Re: [tsvwg] RFC 9065 on Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols

"Black, David" <David.Black@dell.com> Thu, 15 July 2021 20:12 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 619153A12F0 for <tsvwg@ietfa.amsl.com>; Thu, 15 Jul 2021 13:12:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.552
X-Spam-Level:
X-Spam-Status: No, score=-2.552 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6nTDK0afA4yq for <tsvwg@ietfa.amsl.com>; Thu, 15 Jul 2021 13:12:45 -0700 (PDT)
Received: from mx0a-00154904.pphosted.com (mx0a-00154904.pphosted.com [148.163.133.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 152583A0EB4 for <tsvwg@ietf.org>; Thu, 15 Jul 2021 13:12:44 -0700 (PDT)
Received: from pps.filterd (m0170389.ppops.net [127.0.0.1]) by mx0a-00154904.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 16FK2vA5023770 for <tsvwg@ietf.org>; Thu, 15 Jul 2021 16:12:41 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=wf6t6sXRv6IN8rTMLeenjtAhspJ/soW+Mw0hqgiTxM0=; b=LtL5pmm43ifz8+nzkFiVWki8pDcKCysG2ylJfEjxBLyfGeriQ77/qzpa6nDB50kLLx6n 9USgvJHp9D4Z2N1TmTVlpkxSWLDRoFrEBKcvG3fmEmx0VYJehYH4m27qSL9R5vKBvyiY z3pH1e2fqmDEP0HwaW6yNdPYU68nQYwIiP7H5KbSlS9AjRc1oxL3WgA93JDpemES68uw EdGRNjOm7ucweqIpJYeM5mAiM0hOor3vrnxBhN2HTZhaM4/zIuQF19XhnPTaSC2ZqfeW jO7picG+VbxZUwhTM7z7sop13ZzZfoe986x6f2KFgmIyLEFiFRg0GByj45WY1X7MPUS9 bA==
Received: from mx0b-00154901.pphosted.com (mx0b-00154901.pphosted.com [67.231.157.37]) by mx0a-00154904.pphosted.com with ESMTP id 39t119p1vu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <tsvwg@ietf.org>; Thu, 15 Jul 2021 16:12:41 -0400
Received: from pps.filterd (m0089483.ppops.net [127.0.0.1]) by mx0b-00154901.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 16FK0ZX4173848 for <tsvwg@ietf.org>; Thu, 15 Jul 2021 16:12:40 -0400
Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12lp2045.outbound.protection.outlook.com [104.47.66.45]) by mx0b-00154901.pphosted.com with ESMTP id 39tk8h99qh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <tsvwg@ietf.org>; Thu, 15 Jul 2021 16:12:40 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=m2eAS383LFTjjxZgSNX9+qyGidSQfo6mVSlBiXUPXwnXYbWdouV3ptD4buNSD6qmeP9e4V4jtEVoSTSUnVl2BfzrLj8WWEvt0MLMAa8AONKjLI802jD0tIkuJOtkvqX2JMBahzySET8qBS0dk5IxLXl/42T/6XcPOWe8KQ0T/dCbYlgzYzF1wD9Txdzn+JdPOFxzjdCLcK4JJhyrq5h++FYITS7w15Tig8bbC9Yrzez8015lovZcEaJFKZGDxlrm6cjhIijrTimsJU0ghL0gx+q+kHbKvaAmHy0vuhqXLES2HjmCDYHtYFj2PpbPGA+dASwshu0Y1pgvaitATg+WOg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wf6t6sXRv6IN8rTMLeenjtAhspJ/soW+Mw0hqgiTxM0=; b=BSzq518SIZtEPETtXWRGv/g21/aeXu3yWXiMQ1Hsdb/5SHXCFgV8+GaQgs7MvjQvn/t2WHF5++ve0GqQC5IG//e8k0t7j/KZ6EffBUJIGHaH58qpRSedFO08KoKG0kq5V3/hDfO3vOe8wHqe+CwC/doORNpR+017J5U79GL7UWdTw63n4oVZEq/XNmMM0+XslR273mIwPFk4tYkCfYZ2Wkzi9Bte8FxIAbwCs9tTo4TGTBGMxeFJ4U1cmRro+bwFnToD9BIO0q4nNVAEQMgqbIcFj2EraYAerPY31A/Xh+P7fJF8j/HZRgQs/dYi66846y4hgsY06e0NGSpCz6cxnA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by MN2PR19MB3325.namprd19.prod.outlook.com (2603:10b6:208:13f::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.23; Thu, 15 Jul 2021 20:12:38 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::95f9:b5b3:56ae:4362]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::95f9:b5b3:56ae:4362%7]) with mapi id 15.20.4331.023; Thu, 15 Jul 2021 20:12:38 +0000
From: "Black, David" <David.Black@dell.com>
To: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: RFC 9065 on Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols
Thread-Index: AQHXeUTwpAsE5c9ILk2xYgUUvPCYVatEdzAw
Date: Thu, 15 Jul 2021 20:12:38 +0000
Message-ID: <MN2PR19MB4045BC62EF5FC859EF18A3EB83129@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <20210715064356.BF655F40709@rfc-editor.org>
In-Reply-To: <20210715064356.BF655F40709@rfc-editor.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Enabled=True; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Owner=david.black@emc.com; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SetDate=2021-07-15T20:06:24.1764651Z; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Name=External Public; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Application=Microsoft Azure Information Protection; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_ActionId=c0c26fd8-f6fd-45e1-8f43-dbfa87e803ef; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Extended_MSFT_Method=Manual
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=dell.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0c7c9886-dc8c-4ec1-da48-08d947cce4c3
x-ms-traffictypediagnostic: MN2PR19MB3325:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MN2PR19MB33250BE5B3BD303790C9D87F83129@MN2PR19MB3325.namprd19.prod.outlook.com>
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(66476007)(66946007)(66556008)(786003)(8676002)(8936002)(76116006)(55016002)(316002)(71200400001)(52536014)(122000001)(6916009)(38100700002)(5660300002)(64756008)(66446008)(9686003)(2906002)(86362001)(33656002)(478600001)(107886003)(4326008)(83380400001)(966005)(53546011)(6506007)(66574015)(186003)(7696005)(26005)(38070700004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0c7c9886-dc8c-4ec1-da48-08d947cce4c3
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jul 2021 20:12:38.4834 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 6VsLf5Hf4emupnVHMiMwhaW0efAi+72pboTjVLZeguBTY5QevcQxYUWITtQs30HvgLhWDYmahcm6cqV/LZlv2Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR19MB3325
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-07-15_15:2021-07-14, 2021-07-15 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 priorityscore=1501 phishscore=0 malwarescore=0 lowpriorityscore=0 clxscore=1015 suspectscore=0 adultscore=0 mlxlogscore=999 mlxscore=0 spamscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104190000 definitions=main-2107150134
X-Proofpoint-GUID: uDkNjih86HdDSO9h1ygh63QPWG9W0Iw6
X-Proofpoint-ORIG-GUID: uDkNjih86HdDSO9h1ygh63QPWG9W0Iw6
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 mlxscore=0 suspectscore=0 spamscore=0 bulkscore=0 mlxlogscore=999 malwarescore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104190000 definitions=main-2107150134
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/RJmfK9woeDJq-Y6LO--aUtG7NRg>
Subject: Re: [tsvwg] RFC 9065 on Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Jul 2021 20:12:51 -0000

Congratulations to Gorry and Colin (authors) on publication of this RFC, and many thanks to all who have contributed.  

Thanks, --David (document shepherd)

David L. Black, Sr. Distinguished Engineer, Technology & Standards
Infrastructure Solutions Group, Dell Technologies
mobile +1 978-394-7754 David.Black@dell.com

-----Original Message-----
From: IETF-Announce <ietf-announce-bounces@ietf.org> On Behalf Of rfc-editor@rfc-editor.org
Sent: Thursday, July 15, 2021 2:44 AM
To: ietf-announce@ietf.org; rfc-dist@rfc-editor.org
Cc: drafts-update-ref@iana.org; tsvwg@ietf.org; rfc-editor@rfc-editor.org
Subject: RFC 9065 on Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols


[EXTERNAL EMAIL] 

A new Request for Comments is now available in online RFC libraries.

        
        RFC 9065

        Title:      Considerations around Transport Header Confidentiality, 
                    Network Operations, and the Evolution of 
                    Internet Transport Protocols 
        Author:     G. Fairhurst,
                    C. Perkins
        Status:     Informational
        Stream:     IETF
        Date:       July 2021
        Mailbox:    gorry@erg.abdn.ac.uk,
                    csp@csperkins.org
        Pages:      37
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-ietf-tsvwg-transport-encrypt-21.txt

        URL:        https://urldefense.com/v3/__https://www.rfc-editor.org/info/rfc9065__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7p9ezBCb$ [rfc-editor[.]org]

        DOI:        10.17487/RFC9065

To protect user data and privacy, Internet transport protocols have
supported payload encryption and authentication for some time. Such
encryption and authentication are now also starting to be applied to
the transport protocol headers. This helps avoid transport protocol
ossification by middleboxes, mitigate attacks against the transport
protocol, and protect metadata about the communication. Current
operational practice in some networks inspect transport header
information within the network, but this is no longer possible when
those transport headers are encrypted.

This document discusses the possible impact when network traffic uses
a protocol with an encrypted transport header. It suggests issues to
consider when designing new transport protocols or features.

This document is a product of the Transport Area Working Group Working Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ietf-announce__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7h725XPb$ [ietf[.]org]
  https://urldefense.com/v3/__https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7uTvOMSc$ [mailman[.]rfc-editor[.]org]

For searching the RFC series, see https://urldefense.com/v3/__https://www.rfc-editor.org/search__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7hsHsezy$ [rfc-editor[.]org]
For downloading RFCs, see https://urldefense.com/v3/__https://www.rfc-editor.org/retrieve/bulk__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7ieNbsoW$ [rfc-editor[.]org]

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ietf-announce__;!!LpKI!3M0NO0ODV-nt3C_DC5DEbl-yI4A8OwdN7J0j217lSSwjSNEywrkzCV8F7h725XPb$ [ietf[.]org]