Re: [Udp35] Snowden and SPUD

Michael Welzl <michawe@ifi.uio.no> Mon, 20 July 2015 17:17 UTC

Return-Path: <michawe@ifi.uio.no>
X-Original-To: udp35@ietfa.amsl.com
Delivered-To: udp35@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 978D91ACEAE for <udp35@ietfa.amsl.com>; Mon, 20 Jul 2015 10:17:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kx6nloNFJqOu for <udp35@ietfa.amsl.com>; Mon, 20 Jul 2015 10:17:30 -0700 (PDT)
Received: from mail-out5.uio.no (mail-out5.uio.no [IPv6:2001:700:100:10::17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F7661B2D03 for <udp35@ietf.org>; Mon, 20 Jul 2015 10:16:27 -0700 (PDT)
Received: from mail-mx2.uio.no ([129.240.10.30]) by mail-out5.uio.no with esmtp (Exim 4.80.1) (envelope-from <michawe@ifi.uio.no>) id 1ZHEfy-00088d-0R; Mon, 20 Jul 2015 19:16:26 +0200
Received: from dhcp-a38a.meeting.ietf.org ([31.133.163.138]) by mail-mx2.uio.no with esmtpsa (TLSv1:AES128-SHA:128) user michawe (Exim 4.80) (envelope-from <michawe@ifi.uio.no>) id 1ZHEfx-0001VE-CW; Mon, 20 Jul 2015 19:16:25 +0200
References: <DD4CE423-ABFD-41CA-8AA8-79DE2779A47B@ifi.uio.no> <CAGD1bZbwkaYmH7WR_jb-wgkXfM7EjyExAy=P11V3CR_u40KKFQ@mail.gmail.com> <AED99648-40DE-4857-9F67-861C52252DF7@ifi.uio.no> <55AD2A9C.2070106@cisco.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <55AD2A9C.2070106@cisco.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Message-Id: <4D44D0D7-08F0-4601-922C-D38C15E3263B@ifi.uio.no>
X-Mailer: iPhone Mail (11D201)
From: Michael Welzl <michawe@ifi.uio.no>
Date: Mon, 20 Jul 2015 19:16:25 +0200
To: Eliot Lear <lear@cisco.com>
X-UiO-SPF-Received:
X-UiO-Ratelimit-Test: rcpts/h 6 msgs/h 2 sum rcpts/h 7 sum msgs/h 2 total rcpts 31201 max rcpts/h 54 ratelimit 0
X-UiO-Spam-info: not spam, SpamAssassin (score=-5.0, required=5.0, autolearn=disabled, MIME_QP_LONG_LINE=0.001, UIO_MAIL_IS_INTERNAL=-5, uiobl=NO, uiouri=NO)
X-UiO-Scanned: 08A23D2C9E449B0982152B551025F102F4E6AEFA
X-UiO-SPAM-Test: remote_host: 31.133.163.138 spam_score: -49 maxlevel 80 minaction 2 bait 0 mail/h: 1 total 1 max/h 1 blacklist 0 greylist 0 ratelimit 0
Archived-At: <http://mailarchive.ietf.org/arch/msg/udp35/bejolfoQ1Ou4iLoJURZwD4W12n0>
Cc: Jana Iyengar <jri@google.com>, "udp35@ietf.org" <udp35@ietf.org>
Subject: Re: [Udp35] Snowden and SPUD
X-BeenThere: udp35@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Life beyond UDP <udp35.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/udp35>, <mailto:udp35-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/udp35/>
List-Post: <mailto:udp35@ietf.org>
List-Help: <mailto:udp35-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/udp35>, <mailto:udp35-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Jul 2015 17:17:31 -0000

oh and btw: your syn / synack assumes middleboxes trust end systems' tcps to act right - which is a point i made. will they immediately trust spud? why should they - just cause it's easy?  that's a weird reason to trust someone.

Sent from my iPhone

> On 20. juli 2015, at 19:06, Eliot Lear <lear@cisco.com> wrote:
> 
> Hi Michael,
> 
> On 7/20/15 6:47 PM, Michael Welzl wrote:
> 
> 
>> Okay, I guess it’s time for me to say what I think about SPUD.
>> 
>> There are two parts here: the later rolled-into-SPUD AE(C)ON-and-before (flow metadata and whatever else it was called) ideas from Cisco. These are what they are, with their pro’s and deficiencies, and this is not what this email is about. I think we should focus on the original idea, which is about getting through middleboxes by “playing nice”. Here I think SPUD is trying to solve a problem that can’t be solved by protocol design. It’s not a design problem, it’s an incentive problem.
>> 
>> Consider the discussion about connection setup/teardown that happened on the SPUD mailing list some time ago. Someone said (s)he thinks it’s useless because in the middlebox, they will need a timer anyway, as one can’t simply trust the teardown message to arrive. Well, people do have more trust in TCP it seems … it seems to me that it’s a story of incentives and trust much more than it’s a story of how the protocol looks.
> 
> Yes.  Sort of.  But I feel the need to jump up and down and TYPE IN ALL
> CAPS:
> 
> A firewall in particular that is attempting to limit connectivity to
> that which the host has initiated takes it as granted that a host knows
> what to do if it sees a SYN ACK or ACK for a 5-tuple that has never been
> SYN'd.  That requires ZERO state to maintain AND it even works with
> multihoming.  That stateless firewall is good enough for many MANY
> people.  Anything stateful can be built atop that simple understanding. 
> If SPUD duplicates those semantics for UDP, that will have taken us a
> long way.
> 
>> 
>> Here’s a thought experiment. Three (wrong) assumptions: 1) Assume, for a second, that native protocols would have a 50% chance of passing on the Internet (I think that’s too optimistic, but that’s not the point here). 2) Assume that browsers could send out native protocols.  3) Assume that QUIC would be such a native protocol.
>> 
>> Q: what would happen to the non-supportive paths?
>> 
>> I think we would quickly see this 50% number grow - because there’s a customer need associated with QUIC. People want it because it makes their browsers faster, as simple as that! Plus, it will earn trust points over time because it’s only generated in user space, comes from browsers, comes from Google, has been wider and wider tested….
>> 
>> Now, assume that QUIC would become a general-purpose carrier. All kinds of applications would start using it. Everything would be multiplexed over QUIC. What would middleboxes do? They would start looking deeper into QUIC, right? Same problem again!
>> 
>> The point of this story: I think you can’t make a general-purpose carrier that “plays nice” and convinces middleboxes that all is fine.
> 
> And yet we have proof of existence of just such a carrier: TCP
> 
> ???
> 
> Eliot
> 
>