <tsvwg@ietfa.amsl.com>; Thu, 15 Jul 2021 13:12:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.552
X-Spam-Level:
X-Spam-Status: No, score=-2.552 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6nTDK0afA4yq for <tsvwg@ietfa.amsl.com>; Thu, 15 Jul 2021 13:12:45 -0700 (PDT)
Received: from mx0a-00154904.pphosted.com (mx0a-00154904.pphosted.com [148.163.133.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 152583A0EB4 for <tsvwg@ietf.org>; Thu, 15 Jul 2021 13:12:44 -0700 (PDT)
Received: from pps.filterd (m0170389.ppops.net [127.0.0.1]) by mx0a-00154904.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 16FK2vA5023770 for <tsvwg@ietf.org>; Thu, 15 Jul 2021 16:12:41 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=wf6t6sXRv6IN8rTMLeenjtAhspJ/soW+Mw0hqgiTxM0=; b=LtL5pmm43ifz8+nzkFiVWki8pDcKCysG2ylJfEjxBLyfGeriQ77/qzpa6nDB50kLLx6n 9USgvJHp9D4Z2N1TmTVlpkxSWLDRoFrEBKcvG3fmEmx0VYJehYH4m27qSL9R5vKBvyiY z3pH1e2fqmDEP0HwaW6yNdPYU68nQYwIiP7H5KbSlS9AjRc1oxL3WgA93JDpemES68uw EdGRNjOm7ucweqIpJYeM5mAiM0hOor3vrnxBhN2HTZhaM4/zIuQF19XhnPTaSC2ZqfeW jO7picG+VbxZUwhTM7z7sop13ZzZfoe986x6f2KFgmIyLEFiFRg0GByj45WY1X7MPUS9 bA==
Received: from mx0b-00154901.pphosted.com (mx0b-00154901.pphosted.com [67.231.157.37]) by mx0a-00154904.pphosted.com with ESMTP id 39t119p1vu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <tsvwg@ietf.org>; Thu, 15 Jul 2021 16:12:41 -0400
Received: from pps.filterd (m0089483.ppops.net [127.0.0.1]) by mx0b-00154901.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 16FK0ZX4173848 for <tsvwg@ietf.org>; Thu, 15 Jul 2021 16:12:40 -0400
Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12lp2045.outbound.protection.outlook.com [104.47.66.45]) by mx0b-00154901.pphosted.com with ESMTP id 39tk8h99qh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <tsvwg@ietf.org>; Thu, 15 Jul 2021 16:12:40 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=m2eAS383LFTjjxZgSNX9+qyGidSQfo6mVSlBiXUPXwnXYbWdouV3ptD4buNSD6qmeP9e4V4jtEVoSTSUnVl2BfzrLj8WWEvt0MLMAa8AONKjLI802jD0tIkuJOtkvqX2JMBahzySET8qBS0dk5IxLXl/42T/6XcPOWe8KQ0T/dCbYlgzYzF1wD9Txdzn+JdPOFxzjdCLcK4JJhyrq5h++FYITS7w15Tig8bbC9Yrzez8015lovZcEaJFKZGDxlrm6cjhIijrTimsJU0ghL0gx+q+kHbKvaAmHy0vuhqXLES2HjmCDYHtYFj2PpbPGA+dASwshu0Y1pgvaitATg+WOg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wf6t6sXRv6IN8rTMLeenjtAhspJ/soW+Mw0hqgiTxM0=; b=BSzq518SIZtEPETtXWRGv/g21/aeXu3yWXiMQ1Hsdb/5SHXCFgV8+GaQgs7MvjQvn/t2WHF5++ve0GqQC5IG//e8k0t7j/KZ6EffBUJIGHaH58qpRSedFO08KoKG0kq5V3/hDfO3vOe8wHqe+CwC/doORNpR+017J5U79GL7UWdTw63n4oVZEq/XNmMM0+XslR273mIwPFk4tYkCfYZ2Wkzi9Bte8FxIAbwCs9tTo4TGTBGMxeFJ4U1cmRro+bwFnToD9BIO0q4nNVAEQMgqbIcFj2EraYAerPY31A/Xh+P7fJF8j/HZRgQs/dYi66846y4hgsY06e0NGSpCz6cxnA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by MN2PR19MB3325.namprd19.prod.outlook.com (2603:10b6:208:13f::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.23; Thu, 15 Jul 2021 20:12:38 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::95f9:b5b3:56ae:4362]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::95f9:b5b3:56ae:4362%7]) with mapi id 15.20.4331.023; Thu, 15 Jul 2021 20:12:38 +0000
From: "Black, David" <David.Black@dell.com>
To: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: RFC 9065 on Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols
Thread-Index: AQHXeUTwpAsE5c9ILk2xYgUUvPCYVatEdzAw
Date: Thu, 15 Jul 2021 20:12:38 +0000
Message-ID: <MN2PR19MB4045BC62EF5FC859EF18A3EB83129@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <20210715064356.BF655F40709@rfc-editor.org>
In-Reply-To: <20210715064356.BF655F40709@rfc-editor.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Enabled=True; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Owner=david.black@emc.com; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SetDate=2021-07-15T20:06:24.1764651Z; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Name=External Public; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Application=Microsoft Azure Information Protection; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_ActionId=c0c26fd8-f6fd-45e1-8f43-dbfa87e803ef; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Extended_MSFT_Method=Manual
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=dell.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0c7c9886-dc8c-4ec1-da48-08d947cce4c3
x-ms-traffictypediagnostic: MN2PR19MB3325:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MN2PR19MB33250BE5B3BD303790C9D87F83129@MN2PR19MB3325.namprd19.prod.outlook.com>
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(66476007)(66946007)(66556008)(786003)(8676002)(8936002)(76116006)(55016002)(316002)(71200400001)(52536014)(122000001)(6916009)(38100700002)(5660300002)(64756008)(66446008)(9686003)(2906002)(86362001)(33656002)(478600001)(107886003)(4326008)(83380400001)(966005)(53546011)(6506007)(66574015)(186003)(7696005)(26005)(38070700004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0c7c9886-dc8c-4ec1-da48-08d947cce4c3
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jul 2021 20:12:38.4834 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 6VsLf5Hf4emupnVHMiMwhaW0efAi+72pboTjVLZeguBTY5QevcQxYUWITtQs30HvgLhWDYmahcm6cqV/LZlv2Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR19MB3325
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-07-15_15:2021-07-14, 2021-07-15 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 priorityscore=1501 phishscore=0 malwarescore=0 lowpriorityscore=0 clxscore=1015 suspectscore=0 adultscore=0 mlxlogscore=999 mlxscore=0 spamscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104190000 definitions=main-2107150134
X-Proofpoint-GUID: uDkNjih86HdDSO9h1ygh63QPWG9W0Iw6
X-Proofpoint-ORIG-GUID: uDkNjih86HdDSO9h1ygh63QPWG9W0Iw6
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 mlxscore=0 suspectscore=0 spamscore=0 bulkscore=0 mlxlogscore=999 malwarescore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104190000 definitions=main-2107150134
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/RJmfK9woeDJq-Y6LO--aUtG7NRg>
Subject: Re: [tsvwg] RFC 9065 on Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Jul 2021 20:12:51 -0000
Congratulations to Gorry and Colin (authors) on publication of this RFC, and many thanks to all who have contributed. Thanks, --David (document shepherd) David L. Black, Sr. Distinguished Engineer, Technology & Standards Infrastructure Solutions Group, Dell Technologies mobile +1 978-394-7754 David.Black@dell.com -----Original Message----- From: IETF-Announce <ietf-announce-bounces@ietf.org> On Behalf Of rfc-editor@rfc-editor.org Sent: Thursday, July 15, 2021 2:44 AM To: ietf-announce@ietf.org; rfc-dist@rfc-editor.org Cc: drafts-update-ref@iana.org; tsvwg@ietf.org; rfc-editor@rfc-editor.org Subject: RFC 9065 on Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols [EXTERNAL EMAIL] A new Request for Comments is now available in online RFC libraries. RFC 9065 Title: Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols Author: G. Fairhurst, C. Perkins Status: Informational Stream: IETF Date: July 2021 Mailbox: gorry@erg.abdn.ac.uk, csp@csperkins.org Pages: 37 Updates/Obsoletes/SeeAlso: None I-D Tag: draft-ietf-tsvwg-transport-encrypt-21.txt URL: https://urldefense.com/v3/__https://www.rfc-editor.org/info/rfc9065__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7p9ezBCb$ [rfc-editor[.]org] DOI: 10.17487/RFC9065 To protect user data and privacy, Internet transport protocols have supported payload encryption and authentication for some time. Such encryption and authentication are now also starting to be applied to the transport protocol headers. This helps avoid transport protocol ossification by middleboxes, mitigate attacks against the transport protocol, and protect metadata about the communication. Current operational practice in some networks inspect transport header information within the network, but this is no longer possible when those transport headers are encrypted. This document discusses the possible impact when network traffic uses a protocol with an encrypted transport header. It suggests issues to consider when designing new transport protocols or features. This document is a product of the Transport Area Working Group Working Group of the IETF. INFORMATIONAL: This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. This announcement is sent to the IETF-Announce and rfc-dist lists. To subscribe or unsubscribe, see https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ietf-announce__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7h725XPb$ [ietf[.]org] https://urldefense.com/v3/__https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7uTvOMSc$ [mailman[.]rfc-editor[.]org] For searching the RFC series, see https://urldefense.com/v3/__https://www.rfc-editor.org/search__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7hsHsezy$ [rfc-editor[.]org] For downloading RFCs, see https://urldefense.com/v3/__https://www.rfc-editor.org/retrieve/bulk__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7ieNbsoW$ [rfc-editor[.]org] Requests for special distribution should be addressed to either the author of the RFC in question, or to rfc-editor@rfc-editor.org. Unless specifically noted otherwise on the RFC itself, all RFCs are for unlimited distribution. The RFC Editor Team Association Management Solutions, LLC _______________________________________________ IETF-Announce mailing list IETF-Announce@ietf.org https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ietf-announce__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7h725XPb$ [ietf[.]org]
- [tsvwg] RFC 9065 on Considerations around Transpo… rfc-editor
- Re: [tsvwg] RFC 9065 on Considerations around Tra… Black, David
- Re: [tsvwg] RFC 9065 on Considerations around Tra… Colin Perkins