Re: [Lwip] [T2TRG] QUIC on IoT boards

Eliot Lear <lear@cisco.com> Mon, 20 January 2020 17:00 UTC

Return-Path: <lear@cisco.com>
X-Original-To: lwip@ietfa.amsl.com
Delivered-To: lwip@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA84A120937 for <lwip@ietfa.amsl.com>; Mon, 20 Jan 2020 09:00:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -12.502
X-Spam-Level:
X-Spam-Status: No, score=-12.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HK_SCAM=1.999, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xsql7F8UtOOa for <lwip@ietfa.amsl.com>; Mon, 20 Jan 2020 09:00:29 -0800 (PST)
Received: from aer-iport-4.cisco.com (aer-iport-4.cisco.com [173.38.203.54]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 314C21200A1 for <lwip@ietf.org>; Mon, 20 Jan 2020 09:00:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11724; q=dns/txt; s=iport; t=1579539629; x=1580749229; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=cCXrN348qgqXAbh3UIpLsY1ednEDRR3FHp1I34+0XPI=; b=YEvsFaAIh+q5W2L7Q8k8YRh3vXItLa/Gti0rE2+uF7DqLvq3nu5+G9Hw MKEhnwoTOodOY/u5F0HZYT3wsSxmVUROfJyd7XbAdPUrjL15oUUAlMy8j FEfA7Hf9NB/l8TCOSGU2GcsYAYPihW3UDqUT4f0psEDTelEKJAkVXY7kQ o=;
X-Files: signature.asc : 488
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AZAABV2yVe/xbLJq1lGgEBAQEBAQEBAQMBAQEBEQEBAQICAQEBAYFqAgEBAQELAYF8LGxQBSASKoQSiQOIIYEBkiuGJIFnAgcBAQEJAwEBJQoBAYRAAoIzNwYOAgMNAQEEAQEBAgEFBG2FCwYmDIVeAQEBAQIBI1YFCwsYKgICVwYTFIMSAYJbIA+rRHWBMoQ1AYEUhF4KBoE4AYFSiluCAIERJyCBTkk1PoJkAQKBJiaDJjKCLASNcolAmCCCQ4JJgRyDWI50G5p3lz+OeIMtAgQGBQIVgWgjKg2BITMaCBsVZQGCQT4SGA1WhA6ERAEMgj+KVEADMAKNcgEB
X-IronPort-AV: E=Sophos;i="5.70,342,1574121600"; d="asc'?scan'208,217";a="22270281"
Received: from aer-iport-nat.cisco.com (HELO aer-core-3.cisco.com) ([173.38.203.22]) by aer-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 20 Jan 2020 17:00:27 +0000
Received: from dhcp-10-61-103-205.cisco.com (dhcp-10-61-103-205.cisco.com [10.61.103.205]) by aer-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id 00KH0Pho017141 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 20 Jan 2020 17:00:26 GMT
From: Eliot Lear <lear@cisco.com>
Message-Id: <C210C02A-B6E3-46E4-A3FC-6534490783B5@cisco.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_092C72A0-1CF3-46BE-97A7-907A73A41C5C"; protocol="application/pgp-signature"; micalg="pgp-sha256"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
Date: Mon, 20 Jan 2020 18:00:25 +0100
In-Reply-To: <247FD52A-D90D-498E-AD79-9DADA8653EB2@eggert.org>
Cc: Василий Долматов <vdolmatov@gmail.com>, "t2trg@irtf.org" <t2trg@irtf.org>, Dave Oran <daveoran@orandom.net>, "lwip@ietf.org" <lwip@ietf.org>
To: Lars Eggert <lars@eggert.org>
References: <6CB4D459-4AAA-4313-B95C-05DF22C9A9DD@eggert.org> <E7C38177-DD0B-4D92-AE0E-EB457691E493@cisco.com> <6B9FFEF5-CDC9-4703-BB10-616DBEDE80AB@gmail.com> <4528ED27-E3B6-43C4-99A5-715DE1B79A09@cisco.com> <247FD52A-D90D-498E-AD79-9DADA8653EB2@eggert.org>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
X-Outbound-SMTP-Client: 10.61.103.205, dhcp-10-61-103-205.cisco.com
X-Outbound-Node: aer-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lwip/q8zNIF4P3QQ19NpKHatt_BKbID4>
Subject: Re: [Lwip] [T2TRG] QUIC on IoT boards
X-BeenThere: lwip@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Lightweight IP stack. Official mailing list for IETF LWIG Working Group." <lwip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lwip>, <mailto:lwip-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lwip/>
List-Post: <mailto:lwip@ietf.org>
List-Help: <mailto:lwip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lwip>, <mailto:lwip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Jan 2020 17:00:43 -0000

Hi Lars,

> On 20 Jan 2020, at 16:08, Lars Eggert <lars@eggert.org> wrote:
> 
> Hi,
> 
> On 2020-1-20, at 16:52, Eliot Lear <lear@cisco.com> wrote:
>> 	• I only want that device speaking protocols it was designed to speak.
>> 
>> It’s that last one that has me worried from a long term perspective with QUIC.
> 
> I don't quite follow. Surely if someone ships an IoT device that uses QUIC for communication, that *is* a device "designed to speak" QUIC?

QUIC is the substrate.  It’s the applications atop that really are at issue.
> 
>> If the stack hides means to determine directionality, as it does, and applications, as it does, we should take a pause to determine how we would detect whether it has services running on it that aren’t intended, as has happened all too often.[1]. These are use cases that QUIC was not designed to address.
> 
> So [1] is a case where the firmware web server had an embarrassing bug - it's not an example where someone hacked in and ran another service in addition to (or instead of) the manufacturer one. So that's not a fitting example for the point you are trying to raise.

Yes it is.  It’s a misconfiguration that could easily be blocked with the existing TCP model, and it was in a great many environments.  With QUIC, spotting these sorts of misconfigurations may prove more difficult.  Not impossible, mind you.

> 
> We can certainly debate whether more encryption and/or obfuscation makes network-based threat detection harder or not. It might even be the case that there are wrinkles in the IoT space that aren't there in the broader web space, in terms of appropriateness or trade-offs. But in general, I think this issue is a general one, and not IoT-specific.

Let’s agree that IoT is a pretty big category.  I gave you two very specific examples of where TLS 1.3 itself is more of a hindrance than a help because of the nature of the system in play.  Those examples comprise a common case for IoT.  I would never say the same thing about browser based communications.  Because IoT is such a big category, there may be cases where privacy issues either conflict with or will overtake other concerns.

Let me give you a good example of conflict:

Dad wants to know what information daughter’s Internet toy is exfiltrating and to whom.  Does the toy have a camera or a microphone that wasn’t advertised in the documentation, as happened with one particular device[1]?  On the other hand, dad would very much like whatever information is being shared to only be shared with authorized parties.

Want more conflict?  Let’s assume that the CPAP machine I described above uses my local wifi and something goes wrong, and the patient dies.  The next of kin want the data, but the CPAP service owner refuses.  In fact, the CPAP service owner even refuses to describe what data is being collected.  On the other hand, a patient would very much like whatever information is being shared to only be shared with authorized parties (2nd verse, same as the first).

Now… some of this is encryption and some of this is transport, but the QUIC and H3 have intentionally intertwined the two to attempt to reduce middle box interference.  That very interference is what a great many IoT deployments need.

> 
>> On the other hand, we do want the IoT community to leverage the best that the Web community has delivered, if and when it is appropriate, and even when the whole package is not, it is best that they adopt the components that are, so that they don’t end up having to repeat old mistakes.
> 
> Exactly. Given the ever increasing amount of engineering cycles that are being poured into QUIC, the IoT community should absolutely try to leverage that to the max, where it can.

But the community also requires guidance to understand where it is appropriate, and quite frankly I don’t think we know that yet.

Eliot

[1] https://edition.cnn.com/2019/02/20/tech/google-nest-microphone-secret/index.html