Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, closes 23 October 2019

"Lubashev, Igor" <ilubashe@akamai.com> Mon, 21 October 2019 04:04 UTC

Return-Path: <ilubashe@akamai.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D4701200B5 for <tsvwg@ietfa.amsl.com>; Sun, 20 Oct 2019 21:04:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T8M6lsorYzUV for <tsvwg@ietfa.amsl.com>; Sun, 20 Oct 2019 21:04:41 -0700 (PDT)
Received: from mx0b-00190b01.pphosted.com (mx0b-00190b01.pphosted.com [IPv6:2620:100:9005:57f::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 106B7120058 for <tsvwg@ietf.org>; Sun, 20 Oct 2019 21:04:40 -0700 (PDT)
Received: from pps.filterd (m0122331.ppops.net [127.0.0.1]) by mx0b-00190b01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id x9L42IKD002947; Mon, 21 Oct 2019 05:04:33 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=jan2016.eng; bh=47y2k+1aUvBcAJzkjti5OdWRNjibM4FZFTL8tSusRRA=; b=UK6di4gqlOQQmJVv3u6FeSO/AGzqUQN9Az2Cb9NMXu5ZVAZEFg9mGt7cTtnji7KLimV+ ljhT/WS1xpGL6CxwQmjGI7sfKhFHNhyJAofSBY89hvjdiCQebFNvcy1ikva5eBehUYq5 taoWquSXkjfo5mGmtHs5eoNzLqcxMoM1FMw+tQWN3sEJs5zcPdMxtv4mEwXibFim/gJq nFdA4/LMHZW4WZ2F6uUIZBnZY0gb9itSUByJuZ0wDVmMHIWPhCUBB8JEdGH2wNXSc9+Q x+SqBo90I6ki6Em/3cGIpfUe52AabcUbeObowbQWnVy6TPzQrqx0AlodFcT0xJKfRTDB jQ==
Received: from prod-mail-ppoint8 (prod-mail-ppoint8.akamai.com [96.6.114.122] (may be forged)) by mx0b-00190b01.pphosted.com with ESMTP id 2vqqbtfyk7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 21 Oct 2019 05:04:33 +0100
Received: from pps.filterd (prod-mail-ppoint8.akamai.com [127.0.0.1]) by prod-mail-ppoint8.akamai.com (8.16.0.27/8.16.0.27) with SMTP id x9L42hie021694; Mon, 21 Oct 2019 00:04:32 -0400
Received: from email.msg.corp.akamai.com ([172.27.165.116]) by prod-mail-ppoint8.akamai.com with ESMTP id 2vqwtw90na-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Mon, 21 Oct 2019 00:04:31 -0400
Received: from USTX2EX-DAG1MB5.msg.corp.akamai.com (172.27.165.123) by ustx2ex-dag1mb2.msg.corp.akamai.com (172.27.165.120) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sun, 20 Oct 2019 23:04:11 -0500
Received: from USTX2EX-DAG1MB5.msg.corp.akamai.com ([172.27.165.123]) by ustx2ex-dag1mb5.msg.corp.akamai.com ([172.27.165.123]) with mapi id 15.00.1473.005; Sun, 20 Oct 2019 23:04:11 -0500
From: "Lubashev, Igor" <ilubashe@akamai.com>
To: Tom Herbert <tom@herbertland.com>
CC: Joe Touch <touch@strayalpha.com>, Christian Huitema <huitema@huitema.net>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, closes 23 October 2019
Thread-Index: AQHVfq5skMMsqltcGkSZvOGieG/ROadStP4AgATOJgCABLtaMIAAmDoAgADUndCAAK2tgIAGJe8A
Date: Mon, 21 Oct 2019 04:04:10 +0000
Message-ID: <00cf55e3462e44be8bcb908c453c3eef@ustx2ex-dag1mb5.msg.corp.akamai.com>
References: <CE03DB3D7B45C245BCA0D2432779493630766752@MX307CL04.corp.emc.com> <e8c30f3f-606f-0c0d-a7dd-b2bb6f31a9fd@huitema.net> <A2F184BB-E352-4AE6-B7A0-FDF6D8851DFB@strayalpha.com> <CALx6S36VYt+LVxWM_ZRos7VK6GArNbenpFD3yaPdqedvkoHpoQ@mail.gmail.com> <9c7df6fe717c43739454a91f8080cffa@ustx2ex-dag1mb6.msg.corp.akamai.com> <CALx6S361-wmgGWcTQHNsXnJEPkdCbvOhSCGwd5a9R0RQ_E=CCg@mail.gmail.com> <8543343a39a04d5baca64ce2a3085ac9@ustx2ex-dag1mb6.msg.corp.akamai.com> <CALx6S36FonVeU25YJEq_7PaNrfvX4ABLFv5VLbb6QKE==G5Xfg@mail.gmail.com>
In-Reply-To: <CALx6S36FonVeU25YJEq_7PaNrfvX4ABLFv5VLbb6QKE==G5Xfg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.19.32.179]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-10-21_01:, , signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1910210034
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,1.0.8 definitions=2019-10-21_01:2019-10-18,2019-10-21 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 phishscore=0 bulkscore=0 malwarescore=0 spamscore=0 impostorscore=0 lowpriorityscore=0 mlxscore=0 priorityscore=1501 adultscore=0 suspectscore=0 clxscore=1015 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1908290000 definitions=main-1910210034
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Wmh9PtyvV-1XlcHgCLEAT-mvqNY>
Subject: Re: [tsvwg] [saag] TSVWG WGLC: draft-ietf-tsvwg-transport-encrypt-08, closes 23 October 2019
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Oct 2019 04:04:43 -0000

> On Wed, Oct 16, 2019 at 6:25 PM Tom Herbert <tom@herbertland.com> wrote:
> 
> On Wed, Oct 16, 2019 at 2:49 PM Lubashev, Igor <ilubashe@akamai.com>
> wrote:
> >
> > > On Tue, Oct 15, 2019 at 7:22 PM From: Tom Herbert
> <tom@herbertland.com> wrote:
> > >
> > > On Tue, Oct 15, 2019 at 2:32 PM Lubashev, Igor <ilubashe@akamai.com>
> > > wrote:
> > > >
> > > > > On Sat, Oct 12, 2019 at 12:02 PM Tom Herbert
> > > > > <tom@herbertland.com>
> > > wrote:
> > > > >
> > > > > I do believe that there will be valid use cases for hosts to
> > > > > signal the network for services. There is a least one robust,
> > > > > explicit, and transport agnostic method to allow hosts to signal
> > > > > the network with transport related information and even
> > > > > application layer
> > > > > information-- that's Hop-by-Hop Options extension header. A
> > > > > critical difference with parsing transport layers, is that the
> > > > > end host is in control of what information is exposed in HBH
> > > > > options. As I've said several times, I believe this draft is
> > > > > missing on the opportunity to propose this as the "solution" to
> > > > > middleboxes losing visibility because of
> > > encryption.
> > > >
> > > > +1
> > > > An explicit signal-to-network, such as IPv6 HBH option, is
> > > > architecturally far
> > > superior to a hotch-podge of protocol-specific signals.  I think it
> > > would be great for this draft to encourage design and
> > > standardization of such explicit signal.
> > > >
> > > > We know too well, unfortunately, that such signal, IPv6 HBH
> > > > option, will
> > > not work for most of Internet traffic today (IPv4 traffic and IPv6
> > > traffic flowing over links blocking IPv6 HBH option). The speed with
> > > which we can deploy encrypted-header protocols (i.e. QIUC) and a
> > > reliable explicit-signal- to-network HBH option differ greatly. What are we
> to do in the interim?
> > > >
> > > Hi Igor,
> > >
> > > The statement that IPv6 HBH will not work for most of the Internet
> > > traffic today is a rather broad generalization. In a sense, we could
> > > also that IPv6 doesn't work for most of the Internet traffic. I will
> > > accept that there is not ubiquitous support for HBH EH in all
> > > networks, but in the same way that IPv6 can be deployed before
> > > there's 100% support we need to be able to deploy things like HBH
> options.
> >
> > I am NOT saying "don't define an IPv6 HBH EH that would solve this
> problem, because it would not work everywhere".  Quite the opposite -- we
> should do something like IPv6 HBH EH, because all traffic should be IPv6 w/
> HBH EH working in the future.
> >
> > The argument is that we should _also_ do something, possibly
> > temporary, to take care of the very significant portion of the network
> > where IPv6 w/ HBH EH does not work today.  (I know that temporary
> > things have a tendency to last forever, and it stinks, but we are
> > talking about a very large portion of the traffic today.)
> >
> > <snip>
> >
> > > So to me the fundamental question is more about how do we deploy new
> > > protocols or existing protocols that are hard to deploy because of
> > > ossification. The answer lies in answering these two questions: 1)
> > > how do we work around the existing brokenness 2) how do we motivate
> > > fixing the brokenness.
> > >
> > > For the workaround, we can apply the philosophy of IPv6 "happy
> eyeballs"
> > > which is essentially using probing or external information to
> > > determine if the path to the destination supports a certain protocol
> > > (e.g. IPv6, HBH EH, UDP, etc.).
> >
> > The "brokenness" this draft points to is the lack of network signals.  IPv6
> HBH workaround is good, but it would not help for the majority of
> connections today.  So the workaround is incomplete.
> >
> > <snip>
> >
> > > For motivation, this seems to be a matter of demonstrating incentive
> > > for middlebox vendors to fix their solutions. Network signaling
> > > should be a good incentive.
> >
> > Yes, complete agreement here. A useful signal that cannot be received by a
> device is a good incentive for the operators to fix the device or to buy a
> different one. But while filtering IPv6 HBH EH is up to the operators, the use
> of IPv4 instead of IPv6 on a dual-protocol network is out of operators'
> control, so operator incentives are not a complete solution, unfortunately.
> >
> 
> That's why we're looking at HBH options for IPv4 also (draft-herbert-ipv4-
> hbh-destopt-00).

The concern expressed here is the encryption of usable signals and the lack of alternatives deployed within the same timeframe.  The language in draft-herbert-ipv4-hbh-destopt-00 states that "it is unlikely that packets with IPv4 Hop-by-Hop Options or Destination Options extension headers can be ubiquitously deployed over the Internet".

The goal of any "for the network" signal is improved QoS.  Hence, if there is a non-trivial chance that inclusion of such signal will actually degrade QoS (by causing packets with the signal to be dropped), no sender will include such signals (and "happy eyeballs" style code is too complex and risky for the benefit).

As architecturally "ugly" as it sounds, I can only see the QUIC header and the most significant TTL bits as viable alternatives to be deployable widely on the Internet for IPv4.  For IPv6, even HBH and Dest Options are still too "risky" for packets, but that is likely to be improving.

(Tom, are you interested in something like ConEx RFC 7837, except with HBH Options instead of Destination Options?)

- Igor

> Tom