[v6ops] Re: Traffic control protocols (PCP and UPnP IGD)
Daryll Swer <contact@daryllswer.com> Sun, 28 July 2024 14:01 UTC
Return-Path: <contact@daryllswer.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 73512C14F698 for <v6ops@ietfa.amsl.com>; Sun, 28 Jul 2024 07:01:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.106
X-Spam-Level:
X-Spam-Status: No, score=-7.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=daryllswer.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LXgcy2wtlEfh for <v6ops@ietfa.amsl.com>; Sun, 28 Jul 2024 07:01:41 -0700 (PDT)
Received: from mail-pl1-x62c.google.com (mail-pl1-x62c.google.com [IPv6:2607:f8b0:4864:20::62c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 621B9C14F61D for <v6ops@ietf.org>; Sun, 28 Jul 2024 07:01:40 -0700 (PDT)
Received: by mail-pl1-x62c.google.com with SMTP id d9443c01a7336-1fda7fa60a9so20085415ad.3 for <v6ops@ietf.org>; Sun, 28 Jul 2024 07:01:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=daryllswer.com; s=google; t=1722175299; x=1722780099; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=O8q/EgnLJaPButNLuC68cfgRWF1H2ZofzWXY139XR6s=; b=DhNnNSCouJMsRJsbRNZGJhZExbT1BVDn3V7nG8AzaK1yFJ+jkz/hsGOEozWsNLpM17 /nOPQWqBA9UnFahcJfdbaBuNN/WIWFe9xpwz+8qRwbAw3Ynmjpjmrd4ilyKvKtF47mxK +fAOxoZhg0Cgx+7x73rDMi4yfMZ+14V9sRPup7taOx7yu9D+EYLLLZDt59FG2l4Khh5E wH6QDyvx8so3NtVyKHRDBe03B8j6xBu3GWzMEDN8rvND0b/5ZLd/Av0qHHL+dJejTkcO FYH3zD/ISSW4iGg15G3UeqT/6oeiL0vlRuUgYfkTeJqUzGMHMECNGAbwZ1ZCj4MXCR/A /dig==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1722175299; x=1722780099; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=O8q/EgnLJaPButNLuC68cfgRWF1H2ZofzWXY139XR6s=; b=HYTOmJ81+FJso3EJ6DDNNG8+TnG/XtFu/8pEuT5+4VYKEgPF2264YwofxbXNq4Y4EX BdmDYvM9qOVZKIcagr/u9ZAFnlcAhK9iiWoBQAp5k68gOWR6BV233D1/P1ICo6kKRlEB QhAdKYOapE4/NLFMc7QYRmYhUacNgrrW5/S3Jd/i0ppO+7R3c1AuffgwMbUKJMvyYLet mCW4g4QB08Gkt9agtNe9DETT5sExxZY5LEegRPG3JobiZcx0QvELEH+Aw/MLAnHNmYII 9mgvFpE4nLYsfurz2qJN+4GNeAEh3Ek7qYYfXt26ALqPr7qX0bTSgjmjhThVC4FGtDnY KGzg==
X-Forwarded-Encrypted: i=1; AJvYcCVn9TaQLM1nkdAHXCB5iqev2m5eFRgKMmaNlzL5DZUe5zJssiod/H1zZU13IrwV7j4pjORWJQNjQk9Mhz4s9Q==
X-Gm-Message-State: AOJu0YwA5oHitSYm7Bpmcch5AFbVJVuGrINSuNWn8+hkrZy6JWvSwIqm jKQFhyU47dzz7PxxXfglwF8v2eROhvx2O5t67f4e0QRw6Ktbggvka2wTiRu+sWqAd9eSGRDxDv9 xNVs=
X-Google-Smtp-Source: AGHT+IFQUWrxaphnL6q6C+s5o7xrhhDuJAB8gpdpUzf9omjqMZYMDN1IkAZZVc2+vE2M2Qfm9zU+Mg==
X-Received: by 2002:a17:903:2a85:b0:1fb:9b91:d7be with SMTP id d9443c01a7336-1ff047dd5d1mr64489105ad.9.1722175299210; Sun, 28 Jul 2024 07:01:39 -0700 (PDT)
Received: from mail-pg1-f171.google.com (mail-pg1-f171.google.com. [209.85.215.171]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-1fed7f30246sm65351795ad.212.2024.07.28.07.01.38 for <v6ops@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 28 Jul 2024 07:01:38 -0700 (PDT)
Received: by mail-pg1-f171.google.com with SMTP id 41be03b00d2f7-7a1be7b7bb5so1768791a12.0 for <v6ops@ietf.org>; Sun, 28 Jul 2024 07:01:38 -0700 (PDT)
X-Forwarded-Encrypted: i=1; AJvYcCWXkPbhG2MA22NrakwX6yt2aH6QQgsy6MFdd6qDW1874GGR4fRl3WnjhWuIlh5D64DydTxmNDtOncO8dxnIwA==
X-Received: by 2002:a17:90a:b111:b0:2c4:aa78:b48b with SMTP id 98e67ed59e1d1-2cf7e836c4dmr5847872a91.38.1722175297962; Sun, 28 Jul 2024 07:01:37 -0700 (PDT)
MIME-Version: 1.0
References: <TYVPR01MB10750FB6A5FA4EB034F9B5B8AD2B42@TYVPR01MB10750.jpnprd01.prod.outlook.com> <CAPt1N1kA9KETiVsK744m5AaXvCnspsN8zkdqRR1OcMo-ftkNfA@mail.gmail.com> <TYVPR01MB10750B17554096318B8C49BACD2B42@TYVPR01MB10750.jpnprd01.prod.outlook.com> <BF9C2E26-E49C-4764-9CEA-8E7738801819@employees.org> <TYVPR01MB1075001C9D2EC290201284F66D2B42@TYVPR01MB10750.jpnprd01.prod.outlook.com> <CACyFTPH7XJ=fV9jW0h59UH-TDL7OGWw_ifehPvbFzzoH2Ln0Ng@mail.gmail.com> <ZqQDMjckkFr3_hsv@Space.Net> <CAPt1N1mhMYck7Y-SOgFfpA7OD6b0H8Y5gAjsYHWSZLFfzdiRzA@mail.gmail.com> <ZqVh5oFVFSjAYqcL@Space.Net> <CAPt1N1=T+YYPuCJq64mffTqY-1Kp+Kv9hqt+TJa_5iMUh3QC4g@mail.gmail.com> <ZqYXiBz0oFsafbwC@Space.Net> <CAPt1N1m4Z4yBx60x9VPjN5kmbL3-DY5kpfpTnpSNi=z3e98-qw@mail.gmail.com>
In-Reply-To: <CAPt1N1m4Z4yBx60x9VPjN5kmbL3-DY5kpfpTnpSNi=z3e98-qw@mail.gmail.com>
From: Daryll Swer <contact@daryllswer.com>
Date: Sun, 28 Jul 2024 19:31:00 +0530
X-Gmail-Original-Message-ID: <CACyFTPEOgUNXZSjFz0vtgju549VfABaZvt8dtds_ekmUzKAaLQ@mail.gmail.com>
Message-ID: <CACyFTPEOgUNXZSjFz0vtgju549VfABaZvt8dtds_ekmUzKAaLQ@mail.gmail.com>
To: Ted Lemon <mellon@fugue.com>
Content-Type: multipart/alternative; boundary="000000000000e051c3061e4f2e37"
Message-ID-Hash: J2HSGDQ2O73MTNTAXDJIXJDUCSFXZXVS
X-Message-ID-Hash: J2HSGDQ2O73MTNTAXDJIXJDUCSFXZXVS
X-MailFrom: contact@daryllswer.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-v6ops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Ole Troan <otroan@employees.org>, "v6ops@ietf.org" <v6ops@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [v6ops] Re: Traffic control protocols (PCP and UPnP IGD)
List-Id: v6ops discussion list <v6ops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/bsVNi_jHpmDGob7C_vDw9PUat3c>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Owner: <mailto:v6ops-owner@ietf.org>
List-Post: <mailto:v6ops@ietf.org>
List-Subscribe: <mailto:v6ops-join@ietf.org>
List-Unsubscribe: <mailto:v6ops-leave@ietf.org>
> The mistake is thinking that PCP is creating a new problem. That’s not so. You are already vulnerable to attacks via network programming errors. They just happen in the other direction: zero click attacks, mal-adware, etc. +1 I also fail to understand, how is it, the IETF's job to create highly customised, pre-defined, detailed firewall templates for PCP/UPnP, with the assumption the hosts can't be trusted. Nope. That's not the IETF's job, IMO, that's the average Joe's job — Either hire an expert, learn it yourself, trust your ISP (yeah, right); If none of these options are available, it's not the IETF's problem. I'm all in for PCP signalling to open a port in the stateful firewall as I originally described, and PCP shouldn't encourage locking of the ecosystem to just TCP/UDP, it should support all standardised layer 4 protocols (DCCP, UDP-Lite, SCTP, maybe more). > You seem to be arguing that it’s better for there to be no way at all for me to have a listener on my network than for the firewall provided by my ISP that I can’t control to completely prevent me from having a listener. That's my interpretation as well, and if true, I disagree with Gert. Side note: That being said, in the absence of PCP, a stateful firewall will be fine for native P2P that's solicited over STUN. NO TURN, but with only STUN. I currently do use a stateful firewall in my family home because I don't control all the endpoints and ran extensive testing (with PCAPs) for P2P applications, they do work over the firewall thanks to STUN (and firewall rules that don't broke solicited P2P), however, unsolicited ingress is just obviously not going to work without PCP. *--* Best Regards Daryll Swer Website: daryllswer.com <https://mailtrack.io/l/94949aa4543970e421ce513199eac48657d9b846?url=https%3A%2F%2Fwww.daryllswer.com&u=2153471&signature=1b67aab56bd86676> On Sun, 28 Jul 2024 at 18:40, Ted Lemon <mellon@fugue.com> wrote: > I hear you, Gert. I’m not saying that you are wrong to be concerned with > that. What I’m saying is that this isn’t a protocol problem. Further, at > present nobody is doing what you are afraid they will do, and I think the > authors of openssh would be quite offended at your characterization of how > they think although given that “PasswordAuthentication yes” is still > standard in sshd_config, perhaps your cynicism isn’t misplaced. > > But the mistake I’m trying to point out is a bit different. > > The mistake is thinking that PCP is creating a new problem. That’s not so. > You are already vulnerable to attacks via network programming errors. They > just happen in the other direction: zero click attacks, mal-adware, etc. > > Meanwhile, the loss of functionality caused by firewalls is obvious: there > are a whole class of things people should be able to do with their internet > connection that they can’t because of firewalls. > > The way we typically deal with this issues is with value added software: > eg your eero router comes with an app that you can use to control this > stuff. PCP just makes the app easier to use: rather than having to know how > to open up a hole in your firewall for an app, the app just asks for what > it needs and you say yes or no. > > On an iOS device we might handle this with an entitlement, and make the > author that you think is such an idiot actually justify why they want a > listener. > > You seem to be arguing that it’s better for there to be no way at all for > me to have a listener on my network than for the firewall provided by my > ISP that I can’t control to completely prevent me from having a listener. > > Is that actually what you mean? > > Op zo 28 jul 2024 om 03:03 schreef Gert Doering <gert@space.net> > >> Hi, >> >> On Sat, Jul 27, 2024 at 04:56:44PM -0700, Ted Lemon wrote: >> > Gert, this is /precisely/ what PCP is for: to tell the firewall which >> ports >> > to allow through. My speaker doesn???t tell PCP to allow anyone on the >> > outside to play music to my speakers because that wouldn???t make >> sense. My >> > ssh server isn???t very useful if I can???t get to it from the outside. >> But >> > only that one ssh server???there are other ssh servers on my network >> that >> > would not make sense to expose. >> > >> > This is what PCP enables: fine-grained control over ingress. >> >> I totally understand the *idea* behind it. >> >> Implementors of, say, "speakers" might not get that their device is not >> supposed to be accessible by, say, their nice cloud service and still do >> add PCP to their speakers. Because someone thinks it's a good idea. >> >> Which is exactly my point that you try to not see - PCP, as a protocol, >> used for exactly those services that are a) intended to be reachable, and >> b) securely so, is a nice tool. PCP as a default action for "everything >> that opens a listening socket" contradicts having a firewall by default. >> >> I expect implementors to do "PCP as a default action for everything", >> because that's much easier than adding a config knob to let the informed >> user do the right thing. >> >> Also, of course, all software developers that add a listen socket will >> assume that their software is the most important you run, will need to >> be talked to, AND is totally secure. >> >> Real life vs. protocol design. >> >> Gert Doering >> -- NetMaster >> -- >> have you enabled IPv6 on something today...? >> >> SpaceNet AG Vorstand: Sebastian v. Bomhard, Ingo >> Lalla, >> Karin Schuler, Sebastian Cler >> Joseph-Dollinger-Bogen 14 Aufsichtsratsvors.: A. Grundner-Culemann >> D-80807 Muenchen HRB: 136055 (AG Muenchen) >> Tel: +49 (0)89/32356-444 USt-IdNr.: DE813185279 >> >
- [v6ops] Traffic control protocols (PCP and UPnP I… Stuart Cheshire
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… jordi.palet@consulintel.es
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Ole Troan
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… mohamed.boucadair
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Brian Candler
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… jordi.palet@consulintel.es
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Brian Candler
- [v6ops] Re: Traffic control protocols (PCP and UP… Gert Doering
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Gert Doering
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Gert Doering
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Gert Doering
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Dan Wing
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Dan Wing
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer