Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12

"C. M. Heard" <heard@pobox.com> Sun, 13 June 2021 17:25 UTC

Return-Path: <heard@pobox.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 043F83A2207 for <tsvwg@ietfa.amsl.com>; Sun, 13 Jun 2021 10:25:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pobox.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id skjIepHXePHS for <tsvwg@ietfa.amsl.com>; Sun, 13 Jun 2021 10:25:33 -0700 (PDT)
Received: from pb-smtp21.pobox.com (pb-smtp21.pobox.com [173.228.157.53]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50F7A3A21FC for <tsvwg@ietf.org>; Sun, 13 Jun 2021 10:25:32 -0700 (PDT)
Received: from pb-smtp21.pobox.com (unknown [127.0.0.1]) by pb-smtp21.pobox.com (Postfix) with ESMTP id 2633D1300D5 for <tsvwg@ietf.org>; Sun, 13 Jun 2021 13:25:31 -0400 (EDT) (envelope-from heard@pobox.com)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=pobox.com; h= mime-version:references:in-reply-to:from:date:message-id:subject :to:cc:content-type; s=sasl; bh=TPvc1TNxAiegOdN6zAanGdbO6Yew0wHs NkqhsCQ+8Qk=; b=YCVlQD2m5nuv86b3cVaRHjuE0Nsm7iUwWHHt6DvuIWA0FVF4 CmrptJ8tSYeBLxXlD7H4WOx22E+bSUmggA5Yw6Bwnjx4kuyAR4hicPTZ9c9sQ57Q ItcYbhE006jg0qaBDhEM1EcozFyfrh05d9bXoV09mfBHb/hDUqORA0j9iIU=
Received: from pb-smtp21.sea.icgroup.com (unknown [127.0.0.1]) by pb-smtp21.pobox.com (Postfix) with ESMTP id 0A60D1300D4 for <tsvwg@ietf.org>; Sun, 13 Jun 2021 13:25:31 -0400 (EDT) (envelope-from heard@pobox.com)
Received: from mail-io1-f54.google.com (unknown [209.85.166.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp21.pobox.com (Postfix) with ESMTPSA id 992CE1300D3 for <tsvwg@ietf.org>; Sun, 13 Jun 2021 13:25:28 -0400 (EDT) (envelope-from heard@pobox.com)
Received: by mail-io1-f54.google.com with SMTP id f10so22632491iok.6 for <tsvwg@ietf.org>; Sun, 13 Jun 2021 10:25:28 -0700 (PDT)
X-Gm-Message-State: AOAM532eFonx+0PhFnP2no4BaGqeaFzOppOxaX8zhdl2Tz/bjr68JYI9 wPPaSH+Uj3p9rI6N9RhW+mvpo6o88wmmjTfQWmo=
X-Google-Smtp-Source: ABdhPJxsw53qQVqQbq6xsR9/aGMky02gUEqlmc1gGKKkmA+sdY9vQe/53/RFuiZbGVzNv+9tuX7vOAFTns6fmHoluT8=
X-Received: by 2002:a05:6638:2247:: with SMTP id m7mr13735895jas.53.1623605127379; Sun, 13 Jun 2021 10:25:27 -0700 (PDT)
MIME-Version: 1.0
References: <CACL_3VGb_9P5SfPGRJtf1ZBvEhgywc2ZEGr-qbgNOMXV20rFeA@mail.gmail.com> <CACL_3VHyoRr5ju8203DiLTUo-658DCj7ud+1dQE2o0hUPVhF0A@mail.gmail.com> <7D766992-AEEB-434F-BB1D-3817EE07DE61@strayalpha.com> <CACL_3VGy-Fit+Hy5mwdnjS+Qqm8sEA=oDQPK_kpzsKNBeHjcUw@mail.gmail.com> <B96B9B29-7368-4D12-BCF7-D9854A138A19@strayalpha.com>
In-Reply-To: <B96B9B29-7368-4D12-BCF7-D9854A138A19@strayalpha.com>
From: "C. M. Heard" <heard@pobox.com>
Date: Sun, 13 Jun 2021 10:25:30 -0700
X-Gmail-Original-Message-ID: <CACL_3VHLCVxsvcFLcn=9Mh4SJKiB55x1vfxMm+hpByv3bDm8cg@mail.gmail.com>
Message-ID: <CACL_3VHLCVxsvcFLcn=9Mh4SJKiB55x1vfxMm+hpByv3bDm8cg@mail.gmail.com>
To: Joseph Touch <touch@strayalpha.com>
Cc: TSVWG <tsvwg@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000df813505c4a90647"
X-Pobox-Relay-ID: 58FC5034-CC6C-11EB-8972-FA9E2DDBB1FC-06080547!pb-smtp21.pobox.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/wMJ6hJrIiHgtKJXoje08rAWajpY>
Subject: Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Jun 2021 17:25:38 -0000

On Sun, Jun 13, 2021 at 10:21 AM Joseph Touch wrote:

> Hi, Mike,
>
> On Jun 13, 2021, at 10:08 AM, C. M. Heard <heard@pobox.com> wrote:
>
> - regarding AE being safe
>>         This is not considered unsafe for two reasons:
>>         1. A(authentication) isn’t unsafe
>>         2. Encryption should only be used when sending packets to a party
>> that is keyed; that can/should be known or checked before use anyway.
>>         i.e., there’s never a case where you send encrypted text to a
>> party you don’t know should be ready.
>>
>>
> I do not agree that this behaviour is optimum ... I'm of the opinion that
> authentication should be a contract between the two ends. TC-AO could not
> have done anything else because unknown TCP options are ignored. UDP-AE
> can do better. That being said, if there is consensus in the WG for
> what's in the -12 draft I can live with it.
>
>
> FWIW, we don’t have any stateful handshake inside of UDP options - that’s
> deliberate. We COULD add that sort of thing - in the spirit of a zero-byte
> packet with an option check list (a new option where you list the option
> codepoints you want to support), but we’ve resisted that because we didn’t
> want to bake statefulness into the options themselves. In a sense, that
> state is at the endpoint user layer in how it interprets options only.
>
> It might be sufficient to say that:
>
> - when AE is used as auth, it has no other restrictions
> - when AE is used as encryption, it MUST be used as an unsafe option,
> i.e., only as a post-reassembly option on FRAG-buried data
>
> That way users who don’t support encryption wouldn’t get bad data.
>

That would work for me.

Mike