[ih] "Gateway Issue": End-Middle Interactions
Jack Haverty
jack at 3kitty.org
Sun Oct 6 11:55:42 PDT 2024
Recent discussions on this list reminded me of another issue that was on
the ICCB's "things we need to do" list in the early 1980s.
My ancient notebook just lists something like "control mechanisms".
Here's what I remember about what that meant on the 1980s ICCB to-do
list as I feverishly worked to copy it off some whiteboard:
---------------------
Issue: End-Middle Interactions
Within the Internet, activity generally involves some kind of
interaction between computers over a TCP connection. At each end, a
program is running under the control of one of that computer's Users,
who has been identified by some scheme involving a password and then
verified as authorized to use the Internet. Some users access remote
computers by a connection from their terminal to a TAC (Terminal Access
Controller), which also requires password authentication from each
User. Additionally, various projects are creating mechanisms to permit
such TCP connections to be protected by encryption techniques. The
Internet architecture provides mechanisms whereby Users can be reliably
identified and authorized to use the Internet, with their interactions
protected against interference or disruption by outsiders.
However, such "End-to-end" communications also involves considerable
"End-to-Middle" ancillary, but critical, communications. One example
is some of the ICMP interactions, e.g., between a gateway somewhere in
the Internet and a TCP running in a Host computer. Another is the
interactions performed by the ARP mechanisms, which enable an IP address
to be associated with the appropriate LAN address.
Such interactions are examples of End-to-Middle communications. They are
necessary elements involved in setting up and operating every TCP
connection. As such, each End-to-Middle communications pathway should
be identified, and suitable mechanisms be defined and implemented for
each End-to-Middle information flow to provide adequate protection
appropriate to the protection methods used for TCP connections.
---------------------
Since the early 1980s, many more End-to-Middle mechanisms have been
created. Some of them seem to have been examined and protection
mechanisms defined (e.g., DNSSEC, HTTPS, SSL, TLS, etc.). But I don't
know how well they've been designed and implemented or how extensively
they've been actually deployed throughout the Internet.
Also, usage patterns of the Internet have changed significantly. We no
longer just type at terminals and transfer files. Humans are no longer
the only Users. Perhaps they're not even the dominant User community.
There's a lot of Servers out there, madly and constantly talking to each
other for their own missions. Servers are Users of the Internet too.
Some End-to-Middle mechanisms don't seem to have changed much. The ARP
interactions which we exploited in the 80s to create the debugging tool
"Flakeway" seems to still exist. I've been told it has even become a
critical element of NAT implementations.
With the explosion of "applications" that use TCP, new End-to-Middle
interactions have been introduced. An example is in the Email Service,
where Headers now contain all sorts of information, placed there by all
sorts of actors along the way, presumably for use by all sorts of other
actors in other places. Whether and how all these information flows
are authenticated and protected is unclear to me at least.
But all such End-to-Middle information flows are important to us Users,
even the Servers. Even if we don't know it.
Jack Haverty
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 665 bytes
Desc: OpenPGP digital signature
URL: <http://elists.isoc.org/pipermail/internet-history/attachments/20241006/24516206/attachment.asc>
More information about the Internet-history
mailing list