Alissa Cooper has entered the following ballot position for
draft-mm-wg-effect-encrypt-17: Abstain

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-mm-wg-effect-encrypt/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Many thanks for all the effort that has gone in to addressing all the comments
from the last IESG review and from the community. I find this version to be
much improved from the last time the IESG reviewed it.

However, I do not feel that I can support the publication of the document.
While the tone has improved in many places and the introduction does a better
job of contextualizing the document, the document still contains text in
several sections that states service providers' claims about their practices as
facts rather than stating them as claims or presenting the practices in a
neutral way. This was a point raised in my previous DISCUSS (I've included my
previous DISCUSS ballot text below in full for reference). In the previous
review round Warren had invited recommendations for places where the tone or
choice of words could be made more neutral or balanced, and I provided many
detailed suggestions, but a number of those were not adopted. I also realize
that the introduction contains much of the disclaimer text we previously hashed
out to try to address this, but it doesn't contain all of it. So this is still
a major issue for the document, IMO.

The document also still extemporizes about future possible impacts, making it
hard to come away with a neutral view of their treatment, as I noted in my
previous DISCUSS ballot.

I support the DISCUSS position held by Ekr. But given the above I don't think
it will be fruitful for me to continue to engage on the details of this
document, so I'm abstaining.

I've included below some of the areas that I still find problematic, as well as
some nits.

Problematic areas:

= Section 2.1.2 =

(1)
"Network operators are often the first ones called upon to investigate
   application problems"

I still contend that without data to back this up, this claim should not be
made, especially for the enterprise context.

(2)
"Vendors must be aware that in order for operators to better
   troubleshoot and manage networks with increasing amounts of encrypted
   traffic, built-in diagnostics and serviceability must be enhanced to
   provide detailed logging and debugging capabilities that, when
   possible, can reveal cleartext network parameters."

If I try to paraphrase this it sounds like "vendors should build in
capabilities to decrypt encrypted traffic." Was that the intent?

= Section 2.2.4 =

I agree with Christian Huitema's unresolved comments on this section. In the
thread regarding his comments Kathleen said "we don't want to make general
statements that aren't necessarily true" -- IMO that is what the middle three
paragraphs in this section are doing. At a minimum, I think the
characterizations about the effects of performance-enhancing proxies needs to
be qualified by saying "some operators find that ..." rather than stating their
effects as fact.

= Section 2.2.7 =

"There is work in progress to specify protocols that permit Service
   Function Chaining (SFC)."

I don't think it makes sense to have this forward-looking statement when
Section 1 states that "This document describes practices currently used by
network operators to manage, operate, and secure their networks." I think it
makes sense to focus this section on how existing SFC deployments have stopped
functioning because of increased use of encrypted traffic, but it seems unfair
to claim that some future, yet-to-deployed functionality will be broken.

= Section 2.3.2 =

"As a
   result, some mobile carriers block customer's encrypted requests,
   which is a far less optimal customer experience because the blocking
   reason must be conveyed by some other means."

This could easily be read to imply that sending requests in cleartext is
optimal.

Overall, the use of the words "usual," "optimal," and "often" in this section
imply a level of generality that is unwarranted I think.

= Section 5.6 =

The implications for SAVI seem speculative unless you can point to SAVI
deployments that have been impacted by increased use of encryption.

Nits:

= Abstract =

s/Pervasive Monitoring (PM) attacks on the privacy of Internet users is
   of serious concern/Pervasive Monitoring (PM) attacks on the privacy of
   Internet users are of serious concern/

= Section 2.1.2 =

(1)
"Further, the performance of some services can be more efficiently
   managed and repaired when information on user transactions is
   available to the service provider.  It may be possible to continue
   such monitoring activities without clear text access to the
   application layers of interest ..."

It's not clear what "such monitoring" refers to, since the previous sentence is
about performance management and service repair.

(2)
Is "User/Service Key Quality Indicators" a term of art? It seems weird to be
capitalized.

= Section 2.2.3 =

This section seems like it was left in the document by mistake.

= Section 2.3 =

"As previously stated, the intent of this document is to
   document existing practices, the development of IETF protocols
   follows the guiding principles of [RFC1984] and [RFC2804]."

Is that comma supposed to be a period? I'm not following the grammar here.

= Section 2.3.1 =

s/However, the lack of ability to efficiently manage
   endpoints as a service reduces providers' ability to offer parental
   control./However, the lack of ability to efficiently manage
   endpoints as a service reduces network service providers' ability to offer
   parental control./

= Section 4.1.2 =

It seems like a single reference to RFC 8250 would suffice.

= Section 7.4 =

What is a trusted transit proxy?

----------------------------------------------------------------

Previous DISCUSS ballot text:

I have cleared my original DISCUSS point from my earlier review -- I get what
the text is saying now, although I still think the "lose the option" language
implies some entitlement to the option in the first place, which seems
inappropriate.

But given the reviews from Martin Thomson and Christian Huitema, it's not clear
to me that this document represents the consensus view of the IETF community.
Kathleen's response to Martin reinforces the point that we were discussing in
the first ballot cycle, which is that this document is written for and
represents operators, not the broader array of Internet interests. Yet the
suggestion to state that fact up front in the document was not adopted.

Having had some more time to review this document than I had in the previous
ballot cycle, I also am finding myself in agreement with significant portions
of the reviews from Martin and Christian. Reading their reviews helped
crystallize a lot of the difficulty I had in parsing this document the first
time around.

I understand the rationale that led to this document being written and I think
there is a version of this document that could be written that would achieve
the original goals while giving the subject matter a readable, neutral
treatment. Such a version would be a useful contribution. But I don't think
this document achieves that. In particular, there are four things that I think
it would need to do to achieve that:

1. State the analysis in a neutral way. As I had mentioned in one of the email
threads for the previous ballot cycle, I believe this document could be written
in a neutral way -- e.g., “Service providers currently do X. It is implemented
using Y mechanism. Encryption at Z layer breaks current implementations.” --
but it is not. Instead it characterizes many of the practices described as
"optimizations" or "features" or "enrichment" and states service providers'
claims about what these practices accomplish (e.g., "maximize QOE") as facts
rather than stating them as the reasons given by service providers for why they
engage in the practices. This is why in the previous round I suggested the
disclaimer at the top of the document to say that the document is giving a view
from service providers; that apparently didn't go anywhere, so the other option
is to describe each technique neutrally, or explain with each technique that
the characterization of the benefits is from the view of the operator. Martin's
comments about being clear about who is benefitting point this out as well.

2. Limit the discussion to techniques presently being affected and those
effects. There is a bunch of extemporizing about future possible impacts (e.g.,
in Sec. 2.7, 4.1.2, 4.1.3.1, 5.7, 7, 8). It's very hard to characterize future
implications, who will bear the "cost" for what, whether increases in user
complaints to various parties are "worth it," etc., in a way that is perceived
as neutral by all affected parties. Better not to make predictions if the goal
is to give a neutral treatment of network functions being impacted today.

3. Acknowledge the controversy. Many of the practices described in this
document are controversial, and have been for a long time. There is nothing
wrong with that. I agree with Christian that it would be better to state an
understanding of that head-on rather than leave it to the reader to decide
whether any particular characterization of something described implies an
endorsement of it. This has been done before, even in potentially controversial
documents that this document references, e.g. RFC 3135.

4. Structure the document in a way that is consistent and logical with minimal
repetition. It seems like there are multiple ways that this could be done.
Organizing based on use case (per Christian) and then discussing techniques
used within each use case is one way; organizing based on technique while
mentioning the goals for which each technique is employed is another. At
present the document is jumble of these.


_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to