From: "David P. Reed" <dpreed@deepplum.com>
To: "Livingood, Jason" <Jason_Livingood@comcast.com>
Cc: "starlink@lists.bufferbloat.net" <starlink@lists.bufferbloat.net>
Subject: Re: [Starlink] something of a step backwards
Date: Mon, 15 Nov 2021 13:45:37 -0500 (EST) [thread overview]
Message-ID: <1637001937.876717373@apps.rackspace.com> (raw)
In-Reply-To: <523DB564-9E11-4845-8072-003D9E1863AC@cable.comcast.com>
[-- Attachment #1: Type: text/plain, Size: 4900 bytes --]
>> They may start MITM's https connections to read traffic
> Unless they install certs on client devices how are they going to attack the TLS connections?
I don't know what is the current state of practice, but last time I looked, GoGo Internet was MITM'ing with packet content inspection in order to block "streaming" from passenger seats. This was justified by GoGo claiming that it was the ONLY way to manage traffic that dealt with streaming. In fact, merely fixing their bufferbloat would have completely eliminated the whole class of "overload" real-time services, and would have made response snappy as hell for all passengers sharing the connection. (And streaming would have had to run at very long latencies due to "fairness", essentially making Netflix impossible.
I don't know if this was ignorance on GoGo's part, or intent to continue to act as a MITM.
The mechanism for MITM'ing HTTPS connections is well known. I don't intend to detail it here, but it is based on the fact that certs aren't properly validated by client-end software and server-end software.
> FWIW, that was not why P2P connections were reset way back when. It was at root a bufferbloat issue, confounded by a lot of bad responses to & misunderstandings of the issue at that time. ;-)
By stating it was "bad responses" this covers up the entire Comcast fiasco, which led me to testify before an FCC En Banc on Network Management.
In fact, Comcast did have a bufferbloat *problem* technically. But it did not know it. Instead, their top management, including technical management *made up* a story to justify use of Sandvine DPI classification and packet insertion gear at all CMTS's owned by Comcast, which inspected content and inserted TCP packets to break connections. Comcast top management also attempted to get me, personally, fired from MIT or disciplined, by contacting several MIT executives who had the power to do just that! This personal attack is all thoroughly witnessed, including by a Sr. VP at Comcast at the time (whom Jason worked for).
Comcast PR made up a story that the "real problem" was BitTorrent use, because BitTorrent could, in fact, generate lots of upstream traffic. Which smelled funny, because if there was congestion, BitTorrent actually responded to TCP congestion control metrics. What was happening was, instead, that DOCSIS 2.0 had the ability to turn off packet drops entirely, instead allowing a single home to fill the entire outbound traffic path.
Thus, I ended up having to deal with a) Comcast claiming that "network management" required packet disssassembly, and required Comcast to inspect the content of *every* packet. It also boosted lies being told by Sandvine and Ellacoya about the virtues of their gear, developed by Israeli intelligence services to spy on internet traffic in real time, for network management. They began marketing their equipment to ALL ISPs in the world; and b) a push by all ISPs to claim that network management by surveillance gear (DPI) was within the norms of the Internet; and c) a push for companies like NebuAd and Phorm to argue that ISPs should have the right to read all traffic from all subscribers to collect data about the content of each subscriber's Internet to emulate what would become the "surveillance capitalist" model at the Internet Access level.
And beyond those global issues, having my personal technical ability and integrity attacked in public by well funded lobbyists in DC.
So, Jason, since you brought it up, these are the stakes that were, and remain, in creating an Open, Neutral Internet access model.
On Monday, November 15, 2021 9:21am, "Livingood, Jason" <Jason_Livingood@comcast.com> said:
> They may start MITM's https connections to read traffic
Unless they install certs on client devices how are they going to attack the TLS connections?
> They may start blocking bittorrent because they claim it's all "piracy" and theft.
FWIW, that was not why P2P connections were reset way back when. It was at root a bufferbloat issue, confounded by a lot of bad responses to & misunderstandings of the issue at that time. ;-)
But you do raise an interesting point that what’s considered a reasonable network management practice differs by type of access network – which we can see in the US between wired and wireless access network practices. What may become standard practice in LEO access networks is still emerging I suppose.
> This always comes with some argument that "bundling" a provider-controlled service
I’d guess the fastest path to deploy a MVP was to keep the edge access device as simple as possible and not worry about testing lots of permutations. So getting to market with 1 device makes sense IMO. What the future holds is anyone’s guess – but ISTM they are still fairly early in deployment.
JL
[-- Attachment #2: Type: text/html, Size: 13236 bytes --]
next prev parent reply other threads:[~2021-11-15 18:45 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <mailman.5.1636650001.22273.starlink@lists.bufferbloat.net>
2021-11-11 18:30 ` David P. Reed
2021-11-15 14:21 ` Livingood, Jason
2021-11-15 18:45 ` David P. Reed [this message]
2021-11-15 22:36 ` Michael Richardson
2021-11-11 15:53 Dave Taht
2021-11-11 15:54 ` Nathan Owens
2021-11-11 18:14 ` Jonathan Bennett
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://lists.bufferbloat.net/postorius/lists/starlink.lists.bufferbloat.net/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1637001937.876717373@apps.rackspace.com \
--to=dpreed@deepplum.com \
--cc=Jason_Livingood@comcast.com \
--cc=starlink@lists.bufferbloat.net \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox