Re: [tsvwg] Review of draft-ietf-tsvwg-udp-options-32

"touch@strayalpha.com" <touch@strayalpha.com> Tue, 09 April 2024 22:57 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2AF19C14F6AE; Tue, 9 Apr 2024 15:57:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.315
X-Spam-Level:
X-Spam-Status: No, score=-1.315 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z0KAogkvUSii; Tue, 9 Apr 2024 15:57:40 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C910C14F681; Tue, 9 Apr 2024 15:57:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=1b5iY5S0/mTmLmJsgWmGV8raSuuH+rBoujNNNk19Uy0=; b=G7o5bMoT8DmCks7PUJE25oj1vb ucWC2IF251WUDIar1tVf/nVxkhi+7mTrPefc5B7KMc8StoRHBQzJkZtM2iSonuDi0f9xzFucymC1O T+KHm5B8wm9kN4ANI9dlsg4vQHBLlrjax4V+R2iSx8nzeqtGvKcXEBwlQqyv3OtF8Wl1S0KnFEwc1 2aDsrHfP+TZ8IGoK+KtAxwaRgAfWb3j9RwJOsBsktQtLCT9AGJFOg/b2aIPR0XuvUKxYV32R/CjrX 7UO9CC5K6eyxzLIZvNb+860Eff/ExHLLRXgO1NNhsKAfD3D+yYI3kXY/fn1LiucoZAkjcvgCwfY8E sj9Z03yg==;
Received: from [172.58.208.48] (port=11383 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.96.2) (envelope-from <touch@strayalpha.com>) id 1ruKPG-00Dlw9-0r; Tue, 09 Apr 2024 18:57:39 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_CE70B8FD-847F-47D5-9042-399F9B414E5E"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.500.171.1.1\))
From: "touch@strayalpha.com" <touch@strayalpha.com>
In-Reply-To: <CACL_3VG6k9Rg4316dZUd5ksQ2pLZHxzDc2dZqVD0Z9yPQBo3Yw@mail.gmail.com>
Date: Tue, 09 Apr 2024 15:57:20 -0700
Cc: Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com>, Christian Huitema <huitema@huitema.net>, "Gorry (erg)" <gorry@erg.abdn.ac.uk>, tsvwg <tsvwg@ietf.org>, draft-ietf-tsvwg-udp-options.all@ietf.org
Message-Id: <394791BC-76BB-4F7F-A79F-76024F02A37A@strayalpha.com>
References: <CAEh=tcd2FzQxgbSivuX2cEg2FpsnkoqdFw5gMhrx3pkT_JV88Q@mail.gmail.com> <2BEB5CC3-BB54-4119-A20F-8497ED4B5AE2@erg.abdn.ac.uk> <CAEh=tccKg7YHYkwKZ978uaXmTkBu3zyA+WBAW=eBMKAh2PSVDw@mail.gmail.com> <CACL_3VG6k9Rg4316dZUd5ksQ2pLZHxzDc2dZqVD0Z9yPQBo3Yw@mail.gmail.com>
To: "C. M. Heard" <heard@pobox.com>
X-Mailer: Apple Mail (2.3774.500.171.1.1)
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/jw6nG93HEfJYFYeKE798DvFLO5E>
Subject: Re: [tsvwg] Review of draft-ietf-tsvwg-udp-options-32
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Apr 2024 22:57:45 -0000

On the points below:

> On Apr 9, 2024, at 11:25 AM, C. M. Heard <heard@pobox.com> wrote:
> 
>>> The backwards compatibility with UDP was considered important in the development of this Spec.
>> 
>> This point is absent, AFAIK in Section 16 of the draft now.

That’s because Section 16 is about why the options are for endpoints, not transit nodes. Again, that’s intended as advice to the IESG for reviewing future extensions or standards using UDP options. The can be made more clear in that section.


> Adding such a discussion is a reasonable request; IMO the best place would be Section 6 (Design Principles).

It’s already design principle #6 and further discussed in section 18 in detail. If there’s something additional needed, it would be useful to know what’s missing.

>  On Tue, Apr 9, 2024 at 10:16 AM Christian Huitema wrote:
>> On 4/9/2024 9:09 AM, Tom Herbert wrote:
>> > I believe that processing of the options is already opt-in. Accepting
>> > UDP surplus area (at least ignoring it and not dropping packet) and the
>> > checksum processing I described are currently mandatory.
>> 
>> And that's probably what need to change before this draft is published.
>> Using the surplus area without the explicit consent of the application
>> is an attack. The proper way to stop such attacks is to drop the whole
>> packet, because only that inflicts a cost to the attacker.
> 
> I disagree that use of the surplus area without the explicit consent of the receiver automatically constitutes an attack, as long as the surplus area is ignored by default.

+1

Receipt of something you didn’t expect isn’t an attack per se. It’s an attack when it creates load AND cannot be avoided. UDP options are silently ignored unless enabled, so the only “load” to endpoints who don’t want to participate is space in the IP packet payload. Sec 24 already explains what to do if options are enabled and their use is inferred as an attack.

Joe