Re: [Masque] Proposed draft charter

Mirja Kuehlewind <mirja.kuehlewind@ericsson.com> Mon, 27 January 2020 14:34 UTC

Return-Path: <mirja.kuehlewind@ericsson.com>
X-Original-To: masque@ietfa.amsl.com
Delivered-To: masque@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EAF612008D for <masque@ietfa.amsl.com>; Mon, 27 Jan 2020 06:34:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K7C4FA6P4lNe for <masque@ietfa.amsl.com>; Mon, 27 Jan 2020 06:34:13 -0800 (PST)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30088.outbound.protection.outlook.com [40.107.3.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3493A12004E for <masque@ietf.org>; Mon, 27 Jan 2020 06:34:13 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MIa03Z6OHy01UiAZtWtUWeC6xTTlWzxqRCHKE0nbfFbVOwfjtpf6EGokW21WbcRc1jMbGabfanI3/t+A5ONLV6rku1wKe5rkUVs02wCAncMIcY4yfFVsKGick0kpwZ5nrny43alrsF56ZW8PtrBWQawlsvnaq/RwW7q28BjWZyZSx1XNPoZmrBnGkFdkvEw7wX0I2b/lN08fkz7PHLLmDZ9kJT3ABRRQgMbvTBlKuXkpXihV6ZeTjxsgexU/we4nUTBB72DcrpJ89lctJStMxvB7euIGWXPq34lO6VORK+k8baWjXF/t5G6l4F4YGs36+vIdG0hQvr4yOYr4GM3l6Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=c7SBmbJFHHKjYBGsTJMITdGHoUTz/8Rvbd+S+wf/qvc=; b=Bt5TxodI4QYTicTF/mphyR4lpOcFmyNT/Yg8iurOSFfZz2ju0RcrBcm1jV66vYsDfsenhDvhKeSdgGSi1si6hx1SbWK+8FXhvIA73bEd1sAVCuEWzQX0ZlBV4hBayntQKJXr06Gz2HrvpvENtTrv8R7nJ8kd2ij6S5Md4VG5mJZKP3Ek1PQoWaHwmzqtmgp5qhmmOK14udz2/HRBAlInDyz9RhFMvj46v9S1K2E3cjW9oeISwQoHjiHN24BIoJ5Lmk+tCwDow+h/F47Gwkwp25hH5crAo+y2tqEBM1BP+PI8VERS1NPFRyRyAgdnVyTcSInJwPYWA8SXwakwPmlTbA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=c7SBmbJFHHKjYBGsTJMITdGHoUTz/8Rvbd+S+wf/qvc=; b=tUawMLNrxB/cmmzpIVS/As0xZd5RdoOgc6xVMrvSzI7dMG4EIrLtbMYLUP7CbztL04VWJMb6Jq9hIsLOp9Xk2MD7GGehH7J4X/4vjim+p2Pdu1AZBTdxc7zOX7kIBgi6wb7EleLVlbk6oFsxSnBqVhT7tcEj50FAIUzwGd0f95k=
Received: from AM0PR07MB4691.eurprd07.prod.outlook.com (52.135.149.158) by AM0PR07MB6049.eurprd07.prod.outlook.com (20.178.115.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.18; Mon, 27 Jan 2020 14:34:11 +0000
Received: from AM0PR07MB4691.eurprd07.prod.outlook.com ([fe80::4879:46ae:16e:f5b7]) by AM0PR07MB4691.eurprd07.prod.outlook.com ([fe80::4879:46ae:16e:f5b7%7]) with mapi id 15.20.2686.019; Mon, 27 Jan 2020 14:34:11 +0000
From: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
To: Lars Eggert <lars@eggert.org>
CC: "masque@ietf.org" <masque@ietf.org>
Thread-Topic: [Masque] Proposed draft charter
Thread-Index: AQHV0w4aBWkpAZDWB0m+dMAczIB7OKf+HuIAgABtuAD///iXgIAAIyMA
Date: Mon, 27 Jan 2020 14:34:10 +0000
Message-ID: <17638BD9-3EA7-4026-A543-130281CB3978@ericsson.com>
References: <845946C2-EB98-4F3A-966E-968AE349302C@ericsson.com> <B5A0CBC5-6127-4F47-B1CC-2BFF4934EA62@eggert.org> <0E417F05-7EB0-42DE-B120-51873E9F464C@ericsson.com> <CC941298-36BC-4C97-AB3D-5993A3F2FB73@eggert.org>
In-Reply-To: <CC941298-36BC-4C97-AB3D-5993A3F2FB73@eggert.org>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=mirja.kuehlewind@ericsson.com;
x-originating-ip: [2001:16b8:24af:8600:61cf:3cfd:ed55:942e]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 37438775-6a3e-48ca-374e-08d7a335f97c
x-ms-traffictypediagnostic: AM0PR07MB6049:
x-microsoft-antispam-prvs: <AM0PR07MB60497812A97AE31B20E82444F40B0@AM0PR07MB6049.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02951C14DC
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(396003)(346002)(136003)(366004)(376002)(199004)(189003)(8676002)(5660300002)(81166006)(81156014)(91956017)(76116006)(6916009)(86362001)(66946007)(64756008)(44832011)(316002)(66446008)(66556008)(66476007)(4326008)(36756003)(478600001)(4001150100001)(2906002)(2616005)(186003)(53546011)(6506007)(966005)(71200400001)(8936002)(33656002)(6512007)(6486002); DIR:OUT; SFP:1101; SCL:1; SRVR:AM0PR07MB6049; H:AM0PR07MB4691.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: qN9u191R49bhL41mwjYr9U2cqPYnjclPFy6OWoOvQrDuClmVrpputzHp6ZU0A1+2lCw6fbuH8y2HYwx6l6waCto/srNB6uQ/qBnO64vusuWVizbBqyhOba+cmKYf05CWr77gYfHI3oPm4fedGKrt6A6R/MSchQISs9fho1aZ8O2u+Xdjwo6AyCoe/v9P4++/V72uFt3BvuwORPp5OVFxPtmnHhiyWJhKGSRgsMFXrh7tzUpq+rYO5NUKj/qxuNl5C6P9eOXG81J9OwQuotQNTUST58KOz586D05YY0mp1QfAvoL6ZrL0uE6UIlA1qOGobUqZik5w0OEtI/UelOeq7rCQ3vQAW1gUTvl+xN6f636FBsjh+AEOZpKAHVbjPQu1r33hiUrSmZMN+Vo2o+WtSCr62wCxTGQD1H5BTL3i/W9Wo5BDk1RsC18Rjtlxn20erC6tMdjIrKvYyjALq1yLAoK12ThVuZcewy3rmUD5ImJ29uYv8uc36ZMPOQ4iPHKpjcL4r8ND5j/vpFh8QZncIw==
x-ms-exchange-antispam-messagedata: 3hqmG8OoRPDilmSbr/YQc/3pqAQmW52b9/CZ9MAgtEwMXqY/liJ3tJLCo1G1k+lI0//xUa4zxhI5AQMaHfdCjMbfVBbRqL1VYLZiyRMbkRwwbay7ctWmcClD9I62w8AZK9nXWpFBLpzd59NNn2H+rPTZuSC8/YpwIhwKV2Wg+y7VpXbRXEK/9rnMaXnQSB/drfgOWlap854LcsBtYlFZyg==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <89E9805413ED584D86598F238752FD6C@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 37438775-6a3e-48ca-374e-08d7a335f97c
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Jan 2020 14:34:10.9906 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8AIni2mmrUhSI7LFT4r6R0tMl9WlrFy/woI5jyxk3VOfnJXhrFVFI5Y6I1CMdX5tO7H+UCkfKzAEqi7ONt9m7IehExHlhlJ/TF6o3USzs/w=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR07MB6049
Archived-At: <https://mailarchive.ietf.org/arch/msg/masque/cCApUQROtbVFpW0eYP4BnTQhLtQ>
Subject: Re: [Masque] Proposed draft charter
X-BeenThere: masque@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiplexed Application Substrate over QUIC Encryption <masque.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/masque>, <mailto:masque-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/masque/>
List-Post: <mailto:masque@ietf.org>
List-Help: <mailto:masque-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/masque>, <mailto:masque-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jan 2020 14:34:17 -0000

Hi Lars,

see inline.

On 27.01.20, 14:28, "Lars Eggert" <lars@eggert.org> wrote:

    Hi,
    
    On 2020-1-27, at 14:54, Mirja Kuehlewind <mirja.kuehlewind=40ericsson.com@dmarc.ietf.org> wrote:
    > [MK] The focus of this new group will be a signaling protocol on top of QUIC in order to communicate with the proxy and instruct the proxy to tunnel and forward other (unaltered) traffic that may or may not use QUIC as the end-to-end transport protocol. I think any new protocols that "just" uses QUIC as a transport should be in a separate group.
    
    I agree with that basic approach (that apps that just want to run on vanilla QUIC can be in their own WGs.)
    
    I don't think that this is the case here, however. (Or I am misunderstanding the proposal, which is not unlikely...)
    
    > Of course there might a closer dependency on QUIC features for this proposed work than for other application protocols, however, having the specification of a completely new protocol for proxy signaling in the QUIC group would be a very high load. As Magnus says this work is probably more link SOCKS or TURN, depending how you look at it...
    
    It might be helpful to see an initial solution candidate, so that complexity could be assessed.

[MK] Two candidates for the base signaling protocol are:
https://datatracker.ietf.org/doc/draft-schinazi-masque/
https://datatracker.ietf.org/doc/draft-piraux-quic-tunnel/
    
    > [MK] So there will be no data send unencrypted. The questions is only if there are ways to remove one layer of encryption if there are two. I think we could/should actually further clarify this point in the charter.
    
    And this is why I don't think this is just an application using QUIC. Because the intend seems to be to change the security model of QUIC.
    
    There is a client, a proxy, and a server in your scenario. "No data is send unencrypted" does not necessarily mean that the data is end-to-end encrypted between the client and server.
    
    In the double-encryption case, you'd have one TLS session between the client and the proxy, and another one between the client and the server, right? Which one would be eliminated to avoid the double encryption?

[MK] Only the outer client to proxy connection would be "eliminated".

[MK] I could see future work on QUIC where there are three TLS connections - client to proxy, client to server, as well as proxy to server. In this case I could imagine a quic variant where the inner quic still supports end-to-end encryption for any user data and at the same time enables closer interaction with a trusted proxy for transport optimization. However, I agree that such an approach should probably be done within the QUIC group (and then just be only used by a MASQUE setup). We can make that more clear in the charter (but need to figure out how to phrase that correctly).

Would clients need to ship with unencrypted QUIC stacks and need to trust that their proxy throws on the crypto for them?

[MK] As I just said for the current charter I think that should be excluded and we can find a way to make that clear.
    
    > [MK] So far we don't have a fully fleshed proposal but people working on this charter believe that there are use cases where double-encryption could be a strong performance impact and we should discuss while doing this work if there is way also support a mode where double-encryption is avoided or at least performance impact are reduced.
    
    The performance impact at a (double-encrypting) proxy is exactly what it is for a QUIC endpoint, which at the moment depends on how good your AES routines are, and in the future may well become close to zero (when crypto offload becomes available). We're at the moment seeing measurements of ~5Gb/s/core from several different QUIC stacks, so 20 cores (= 1 CPU) give you 100G, which seems OK to me.

[MK] There are two impacts: processing power and per packet overhead. We did a very quick test with multiple layer of TLS (on top of one TCP connection) and saw a significant decrease. Of course as you said this will get better but the overhead could also be reduce by some form of compression, however, if there is a good way to reduce this even more or get rid of it completely, this could still be very import for various use cases, especially when the client is on a mobile device (to increasebattery life).
    
    > I see this rather as a requirement at the moment and a final decision if and where to do it depend on the proposed approach. Maybe that is also something to clarify in the charter.
    
    To me, this is one of the key questions. I'm opposed to doing any variant of QUIC in the IETF that doesn't have end-to-end encryption. Whether this is in scope or not IMO needs to be clarified now rather than later.

[MK] Yes and okay.

    
    Thanks,
    Lars