Re: [tsvwg] [saag] Comments on draft-ietf-tsvwg-transport-encrypt-08.txt

Tom Herbert <tom@herbertland.com> Tue, 12 November 2019 16:19 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5A5212082E for <tsvwg@ietfa.amsl.com>; Tue, 12 Nov 2019 08:19:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MrOmEQhQhpSj for <tsvwg@ietfa.amsl.com>; Tue, 12 Nov 2019 08:18:58 -0800 (PST)
Received: from mail-ed1-x536.google.com (mail-ed1-x536.google.com [IPv6:2a00:1450:4864:20::536]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A56A12004A for <tsvwg@ietf.org>; Tue, 12 Nov 2019 08:18:58 -0800 (PST)
Received: by mail-ed1-x536.google.com with SMTP id a24so11711405edt.0 for <tsvwg@ietf.org>; Tue, 12 Nov 2019 08:18:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=dRl4pnSQcmDP3hsHR8pJ8assp/9ILZYSXXd5C2TzRpM=; b=a1GnZAdaPvYxChRU48M3tvkq4uXfORwuKPieUGR7vQ6PuUEgfzHQTfkwEQaTqYybCU 0ZpYqIC1i6hDDC1nRGmw4xrgiR4NlK2wT8LvBTfV96F3+TkdnMqGsqUwl8jbL7/Q0gqt MWiegPbxkZWvegCCMNC3ilQD4+UcS6YnM37NiDM1rhrPAF+VF8/d7sBRueOeR7lQ40nX GLYKQ/p/4Qs2hC9pzr1n66y9PRo3/WjEYdGxLTJ1B+lEjlqv1dZg23Kl150qiR6dhkQ6 VC1gvk9MepMve/6IxENB4Ha0MtGpG1z6QrqT3qQ1Nib29Uryf7SpSAQ315iTImYlxuAs RZZQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=dRl4pnSQcmDP3hsHR8pJ8assp/9ILZYSXXd5C2TzRpM=; b=oPi2gCB0ADDYnE6cl+3Dp5xlwTeYpGkLj6L5jD+g4MNbWHg6kHBI86C6lI/+4XQlFG E4sDf0FZ2HOdSgW0bmQnepTKxkfN+IYkQgsOl4+UTP1qA234hOf6yIdNUlwtz/SH/QEb ZXemq7Lc65lkfqjGy4ZhlgPg7ftAp5MbOGSZn0kbAvMjRlcDEWqHglQ6dxRCTd4PImI6 UR523yRjoEC6sAqlAOtj5Y/btm8pw0hxVnFWq/sdP9XC3xMU2FzMMGeuGcD7R5ZxKQxb NjNZlb1fU8Haa8/Sn5wjM86PAPp6qmPMs5FgR+Kzap+l6LQGv00TT+igjs/XsGfTb1BD V4XA==
X-Gm-Message-State: APjAAAVrfIsTgRBBazX++GJ3QkiGKSshHjOf4O+g+SYTiL2S3fcAoGl2 15GUChcxh9EMpsD1b8koVOXVfvjsZcpUNsDMmWYeQg==
X-Google-Smtp-Source: APXvYqyX3bjG66IhqDCOri85eJUIh6kp+KB8u2ec6Rax03VT+a7W22s/cMucz1+UPkNLE4u3QSeHyA08txFwr1bqPq8=
X-Received: by 2002:a17:906:d9db:: with SMTP id qk27mr13990844ejb.309.1573575536790; Tue, 12 Nov 2019 08:18:56 -0800 (PST)
MIME-Version: 1.0
References: <67CE4313-A4C2-4CC7-972E-CB465D47B7FE@ericsson.com> <998B7C3E-54D8-40AC-BF91-901390CF70C5@strayalpha.com> <CAPDSy+5rvaXgEGZ7_V4pRdmBss7Hf1XmaGbiXGZceQu9hjjRTQ@mail.gmail.com> <1573035094775.62307@cs.auckland.ac.nz> <87d3bcef-42e4-1535-db1f-06a8408d38d5@cs.tcd.ie> <1573109463764.56084@cs.auckland.ac.nz> <CALx6S36-44Ya9eMEjzCHA=Le5dTBd+ENuY3GQd5Jv691LUQDAQ@mail.gmail.com> <1573542420083.60501@cs.auckland.ac.nz>
In-Reply-To: <1573542420083.60501@cs.auckland.ac.nz>
From: Tom Herbert <tom@herbertland.com>
Date: Tue, 12 Nov 2019 08:18:44 -0800
Message-ID: <CALx6S35bi7cwJFKk2m3dh7GEBGuj3eBXi87X9QjDdJ=YkJtYyw@mail.gmail.com>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>
Cc: Stephen Farrell <stephen.farrell@cs.tcd.ie>, David Schinazi <dschinazi.ietf@gmail.com>, Joe Touch <touch@strayalpha.com>, "gorry@erg.abdn.ac.uk" <gorry@erg.abdn.ac.uk>, Mirja Kuehlewind <mirja.kuehlewind=40ericsson.com@dmarc.ietf.org>, tsvwg IETF list <tsvwg@ietf.org>, "saag@ietf.org" <saag@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/mUn2SSz6iglCoSgXmBQ90A2TeYk>
Subject: Re: [tsvwg] [saag] Comments on draft-ietf-tsvwg-transport-encrypt-08.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Nov 2019 16:19:04 -0000

On Mon, Nov 11, 2019 at 11:07 PM Peter Gutmann
<pgut001@cs.auckland.ac.nz> wrote:
>
> Tom Herbert <tom@herbertland.com> writes:
>
> >The problems of protocol ossification and middleboxes meddling in E2E
> >protocols has been discussed at length in IETF in various contexts.
>
> I'm aware of RFC 3234, which was written seventeen years ago and focuses on
> middleboxes messing with application-layer data, as well as farcical stuff
> like RFC 3424, of the same vintage, but it's mostly complaining rather than
> actual rigorous analysis, and often seems to be based on opposition to
> middleboxes as an article of faith, notoriously manifested in IPsec's "NAT is
> bad, therefore we will make sure IPsec breaks NAT, because NAT is bad", which
> has caused endless headaches for pretty much anyone who's ever had to work
> with IPsec ever since.
>
> In particular for this case, since the discussion is about header encryption
> and not middleboxes in general, I'm not aware of any rigorous analysis of its
> purported benefits, or even a clear statement of its purported benefits,
> something like "here is a definition of the service that header encryption
> provides, here is a real-world study showing that it provides this and
> demonstrating that it can't be readily defeated".  Contrast this with the two
> dozen plus studies that look at the analysis of encrypted traffic despite the
> encryption, an example being (just one picked at random) "Identifying HTTPS-
> Protected Netflix Videos in Real-Time", Andrew Reed and Michael Kranch,
> Proceedings of the 7th Conference on Data and Application Security and Privacy
> (CODASPY'17), March 2017, p.361.

Peter,

https://www.iab.org/wp-content/IAB-uploads/2014/12/semi2015_huitema.pdf
describes with some detail how encryption of the transport layer is
beneficial to resolve the tussel that results in protocol
ossification.

>From that document: "We know that embedding encryption and
authentication inside the transport protocol provides a powerful API
to applications, and also enables sophisticated handling of path
redundancy and mobility... We know all that because we have tried it
before.", also "The effect of middle-boxes on transport protocols is
obvious."

Tom

>
> So when people complain that the draft doesn't say enough about all the Good
> Things header encryption provides, I would respond that it does, it's cited
> all of the available literature on the benefits of header encryption, and all
> of the studies showing that it's effective, in Appendix B.
>
> The draft is actually quite restrained in this regard, as I mentioned in my
> previous message the two notable examples of header encryption/protection
> deployed at scale into the real world, IPsec and SSH, have both been a
> disaster (for functionality, IPsec, and security, SSH), but it very politely
> omits mention of this.
>
> Peter.