Re: [tsvwg] Fwd: New Version Notification for draft-reddy-tsvwg-explcit-signal-00.txt

Tom Herbert <tom@herbertland.com> Mon, 20 February 2023 23:44 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F80EC14CF01 for <tsvwg@ietfa.amsl.com>; Mon, 20 Feb 2023 15:44:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0wCv4haqpcEB for <tsvwg@ietfa.amsl.com>; Mon, 20 Feb 2023 15:44:05 -0800 (PST)
Received: from mail-pl1-x635.google.com (mail-pl1-x635.google.com [IPv6:2607:f8b0:4864:20::635]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 98211C14F74E for <tsvwg@ietf.org>; Mon, 20 Feb 2023 15:44:05 -0800 (PST)
Received: by mail-pl1-x635.google.com with SMTP id h14so3302542plf.10 for <tsvwg@ietf.org>; Mon, 20 Feb 2023 15:44:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland.com; s=google; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=eCI5lzMLwx6Xd71f2vKuh4tMWC94r1NEr+Jg1OMHzsY=; b=ZC1IYCPQWVX1UWY9N5FbVOApUHmRd8WMRvczDVBh3ltNfpoKwHkJNzVg05GXCVbryq IhJomaYeqolWu0TGmGddSpuLgdBHnA5WQqv5GHKpXJ1TE6wVyYMR/PbRI+j2/t9WHv4F QJ87aestit9pBHKKenLuhCjwVyA9x0sOth7hTMOm8D31RMagej/F2+h0gjHd7v3YbeWQ T78gDRUc51a8t810AMIAvdgrlZk0GwQcxjdYqeX3OsfaLtaH4f9UvtL8hnj6Z3umhrgf 79KYbNxuBqC8iZRBMBQ+hDulLz9BzHJZcGVy40+ZFzJjUP0p5LRnpeds4mp9y0Pt7SR2 8ERA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=eCI5lzMLwx6Xd71f2vKuh4tMWC94r1NEr+Jg1OMHzsY=; b=V5woESeoupPj8PScGpKCJfV7SaTVF7K2sqNSdq7jTaF6kNv0+mI7f9M3rSgvFVtsg/ 8gFXdloxa0kSM2isypIOMYiYtwBRtrBFR+ZWflxXmTP+co5szbaMd/Rdvhi4g6klCC9z 2jhfzcWU7T+xC1eMc6INbtptyvFKTACHeLPOhoO6kPnAXlR+wfAKzmJGKBuE7SzxAggP M3OkV3xj3mQ60Ilc0xOrq9b4Iu1EHripQGpf3620VjpluMWCxjec448/nZn58DNmKgDO SQQTlZW6nIg9W9F5/sR8Bae5ty9j9dnuuPi7QH0RCTsH6ecsqhw8P1tUyQcgvP+vtXjZ V58g==
X-Gm-Message-State: AO0yUKWplXg2WO8kK8NmDaxVYgPci7RgpQ1fr2rFRX9jJjwP0PMeEv/2 ziiuhpfGgJMnfrCbrHKf5Av8zzvZNDC5lhGhgrempQ==
X-Google-Smtp-Source: AK7set/2EE5XZwVMAnoeBEG1w0BSnDcoLlobRa32mnXBJUrPTlwe3UhjfQSMNPE6aUk5k9EkEwjUnAVEuVrbPUxl20U=
X-Received: by 2002:a17:902:e984:b0:19c:92f5:697d with SMTP id f4-20020a170902e98400b0019c92f5697dmr3736plb.3.1676936644436; Mon, 20 Feb 2023 15:44:04 -0800 (PST)
MIME-Version: 1.0
References: <167592939329.52949.17763475463632062767@ietfa.amsl.com> <CAFpG3gdFojRowTpo-DBDh2czC9d-KemSetmeaOC3VZ=COqvOgg@mail.gmail.com> <CACL_3VE5KectHscwWLy3QfuqT_N1g8d=jFuL_Ar0zV=kdniG6w@mail.gmail.com>
In-Reply-To: <CACL_3VE5KectHscwWLy3QfuqT_N1g8d=jFuL_Ar0zV=kdniG6w@mail.gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 20 Feb 2023 15:43:52 -0800
Message-ID: <CALx6S37jb=4+xaYydOzXkcSTG-++uDRAUYpVRqgG+_tidjo2-g@mail.gmail.com>
To: "C. M. Heard" <heard@pobox.com>
Cc: tirumal reddy <kondtir@gmail.com>, tsvwg@ietf.org
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/vrj_KebjtlN1EGGiCqtybdwHidM>
Subject: Re: [tsvwg] Fwd: New Version Notification for draft-reddy-tsvwg-explcit-signal-00.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Feb 2023 23:44:09 -0000

On Mon, Feb 20, 2023 at 3:26 PM C. M. Heard <heard@pobox.com> wrote:
>
> One overall question: per https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-udp-options#section-14,
>
>    UDP options are transport options. Generally, transport headers,
>    options, and data are not intended to be modified in-transit. UDP
>    options are no exception and here are specified as "MUST NOT" be
>    altered in transit. However, the UDP option mechanism provides no
>    specific protection against in-transit modification of the UDP
>    header, UDP payload, or surplus area, except as provided by the OCS
>    or the options selected (e.g., AUTH, or UENC).
>
>
> Does this draft comply with this requirement?

Mike,

That addresses modification, but it's also questionable whether
intermediate nodes should be inspecting UDP Options at all. The sort
of signaling described should be in the network layer, IPv6 HBH
options for instance. In any case the question might be irrelevant
considering middlebox hardware devices typically are capable of
processing only headers and not trailers like UDP options.

Tom

>
> Mike Heard
>
> On Thu, Feb 9, 2023 at 9:31 PM tirumal reddy <kondtir@gmail.com> wrote:
>>
>> Hi all,
>>
>> The new draft https://datatracker.ietf.org/doc/html/draft-reddy-tsvwg-explcit-signal defines a mechanism for an endpoint to explicitly signal encrypted metadata to the network, and the network to signal its ability to accommodate that metadata back to the endpoint. This mechanism can be used where the endpoints desire that network elements along the path receive these explicit signals. It proposes three mechanisms to encrypt or obfuscate the metadata in the explicit signal.
>>
>> Comments and suggestions are welcome.
>>
>> Cheers,
>> -Tiru
>>
>> ---------- Forwarded message ---------
>> From: <internet-drafts@ietf.org>
>> Date: Thu, 9 Feb 2023 at 13:26
>> Subject: New Version Notification for draft-reddy-tsvwg-explcit-signal-00.txt
>> To: Tirumaleswar Reddy.K <kondtir@gmail.com>, Dan Wing <danwing@gmail.com>, Mohamed Boucadair <mohamed.boucadair@orange.com>
>>
>>
>>
>> A new version of I-D, draft-reddy-tsvwg-explcit-signal-00.txt
>> has been successfully submitted by Tirumaleswar Reddy and posted to the
>> IETF repository.
>>
>> Name:           draft-reddy-tsvwg-explcit-signal
>> Revision:       00
>> Title:          Encrypted Transport Protocol Path Explicit Signals
>> Document date:  2023-02-08
>> Group:          Individual Submission
>> Pages:          18
>> URL:            https://www.ietf.org/archive/id/draft-reddy-tsvwg-explcit-signal-00.txt
>> Status:         https://datatracker.ietf.org/doc/draft-reddy-tsvwg-explcit-signal/
>> Htmlized:       https://datatracker.ietf.org/doc/html/draft-reddy-tsvwg-explcit-signal
>>
>>
>> Abstract:
>>    This document defines a mechanism for an endpoint to explicitly
>>    signal encrypted metadata to the network, and the network to signal
>>    its ability to accommodate that metadata back to the endpoint.  This
>>    mechanism can be used where the endpoints desire that network
>>    elements along the path receive these explicit signals.
>>
>>
>>
>>
>> The IETF Secretariat
>>
>>