Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, -> logging

Joe Touch <touch@strayalpha.com> Sun, 13 October 2019 15:59 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A9F4D120074 for <tsvwg@ietfa.amsl.com>; Sun, 13 Oct 2019 08:59:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.219
X-Spam-Level:
X-Spam-Status: No, score=-1.219 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sdtrNeFEJaGR for <tsvwg@ietfa.amsl.com>; Sun, 13 Oct 2019 08:59:01 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F2BC12000F for <tsvwg@ietf.org>; Sun, 13 Oct 2019 08:59:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=pvuR1DBsYawN2qltz9h+ej+4JYCg/93Nr/ZLzpxMUWU=; b=2rNq7lVBi3F7oK2zJ7kzKXXdU NKdwdu1W9eWS27lEXtVuDvBcFMHPrT9ZDc01sK7XtzIAHv+u/1m9RUA+J87MSWE8OI2IPH7sWR5Ad +FJsYxG3Sn0picuns/NaYpWBT6cYeKlM7U7vHsjIfEpXM3Hamgng+sQCvVaHl7Qbt4GBTlLKPEaOO C0WuZALtUzZDC4PnNnJ2P0Rt0KI4JA2ZQyY6lWiti0H5+2S3MNjEeoCy8M9ca78uBOEI+5EqJCc9m IgEVoxuu9L6CfeExXwO+vRTQXzlY+yQG4GE+PiQkl2oMfL9qwKOpH6QGcY0RtsO9vy0+NNlpYvpT6 4CJYj0xPw==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:55799 helo=[192.168.1.10]) by server217.web-hosting.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1iJgGj-003YRr-Hc; Sun, 13 Oct 2019 11:58:58 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_1D138E1A-E4BB-4AF2-8319-C9CBA99B9B32"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Joe Touch <touch@strayalpha.com>
In-Reply-To: <6EC6417807D9754DA64F3087E2E2E03E2D499E66@rznt8114.rznt.rzdir.fht-esslingen.de>
Date: Sun, 13 Oct 2019 08:58:52 -0700
Cc: "gorry@erg.abdn.ac.uk" <gorry@erg.abdn.ac.uk>, Christian Huitema <huitema@huitema.net>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Message-Id: <3C4DEE60-5642-469C-A2B1-FC7AFFC80674@strayalpha.com>
References: <CE03DB3D7B45C245BCA0D2432779493630766752@MX307CL04.corp.emc.com> <e8c30f3f-606f-0c0d-a7dd-b2bb6f31a9fd@huitema.net> <5DA18567.9060400@erg.abdn.ac.uk> <6EC6417807D9754DA64F3087E2E2E03E2D499E66@rznt8114.rznt.rzdir.fht-esslingen.de>
To: "Scharf, Michael" <Michael.Scharf@hs-esslingen.de>
X-Mailer: Apple Mail (2.3445.9.1)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/VLfhYs9W0EWl68PuTwL8YM2lDqE>
Subject: Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, -> logging
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Oct 2019 15:59:04 -0000

FWIW, I’m wondering:

a) how these students study IPsec

b) what you’re teaching you’re students about ethics by snooping on other peoples data without asking
	(if you ask, you can log the key and encryption wouldn’t matter)

Joe

> On Oct 12, 2019, at 10:58 PM, Scharf, Michael <Michael.Scharf@hs-esslingen.de> wrote:
> 
> + Students
>  
> I guess many generations of young engineers and future software developers have learnt TCP/IP by looking at the IP and TCP headers in PCAP files. Apparently, it has worked to some extend in the last 35 years or so… Of course, there are alternatives in teaching transport protocols to those who are not on IETF e-mail list (so far). But do we really know whether it will work well?
>  
> Anyway, Gorry and others on the list may understand that „use case“ much better than me ;-) So I’ll better shut up.
>  
> Michael
>  
>  
>  
> Von: Gorry Fairhurst <mailto:gorry@erg.abdn.ac.uk>
> Gesendet: Samstag, 12. Oktober 2019 09:49
> An: Christian Huitema <mailto:huitema@huitema.net>
> Cc: tsvwg@ietf.org <mailto:tsvwg@ietf.org>
> Betreff: Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, -> logging
>  
> I'm intrigued by how far we can understand opportunities for open client 
> logs to replace pcap dumps, and would like to delve a little deeper into 
> what we understand - there seem many possible actors and that may be 
> interesting to look at a few viewpoints:
> 
> * a user of a transport protocol (e.g., understanding cost/benefit of 
> feature choices);
> * a protocol developer (e.g.,  debugging transport interactions end to end);
> * a service provider (e.g., trying to understand performance impairments 
> in the network);
> * researchers/equipment developers seeking to correlate/tune transport 
> timing with network policies (e.g., interactions between congestion 
> control and link scheduling);
> * exploring traffic archives (e.g., trends in what is supported or 
> determine when an anomoly appeared).
> 
> I've taken all of these viewpoints at some time using pcap to look at TCP.
> 
> Clearly when we use QUIC, there can be alternatives and there is now 
> some experience with client (and server) logs, what do you think we can 
> usefully say in addition to or instead of what the draft says about 
> logging (currently mentioned only briefly in section 6.1) ?
> 
> The text on spin-bit could indeed be developed a little (the present 
> text predates the spin bit being incorporated as an optional part of the 
> base spec). What do you think should be said (currently at the end of 6.4)?
> 
> Gorry
> 
> 
> On 09/10/2019, 15:32, Christian Huitema wrote:
> >
> > As the draft mentions:
> >
> >     The use of transport layer authentication and encryption exposes a
> >     tussle between middlebox vendors, operators, applications developers
> >     and users
> >
> > Much of the draft reads like a lamentation of the horrible 
> > consequences of encrypting transport headers, which looks very much 
> > like embracing the point of view of the middlebox vendors. Expressing 
> > that point of view is of course fine, and it might be enough to change 
> > the title, abstract and introduction to reflect that this is an 
> > opinion piece. But as a transport working group document I would like 
> > something a bit more balanced. It should spend more time acknowledging 
> > the ossification and privacy issues. It should ideally lay the ground 
> > work for alternative management solutions, such as controlled exposure 
> > like the spin bit in QUIC, IP header information, or standardized logs 
> > like the QLOG effort.
> >
> > -- Christian Huitema
> >
> >
> > On 10/8/2019 2:08 PM, Black, David wrote:
> >>
> >> FYI – some OPS area and SEC area eyes on this TSVWG draft now (during 
> >> WGLC) would be a good thing ;-).
> >>
> >> Thanks, --David (TSVWG co-chair)
> >>
> >> *From:* Black, David <david.black@emc.com <mailto:david.black@emc.com>>
> >> *Sent:* Tuesday, October 8, 2019 5:06 PM
> >> *To:* tsvwg@ietf.org <mailto:tsvwg@ietf.org>
> >> *Cc:* Black, David
> >> *Subject:* WGLC: draft-ietf-tsvwg-transport-encrypt-08, closes 23 
> >> October 2019
> >>
> >> This email announces a TSVWG Working Group Last Call (WGLC) on:
> >>
> >> The Impact of Transport Header Confidentiality on Network Operation and
> >>
> >>                        Evolution of the Internet
> >>
> >>                  draft-ietf-tsvwg-transport-encrypt-08
> >>
> >> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-transport-encrypt/ <https://datatracker.ietf.org/doc/draft-ietf-tsvwg-transport-encrypt/>
> >>
> >> This draft is intended to become an Informational RFC.
> >>
> >> This WGLC will run through the end of the day on Wednesday, October 23.
> >>
> >> That should allow time before the Singapore draft submission cutoff for
> >>
> >> the authors to revise the draft with any changes that result from WGLC.
> >>
> >> Comments should be sent to the tsvwg@ietf.org <mailto:tsvwg@ietf.org> <mailto:tsvwg@ietf.org <mailto:tsvwg@ietf.org>> 
> >> list, although purely
> >>
> >> editorial comments may be sent directly to the authors. Please cc: the
> >>
> >> WG chairs at tsvwg-chairs@ietf.org <mailto:tsvwg-chairs@ietf.org> <mailto:tsvwg-chairs@ietf.org <mailto:tsvwg-chairs@ietf.org>>  if 
> >> you would like the chairs to
> >>
> >> track such editorial comments as part of the WGLC process.
> >>
> >> No IPR disclosures have been submitted directly on this draft.
> >>
> >> Thanks,
> >>
> >> David, Gorry and Wes
> >>
> >> (TSVWG Co-Chairs)
> >>
> >>
> >> _______________________________________________
> >> saag mailing list
> >> saag@ietf.org <mailto:saag@ietf.org>
> >> https://www..ietf.org/mailman/listinfo/saag <https://www.ietf.org/mailman/listinfo/saag>