Re: [Udp35] [Stackevo] Snowden and SPUD

Michael Welzl <michawe@ifi.uio.no> Mon, 20 July 2015 21:47 UTC

Return-Path: <michawe@ifi.uio.no>
X-Original-To: udp35@ietfa.amsl.com
Delivered-To: udp35@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79C861A1B5E; Mon, 20 Jul 2015 14:47:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y7sqbD8cSwBj; Mon, 20 Jul 2015 14:47:12 -0700 (PDT)
Received: from mail-out4.uio.no (mail-out4.uio.no [IPv6:2001:700:100:10::15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD7161A1B3C; Mon, 20 Jul 2015 14:47:11 -0700 (PDT)
Received: from mail-mx6.uio.no ([129.240.10.40]) by mail-out4.uio.no with esmtp (Exim 4.80.1) (envelope-from <michawe@ifi.uio.no>) id 1ZHIty-0006xP-C9; Mon, 20 Jul 2015 23:47:10 +0200
Received: from [130.129.233.50] by mail-mx6.uio.no with esmtpsa (TLSv1:DHE-RSA-AES256-SHA:256) user michawe (Exim 4.80.1) (envelope-from <michawe@ifi.uio.no>) id 1ZHItx-0001Ye-OC; Mon, 20 Jul 2015 23:47:10 +0200
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2070.6\))
From: Michael Welzl <michawe@ifi.uio.no>
In-Reply-To: <0BBE04DC-E3BF-4C2E-AC32-CD793032E2CA@netlab.uky.edu>
Date: Mon, 20 Jul 2015 23:47:07 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <508D00EF-767F-4A3F-8A6E-42B9362294FF@ifi.uio.no>
References: <DD4CE423-ABFD-41CA-8AA8-79DE2779A47B@ifi.uio.no> <CAGD1bZbwkaYmH7WR_jb-wgkXfM7EjyExAy=P11V3CR_u40KKFQ@mail.gmail.com> <AED99648-40DE-4857-9F67-861C52252DF7@ifi.uio.no> <A2BDC79A-9738-4CFE-97D5-D91C3C998858@trammell.ch> <721369DA-79D7-43B0-8921-9132C7464C99@ifi.uio.no> <0BBE04DC-E3BF-4C2E-AC32-CD793032E2CA@netlab.uky.edu>
To: Ken Calvert <calvert@netlab.uky.edu>
X-Mailer: Apple Mail (2.2070.6)
X-UiO-SPF-Received:
X-UiO-Ratelimit-Test: rcpts/h 5 msgs/h 2 sum rcpts/h 11 sum msgs/h 4 total rcpts 31213 max rcpts/h 54 ratelimit 0
X-UiO-Spam-info: not spam, SpamAssassin (score=-5.0, required=5.0, autolearn=disabled, UIO_MAIL_IS_INTERNAL=-5, uiobl=NO, uiouri=NO)
X-UiO-Scanned: 346A738BD41124D54F4F121632BF31E2365A0155
X-UiO-SPAM-Test: remote_host: 130.129.233.50 spam_score: -49 maxlevel 80 minaction 2 bait 0 mail/h: 1 total 17 max/h 4 blacklist 0 greylist 0 ratelimit 0
Archived-At: <http://mailarchive.ietf.org/arch/msg/udp35/ask0t-1rFtPJP3FPYfp6tDw0YH0>
Cc: Stackevo <stackevo@iab.org>, Jana Iyengar <jri@google.com>, udp35@ietf.org
Subject: Re: [Udp35] [Stackevo] Snowden and SPUD
X-BeenThere: udp35@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Life beyond UDP <udp35.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/udp35>, <mailto:udp35-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/udp35/>
List-Post: <mailto:udp35@ietf.org>
List-Help: <mailto:udp35-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/udp35>, <mailto:udp35-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Jul 2015 21:47:14 -0000

> On 20. jul. 2015, at 20.42, Ken Calvert <calvert@netlab.uky.edu> wrote:
> 
> 
>>> The axe-head attached to the stick is "if you don't let this through, then you get a giant pile of entropy that tells you nothing."
>> 
>> i heard that before and wondered, on wondered, why would anyone let any of that pass, then?
> 
> Same reason they would let QUIC pass: it will make applications work better - otherwise nobody will use it.  (Of course there's the obvious problem that it's not defined yet :-).  In any case, I agree that without noticeable improvement for users in some dimension(s), there's no point.
> 
>> so, and i'm serious: if we could do this with quic, that would help, right?
> 
> For some applications.  For others, it depends on whether the parts of QUIC "behind the veil" allow for evolution.
> Also, whatever is exposed will become ossified, so it should be designed with evolution in mind (whatever that means).

maybe that's not a problem?!

i just saw a part of brian's email that i had overlooked before as i was answering on my phone:

me:
>>> Now, assume that QUIC would become a general-purpose carrier. All kinds of applications would start using it. Everything would be multiplexed over QUIC. What would middleboxes do? They would start looking deeper into QUIC, right? Same problem again!

brian:
>> Except they can't, because QUIC encrypts everything except the things that are explicitly exposed to the middleboxes. This is the intention with SPUD as well -- we redraw the network/transport layer boundary, this time with a big fat red marker that says go ahead, bruteforce my keys.


... doesn't that indeed make SPUD the ideal carrier for anything?  People have an incentive to let it pass, already now - but given that it's encrypted, they can't really be sure it is web traffic. SPUD lacks the incentive, but QUIC has it - make QUIC your new SPUD and you have it???

Cheers,
Michael