[ippm] Re: Paul Wouters' Discuss on draft-ietf-ippm-capacity-protocol-20: (with DISCUSS and COMMENT)
Paul Wouters <paul.wouters@aiven.io> Mon, 11 August 2025 16:24 UTC
Return-Path: <paul.wouters@aiven.io>
X-Original-To: ippm@mail2.ietf.org
Delivered-To: ippm@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 0182A52A84F4 for <ippm@mail2.ietf.org>; Mon, 11 Aug 2025 09:24:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=aiven.io
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id im7lan51hqq2 for <ippm@mail2.ietf.org>; Mon, 11 Aug 2025 09:24:38 -0700 (PDT)
Received: from mail-ej1-x633.google.com (mail-ej1-x633.google.com [IPv6:2a00:1450:4864:20::633]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id E94DB52A7D12 for <ippm@ietf.org>; Mon, 11 Aug 2025 09:24:09 -0700 (PDT)
Received: by mail-ej1-x633.google.com with SMTP id a640c23a62f3a-af98b77d2f0so847376366b.3 for <ippm@ietf.org>; Mon, 11 Aug 2025 09:24:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aiven.io; s=google; t=1754929449; x=1755534249; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=VM46qzQuy6X5c80pCRJsgn5HzKm3yIVmnIJi4z2wRI0=; b=epFnsjb08haH0xvq/VeFMjtIQREOGE/lCbtzVZjtY+2xSN5tm65xcPbcuBjJdM6Cl2 DlGbA0/OOWIxlvmILxC72CeYhm6ZQTdScPjDo1hSr/ADm8cLVa6di08lhT5OxulZXoBx k/6H1LCUXo/4O/cHW58zCPTMuxlOsPB9WtLBU=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1754929449; x=1755534249; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=VM46qzQuy6X5c80pCRJsgn5HzKm3yIVmnIJi4z2wRI0=; b=nMoOVt/AOzukkV/FH3LdY8vUX4gYhLGsKamhGndOitm625WettMPOmLWQDkP47Za3V MY/e4rVFGuCB05nP/IW76YVwXcbeZXsU4w57+e23tXa0ctoY1c1j/nUCBXkd7m0/Cd7Z SxQmlnC7CIqofuZhOMkuN0b7QFT3ZSVNAhNKuPOhu4pUvS9Kefw44gpcznf5FG28AbL3 0YssdAjDze4cq15Lf5JLavgtnPaAPtk2ugGHxHJR7LucpaIyhdYay6s+YMaRGBB0EfaX omsV/DUHovy/MPuj8Xo5H9Ab16YcSjN6197lreiR3ZKFfpePR7gmkVRtCZtkD1eptGfc CDRA==
X-Forwarded-Encrypted: i=1; AJvYcCWgYt1fJK6bswN6pgKWZAhF5J7Zj/QB79UxUX21Sew306BAD0KGjpBrMkL+8hkiDNIE0Qpy@ietf.org
X-Gm-Message-State: AOJu0YzRaXkItTomtDbg+U9vlceQezzeYoYO1gBcW+R39hIHpRdJO2za mmPZyj7up8H6pWC18M65Uwh+fvKI2gzUxYUHoW1mAaL7eSc7QKXkhoVD7xYwiO4IJwkFbLqAR2X TY5ADmqZJwSJeWL4GHFGhfa1HshUcdywKMD1i5KP7OQ==
X-Gm-Gg: ASbGncvjzSWMuiBBhRBlMPuLwApH2oIZKq14IxmVp7McH8ibpooL0jpKY0ppnvgQlhu u4orViGK3UQjdU382b/WYB0/bXM28GMqXu59vOwnw8BbtwRLGZQ+6yxmgt/KRpWLK+i+NbnojP8 JDut1o02t/WDO7hybbPWNMAAAuZ+a9EGSYTFz9Vs/3nRLTR6c9N2uoE48RMo+4l9mL8YdCoCVNe WDeGw==
X-Google-Smtp-Source: AGHT+IHTtA3DLY1E7VS8c1Lo9kMZzChOgMCxW0S1bGoUHhY2SS8r+zFHjjAN9kIWNXsSV3qNg6ZJeM2hwD75uLHJIfM=
X-Received: by 2002:a17:906:f049:b0:af9:3773:8232 with SMTP id a640c23a62f3a-af9c6453155mr1210572666b.18.1754929448558; Mon, 11 Aug 2025 09:24:08 -0700 (PDT)
MIME-Version: 1.0
References: <175080039846.630107.8445994078350766610@dt-datatracker-6754d69b7c-p2xd7> <BEZP281MB200782FDA7F1B2426CD29AFE9C2CA@BEZP281MB2007.DEUP281.PROD.OUTLOOK.COM> <CAGL5yWb_mhbTEOWHpRxFSL1D+OduZSBCQiptc-K=NwCiS48jpg@mail.gmail.com> <BEZP281MB20071FEC15B99888C216369B9C2FA@BEZP281MB2007.DEUP281.PROD.OUTLOOK.COM>
In-Reply-To: <BEZP281MB20071FEC15B99888C216369B9C2FA@BEZP281MB2007.DEUP281.PROD.OUTLOOK.COM>
From: Paul Wouters <paul.wouters@aiven.io>
Date: Mon, 11 Aug 2025 12:23:57 -0400
X-Gm-Features: Ac12FXzIXjh14GZiB5wHn24BKv4c2mgsOuxF2TdXSGC3HLo_P4epyXlg8EJrUXE
Message-ID: <CAGL5yWZNCB=EQ607JNub7bdi=G1zMnLAbs=+aZS_jjYQKO3dOw@mail.gmail.com>
To: Ruediger.Geib@telekom.de
Content-Type: multipart/alternative; boundary="000000000000634b07063c195abe"
Message-ID-Hash: LWSSNGJ6A3BPBGZQJWMIKG36CAYN57MP
X-Message-ID-Hash: LWSSNGJ6A3BPBGZQJWMIKG36CAYN57MP
X-MailFrom: paul.wouters@aiven.io
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ippm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: debcooley1@gmail.com, draft-ietf-ippm-capacity-protocol@ietf.org, ippm-chairs@ietf.org, ippm@ietf.org, iesg@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [ippm] Re: Paul Wouters' Discuss on draft-ietf-ippm-capacity-protocol-20: (with DISCUSS and COMMENT)
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/Ul845ZsNyiVS2BVYW56kr3U869U>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Owner: <mailto:ippm-owner@ietf.org>
List-Post: <mailto:ippm@ietf.org>
List-Subscribe: <mailto:ippm-join@ietf.org>
List-Unsubscribe: <mailto:ippm-leave@ietf.org>
I thought I answered this but I don't see any set appointment. Can do we do this for the Wednesday slot you proposed? 9am EST 4pm CET ? Paul On Fri, Aug 8, 2025 at 7:25 AM <Ruediger.Geib@telekom.de> wrote: > Hi Paul, > > > > the approach taken is a performance measurement protocol with added > security features. The latter should find consent of the sec area. > > > > Part of our design: > > - One UDP port > - One PDU type which is neither encrypted nor authenticated (it > carries load with no information) > > > > Ok, where to go from there? > > > > - The authors, IPPM WG and OPS Area chairs prefer this work to reach > RFC state. > - No complete re-design of the protocol > - Is there a way for sec area > * to add security features, Authentication at least, to a > communication as sketched above (one port, one unauthenticated PDU type)? > * if that can’t be done for encryption, does a solution without > encryption have consent of the sec area? > * If that also can’t be done for Authentication, is that finding IESG > consent (the authors would be disappointed, Authentication is required)? > > > > The security approach taken so far doesn’t find consent of the sec area > (the authors don’t discuss the points you raise – we are no security > experts). Is the sec area willing to provide the authors guidance on how to > progress this protocol at this stage without a complete redesign? > > If a complete protocol redesign is the only option to add security > features finding sec area consent, I’d suggest OPS area and SEC area to > jointly specify a framework how to design performance measurement protocols > with added security features (this order of priority – I don’t want exclude > a secure protocol with added performance measurement features in general, > if measurement precision isn’t impacted by the secure protocol). Hoping to > get a blueprint for that motivated us to contact the sec area in 2022. That > latter is a worst case, we hope to avoid. We’d still have to figure out, > what to do if there’s no other option. > > > > Please let me know, if further details on the protocol were helpful for > the sec design. > > > > Med is available for a conf call too. Would UTC 14.00-15.00 Monday to > Thursday, that’s 9.00-10.00 EST and 16.00-17.00 CEST be suitable? If yes, > please let me know, if you prefer a particular day. Otherwise, please > change. > > > > Regards, > > > > Ruediger > > > > *Von:* Paul Wouters <paul.wouters@aiven.io> > *Gesendet:* Donnerstag, 7. August 2025 19:44 > *An:* Geib, Rüdiger <Ruediger.Geib@telekom.de>; Deb Cooley < > debcooley1@gmail.com> > *Cc:* draft-ietf-ippm-capacity-protocol@ietf.org; ippm-chairs@ietf.org; > ippm@ietf.org; iesg@ietf.org > *Betreff:* Re: [ippm] Paul Wouters' Discuss on > draft-ietf-ippm-capacity-protocol-20: (with DISCUSS and COMMENT) > > > > On Thu, Aug 7, 2025 at 8:09 AM <Ruediger.Geib@telekom.de> wrote: > > > > Hi Ruediger, > > > > I am sorry the process has been long and frustrating so far. But there is > still a lot of things that are not clear to us as SEC ADs. > > I am also seeing different emails bringing up new things, which > complicates things as well. > > > > Hi Paul > > Thanks for your review. We'd like to focus on the DISCUSS raised by you by > this exchange. > > You are asking, "Why is this protocol not using DTLS for its security > features?" > > Authors: > > To our understanding, using DTLS for its security features requires the > protocol to open two UDP ports: > - one for the secure DTLS signaled PDUs > - one for the Load PDUs which aren't protected. > > > > This is the first time I hear of the requirement of running encrypted and > unencrypted streams over the same port. > > > > As far as we can see, this would require a re-design of the protocol. The > protocol by now has reached IESG. First time, the authors have contacted > security area and asked for guidance was 2022: > https://mailarchive.ietf.org/arch/msg/ippm/LQxG-144USqSlwTHCZvFtW9wA08/ > > > > Reading through that thread, some of the issues that are bubbling up now > were not clear to me (or Roman?) at the time. > > Note that a SecDir reviewer is also just one person with an opinion - it > does not constitute a Security Area approval. > > > > Note that the above thread also states that data is "generated", leaving > me confused as to why that needs to be encrypted or > > protected? > > > > Authors: We've made progress and tried to follow guidance of Brian Weiss > on security. He asked us to present our approach to an appropriate security > WG in 2024, when you were involved again (I post the header only, didn't > pass lists): > > ------- > From: Paul Wouters <paul.wouters@aiven.io> > Sent: Dienstag, 2. Juli 2024 17:52 > To: Geib, Rüdiger <Ruediger.Geib@telekom.de> > Cc: debcooley1@gmail.com; alexey.melnikov@isode.com; > nicholas.sullivan+ietf@gmail.com; smyshsv@gmail.com; lc9892@att.com; > bew.stds@gmail.com; tpauly=40apple.com@dmarc.ietf.org; > marcus.ihlar@ericsson.com > Re: Request for a presentation slot in SAAG and CFRG, respectively > > we try to discourage presenting the same thing in two different meetings. > it seems the CFRG slot would be a better fit ? > > > > It seemed based on the PDF attached at the time, you were writing your own > encryption protocol. This is why I suggested to > > get feedback from CFRG. Based on > https://datatracker.ietf.org/meeting/120/materials/minutes-120-cfrg-202407252000-00 > you did > > get feedback but it got down deep to the crypto level. Did any followups > happen on the CFRG mailing list? > > > > To me again this seems to suggest this protocol is not the place to > invent its own cryptography. And again if this is generated > > synthetic data, I am still confused why it needs to be encrypted. > > > > Authors: We accept, that there are other security approaches. We looked > for, received and followed early and ongoing guidance by the security area > on one of these. The encryption approach pursued so far still isn't > consented by the security area. The authors are not interested in a > complete re-design of the protocol. Then how to make progress? > > > > I do not know how you can make progress. From a security point of view, > specifying new protocols with the CBC cryptographic primitive > > is just not viable. Runing low level openssl crypto library calls as a > protocol to security people is just unspeakable. It is just not done. > > Which is why we recommend DTLS. There was some confusion about that not > being able to detect packet drops or duplications, but that > > got resolved during IETF-123 when I sent a message with an example of how > an SCTP RFC required using DTLS with replay protection disabled. > > > > Now you raise a new problem of not wanting to redesign things on two > ports. There is no security protocol that allows you to mix encrypted > > packets with cleartext packets in a single data stream. > > > > - wait for the security area to improve the security approach taken so far > so that it can be implemented and finds consent by the security area? > > > > I do not think you should "wait for the security area to improve". Our > objections are very fundamental cryptography concerns. For example, > > TLS 1.3 has disallowed all CBC algorithms and only allows AEAD algorithms. > > > > - drop encryption and just operate authentication? > > > > I think I still don't understand what the encryption of generated > synthetic data is supposed to protect, so I cannot answer this question. > > I also do not understand what you mean with "authentication". Without > encryption, what does authenticaction mean? It cannot be a few > > packet authentication exchange, followed by a stream of unencrypted data > as the data would not be integrity protected either. And if you > > plan to integrity protect the data, you would run into similar issues as > when you are encrypting the data. You would need to negotiate > > securely an integrity key that can be used for something like an HMAC > style verification of data, but how would that work with mixing > > integrity protected data and unprotected data in the same stream? > > > > - in both cases, we'd ask you for a reference pointing to a load > performance measurement protocol which operates by DTLS (either by a single > UDP port only or using two UDP ports, one for signaling and one for > measurement). > If that's not feasible, we are happy to add text on such an improvement > and ask you to provide it. > > > > Please talk to your WG chairs and AD. The Security ADs are not the ones > that can be tasked to secure every protocol the IETF comes up with. > > > > An important constraint of a load measurement protocol: load measurement > PDUs must be large. They mostly do not transport content or any kind of > higher layer information - mostly bytes to create load and be dropped by > the receiver. These packets are not encrypted, as in addition to inducing > measurement errors / impacting precision of timestamps, encryption of > meaningless information protects no protocol or communication, but induces > processing requirements. Low end devices likely are not able to support > such a protocol. > > > > I still do not understand why you are trying to encrypt these data streams > of randomly generated data. > > > > Med suggested to have a conf-call, if this helps progressing issues. He's > about to leave office for three weeks and I personally try to avoid Friday > conf calls (I'm available until 11.00 UTC). > > Please suggest a way to proceed. > > > > I am available in various time slots in the next few weeks during EST > business hours. > > > > Paul > > > > > > > > -----Ursprüngliche Nachricht----- > Von: Paul Wouters via Datatracker <noreply@ietf.org> > Gesendet: Dienstag, 24. Juni 2025 23:27 > An: The IESG <iesg@ietf.org> > Cc: draft-ietf-ippm-capacity-protocol@ietf.org; ippm-chairs@ietf.org; > ippm@ietf.org > Betreff: [ippm] Paul Wouters' Discuss on > draft-ietf-ippm-capacity-protocol-20: (with DISCUSS and COMMENT) > > <snip> > > > ---------------------------------------------------------------------- > DISCUSS: > ---------------------------------------------------------------------- > > The main point of my DISCUSS is around the protocols authentication and > encryption. > It is a homegrown protocol, very restricted in cryptographic options, no > ephemeral > key exchange and unsafe use of PSK. Why is this protocol not using DTLS > for its > security features instead of inventing its own using low level openssl > functions > as a security protocol ? > > All of the Cryptogrpahic issues would go away, if you just optionally > allow to use DTLS 1.2 > or later. > > [Authors]: Duplicate Packets is one of the performance metrics captured. > Earlier draft versions contained text: "The <DTLS> replay protection would > remove duplicated packets and prevent transparent measurement of this > impairment." > > --------------------- > > 1) secure hash algorithm > > The document claims a number of times that low power devices are an > important use > case. If so, AES-CMAC (RFC4494) would be more appropriate than HMAC-SHA256 > > > ------------------- > > 2) using the KDF > > The KDF SHALL use the following parameters: > [...] > > It should more clearly specify thow these parameters are used. One likely > method > is concatenation in the order of the listed parameters, but if so, it > should > clearly state this, eg KDF(Kin || Label || Context || r) and it should > specify > how to deal with input that is larger in size than the input of the KDF. > > The authUnixTime field serves as a nonce > > This KDF use is not safe against writing a brute force engine of captured > traffic where the only unknown is the PreSharedKey. I think this could be > cracked in realtime using something like https://hashcat.net/hashcat/ for > every PSK under 16 characters. As PSK is "out of scope", it seriously runs > the risk of going in the clear in email or a phone call with a low entropy > phrase. > > ----------------- > > 3) auth and enc key generation > > Why are the authenticaion and encryption keys of a different > length/strength ? > This would make the resulting strength the least of the two, eg 128bit. > It only costs 1 HMAC-SHA2 operation more (4 instead of 3) to get 256bit > keys > for both. Or, you could use AES-CCM / AES-GCM and use an AEAD when > encryption > is needed which requires 256bit (or you can pick/choose 128bit) > > Which brings me to another point, at this point CBC should really not be > deployed for new protocols anymore. Please use AES-CCM or AES-GCM. > Especially > if low power devices are being targeted, using AES-CBC-SHA256 is far more > expensive (and less secure) compared to AES-CCM/AES-GCM (and SHA256). > Of course, this does require safe handling of the counters. > > ----------------- > > 4) encryption streams > > How are different streams using encryption? Same key? How is uniqueness in > IV > ensured? Or when switching to CCM/GCM, how are counters not re-used? > > ---------------- > > 5) random > > The sender SHALL populate the initVector field with a > cryptographically random 16-octet Initialization Vector (IV), > > On low power devices, getting a good random source is not always easy > either. This would be easier if one were to use an AEAD as well, and > use the authUnixTime as a nonce with a proper counter instead of a > random IV. For AES-CBC you would have to use an explicit IV (eg send > it over the wire) to allow decrypting out of order packets (eg see > RFC3602) which means generating randomness per packet. With AEAD > you only need to guarantee uniqueness, not unpredictability (aka random). > > --------------- > > I also would think the protocol should not hardcode AES-CBC-SHA256, but > use a registry similar to AlgID. > > --------------- > > AUTHMODE_3: Optional Encrypted mode > > You want to say: Optional Encrypted plus Authenticated Control and Data > phase mode. > > --------------- > > Authentication and encryption methods and requirements steadily > evolve. > Alternate encryption and/or authentication modes provide for algorithm > agility by defining a new Mode, whose support is indicated by an > assigning > a suitable "Test Setup PDU Authentication Mode Registry" value (see > Section 11.3.4 ). > > But this registry only has different modes of using authentication or > encryption. All the > actual values for these (HMAC-SHA256 and AES-CBC) are hardcoded and > implicit, so when one > in the future would add something else (eg encryption with AES-CMAC and > AES-CTR) the current > naming does not work at all for this registry. > > ---------------------------------------------------------------------- > COMMENT: > ---------------------------------------------------------------------- > > > Titel says: > > Test Protocol for One-way IP Capacity Measurement > > Abstract says: > > This document defines the UDP Speed Test Protocol for conducting > RFC 9097 and other related measurements. > > The Introduction says: > > This document specifies the UDP Speed Test Protocol (UDPSTP) > > Can these terms be made consistent? > > [Authors] Title, CHANGE : UDP Speed Test Protocol for One-way IP Capacity > Measurement > We'd like to keep One-way IP Capacity Measurement in the Title, as 9097 > specifies the latter. UDP Speed Test doesn't appear in 9097, however. > > ------------------- > > I am skeptical of the value of speed meassurements for anything using > specific ports, > as it is allows the network to treat these differently from "regular" > traffic. Eg we > commonly see "speedtest.net" outperforming reality. I see it can still be > useful in > labs (but then I question the authentication/encryption parts being > neccessary at all) > > [Authors]: Taking a consumer point of view, your analysis may be right in > some cases (at least). The protocol has seen deployment by one large > network provider for diagnostic purposes and it is preferred to TCP Speed > Test by some diagnosis tools in wireless environments. > > ------------------ > > Test Setup Request and Response: If a server instance is > identified with a host name that resolves to both IPv4/IPv6 > addresses, it is recommended to use the first address returned > in the name resolution response - regardless, whether it's IPv4 > or IPv6. Thus, the decision on the preferred IP address family > is left to the DNS operator. > > I don't understand this part. If the application sends out a query for AAAA > before A, or A before AAAA, that will make a difference that is not "left > to > the DNS operator" at all. There is currently no way to ask for A + AAAA > within > the same DNS packet, but once it does (there are efforts on their way) then > both would arrive at the same time in the same answer. > > [Authors] Could you suggest text to be added? Should it say, that only a > single record (e.g. A or AAAA) should be queried? > > ------------------ > > The encrypted portion of each PDU SHALL contain the padding > required > > I believe you mean "the cleartext to be encrypted shall be padded to ...." > ? > > [Authors] Thanks, CHANGE: " The PDU's cleartext to be encrypted SHALL be > padded to..." > > > > _______________________________________________ > ippm mailing list -- ippm@ietf.org > To unsubscribe send an email to ippm-leave@ietf.org > >
- [ippm] Paul Wouters' Discuss on draft-ietf-ippm-c… Paul Wouters via Datatracker
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… mohamed.boucadair
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… Paul Wouters
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… Ruediger.Geib
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… Paul Wouters
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… Ruediger.Geib
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… Paul Wouters