[tsvwg] github issue long term archiving[ was: Re: Review of draft-ietf-tsvwg-udp-options-32]

Sebastian Moeller <moeller0@gmx.de> Wed, 10 April 2024 06:26 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FECDC14F5E8; Tue, 9 Apr 2024 23:26:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.842
X-Spam-Level:
X-Spam-Status: No, score=-1.842 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmx.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oD0FR1I9CMvU; Tue, 9 Apr 2024 23:26:50 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B89BEC14F610; Tue, 9 Apr 2024 23:26:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmx.de; s=s31663417; t=1712730406; x=1713335206; i=moeller0@gmx.de; bh=Nbt4HVDn0S46zqMCg5UpWTssRF9+OnJtFtIDxXFMdng=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References: To; b=JGffPT5811Y8V7FI7dLECbnntZHRMt/XQAnNOH1hnQl23S0FxQM8P1GoTmXxNuQx 7XM6clKvjtR+TAW0kidFtrBCyCix80CyfQxnAGwyY+wd8Y4ZKeNgwlYlhs1GgDLd+ QueQWDh5SJFSNPP1v0rjIscKOkT1L02OSsFDCtuAWT9AG3BL0pnzma9xts2jPPgRh 7Gaa6h1w+LlmF7CHK1EGlqWw0FTHeaDF3yDpkkaY5rqoujn6Iv520NQpLwsO3AiIZ j1Y55mE0XXcQ1OSZtHi9fkomPTjy6EZkLjbKzLl9b5sVpDyf7GRVengZN6crlg/k3 z6IhjgFXUYfu1EWz5g==
X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a
Received: from smtpclient.apple ([134.76.241.253]) by mail.gmx.net (mrgmx104 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MulqN-1slAf73m0R-00rmiL; Wed, 10 Apr 2024 08:26:46 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.500.171.1.1\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <F36164D6-8685-4AB2-AED3-147E4D6D8FF8@strayalpha.com>
Date: Wed, 10 Apr 2024 08:26:36 +0200
Cc: Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com>, tsvwg <tsvwg@ietf.org>, draft-ietf-tsvwg-udp-options.all@ietf.org
Message-Id: <ED51D4C2-5F33-44C3-B254-193FE1307515@gmx.de>
References: <CAM4esxSpwRF5E3Xc_hotgvCSdKVe4BY_zRUKAzHvW48JEtWqTA@mail.gmail.com> <CACL_3VGOLkJU1m7pqSXRRouCKwdQ6yrbmaPwoa22Jr-N3FZNzA@mail.gmail.com> <fccb92b0-dbc8-4cb2-b49c-1f603297d721@huitema.net> <CAEh=tcd2FzQxgbSivuX2cEg2FpsnkoqdFw5gMhrx3pkT_JV88Q@mail.gmail.com> <F36164D6-8685-4AB2-AED3-147E4D6D8FF8@strayalpha.com>
To: "touch@strayalpha.com" <touch@strayalpha.com>
X-Mailer: Apple Mail (2.3774.500.171.1.1)
X-Provags-ID: V03:K1:S8c7/y1/Ig/2HiJlHocuGz8HNbF80vbWsGMMRdaHqTnPB4E2m+g 2BnlC9Z14/2tKRguqxs/AeRkN0OFvvY2BMoMkxC8nwcrZ+5ZfDnFGsoXJqRgds9FapMRxUS lp6gkIDgu2hHbEZvGRktrACxKuYuRDHLExvERka3kBjt985yymwvXraYIArUGK/s8djHUy7 GvPLAwQZ4MXdhbfLVIs9Q==
UI-OutboundReport: notjunk:1;M01:P0:mVUcRmUQYbw=;TM0aynOZO1xp84KgBUzPgwCJG1j SworBB6+fRFRHCyHM8/2lfCNtBTGgb3aMUMb+Gnxf2dziaweKEQu2YVz3WJEHgVWV87dAFuBU a2vTnnY2m0XLbcP76h1w6YRRS/VGLA03KqxpV/Y8rwdPQXg0qCewxpWYJGw0QxMOXPWxbTIJh ADzaN4/Yb0ZOKbWo3kXxRHM3V8pQrXny/f2nmHFr7ChILR5z/gHf0RSvQrMIzpWj2FmYK7GtL EOhTg+cJ5HPXe0/UbCk72hSbtdhrGxCpxhjXXhHgwdw4htbiVk0/n/oBBckk1tl15c10OVWri KCl94GBamD25S0yUN4+A1qvY2yfwd2yCFij0SJMtA7Oqcu8mHahEjRD/xMAkFOjrDtwecbZ/H GhhA8XXPv2nolBkCDF04wOckbDEC4p5CtQtczmAAUhsA6osV6GXyopDB5HE7V9WPMIj0hv+0E 4XDMLF6kQwtOQRiq3dnGCksntsjMbN4zwFNOiIo+1/XsonYWrbc5ilD+BdjOEypRMtxM4AsD2 VlfGNzKQ+Cj9OVi6CbWUYatoHf4AGxBogYUDX0s/w1E+BDuUuX703cv8XT2oVpbrBtqJ7RqGb XLZrbG4I8NauRAT31vFJj6/lsCIYbW1gAzTsnlt1kiIWFxyhqLHHT7ASk7M0rar42NfrNetVQ Nw2wy63cUtgLdrvCV2FSWHzGL2/5Q2xpRZU+U1AurJLKLYpWDAiBunaUSkbTVvZEJXFaniYrQ 6PIIv476/VMtLAEihKlPCv+RljV/mHQSvfs9g3pjNjCUlzVWsaxoJxc/HvXS2+N6GJ7sMDwKn qFHMYVV7x5M1j+OueMfZR1HdurEvRKg/bUhJrB6knV+mHuO1ysAh7Wunrv4YQ5dvNPkEOmISy K+ra5GjwaOsQUISKR9xx54D1bDg+B5sxAe6Y=
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/WhIILQBk0W_hHtKcrrHDXrvTO48>
Subject: [tsvwg] github issue long term archiving[ was: Re: Review of draft-ietf-tsvwg-udp-options-32]
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Apr 2024 06:26:54 -0000

At list, chairs,

please see bewlow.

> On 9. Apr 2024, at 17:00, touch@strayalpha.com wrote:
>=20
> Hi, all,
>=20
>> On Apr 9, 2024, at 3:31=E2=80=AFAM, Zaheduzzaman Sarker =
<zahed.sarker.ietf@gmail.com> wrote:
>>=20
>> The questions I would like to get answer is  -=20
>>=20
>>       Is it OK for the endpoints to send information in UDP options =
which can be read (only) by the transit nodes and react to it? if NO,  =
then how to prevent that to happen?=20
>>=20
>> //Zahed=20
>=20
> We can prevent that if/when we proceed with the UDP encryption option =
or using IPsec.
>=20
> But all this talk about transport protocols and their vulnerability to =
on-path mods strikes me as hollow. We have had such protections for TCP =
for a generation (over 25 yrs) with TCP-MD5 and its successor TCP-AO. =
Neither one protects packets from on-path tampering with IP options, but =
we=E2=80=99ve had that for just as long too.
>=20
> What we don=E2=80=99t have is a widely enough deployed key =
infrastructure. Until that happens, it=E2=80=99s difficult to understand =
how raising these issues obligates protocol designers.
>=20
> However, there=E2=80=99s a second point I have not seen raised. Saying =
these options MUST NOT be modified in transit isn=E2=80=99t just for =
implementers - it=E2=80=99s also for those seeking to standardize such =
behavior and for those in the IETF who might assess those standards. =
What we=E2=80=99re saying, besides =E2=80=9Cdon=E2=80=99t do it=E2=80=9D, =
is =E2=80=9Cdon=E2=80=99t standardize it=E2=80=9D.
>=20
> The doc can make that point more clear in the doc, but I don=E2=80=99t =
see any other action coming from this discussion for the core doc.
>=20
> I also would suggest we move these discussions off to GITHUB as soon =
as possible so we can trace them more easily (chairs - what=E2=80=99s =
the procedure for that? Do you? Does the doc shepherd? Do I?).
>=20
> Joe
>=20


Question: if we move relevant discussion to locations not under IETF =
control, how do we ensure that the discussion threads stay =
readable/available in the future? While I have no reason to believe =
github will change its access model, I also have no guarantee that they =
will not.