[Pearg] Measuring latency in IP privacy architectures

Tommy Pauly <tpauly@apple.com> Wed, 10 November 2021 13:10 UTC

Return-Path: <tpauly@apple.com>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D3A53A0FAF for <pearg@ietfa.amsl.com>; Wed, 10 Nov 2021 05:10:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZpVzcF_O7Sja for <pearg@ietfa.amsl.com>; Wed, 10 Nov 2021 05:10:55 -0800 (PST)
Received: from rn-mailsvcp-ppex-lapp44.apple.com (rn-mailsvcp-ppex-lapp44.rno.apple.com [17.179.253.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 481CB3A0EFB for <pearg@irtf.org>; Wed, 10 Nov 2021 05:10:55 -0800 (PST)
Received: from pps.filterd (rn-mailsvcp-ppex-lapp44.rno.apple.com [127.0.0.1]) by rn-mailsvcp-ppex-lapp44.rno.apple.com (8.16.1.2/8.16.1.2) with SMTP id 1AAD4NbG001229; Wed, 10 Nov 2021 05:10:50 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : content-type : mime-version : subject : message-id : date : to; s=20180706; bh=Ir+vu5kCSVQYobd7LRwBf6xPodaNc7/g1KfVacEUTNY=; b=KaSfDRIQkqKtIyaeMjlZFGWEPN6cGdMqq2U6dX5YLY3AQW49cCy3gaiVjWVxV69+u2Wi PUF9MGsr+0aZrQkwUaM5vQ6PtBu+rMrzzHFZfXK89aqNakgWOXWXGv8y6RseCRFT8y87 PH57Ezrv6JIvnHwNFVeas7kfhJ0lI0jtxZY3jXDfhYutWcyxnWPut5P6+9onT5Df/+6e H2wtwdRgH39k31fmQdoo9CjwCgh4q9hoTxhZTzaPpHt3ImEizJln2RHdbR5QYbyfvNsr pkDiyoerUWhcfZY++jnfIGDlOJwNVxwoLRnlv7JbUeEhWjoPCT5hUG5UtLirxrt4a71x Fg==
Received: from rn-mailsvcp-mta-lapp02.rno.apple.com (rn-mailsvcp-mta-lapp02.rno.apple.com [10.225.203.150]) by rn-mailsvcp-ppex-lapp44.rno.apple.com with ESMTP id 3c7hdn0ng2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Wed, 10 Nov 2021 05:10:50 -0800
Received: from rn-mailsvcp-mmp-lapp02.rno.apple.com (rn-mailsvcp-mmp-lapp02.rno.apple.com [17.179.253.15]) by rn-mailsvcp-mta-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.12.20210903 64bit (built Sep 3 2021)) with ESMTPS id <0R2C00RZNXY1KDD0@rn-mailsvcp-mta-lapp02.rno.apple.com>; Wed, 10 Nov 2021 05:10:49 -0800 (PST)
Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp02.rno.apple.com by rn-mailsvcp-mmp-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.12.20210903 64bit (built Sep 3 2021)) id <0R2C00D00X8UFO00@rn-mailsvcp-mmp-lapp02.rno.apple.com>; Wed, 10 Nov 2021 05:10:49 -0800 (PST)
X-Va-A:
X-Va-T-CD: f581b3bf15296980c8de71c3e0f3c7f6
X-Va-E-CD: a74a5d6400b49931d55494a656fbfdfd
X-Va-R-CD: 6fc2ad2725cc996cb7fe19536e9b52f6
X-Va-CD: 0
X-Va-ID: 7866c13f-fb36-4bcd-8fcc-e4fe9348e22b
X-V-A:
X-V-T-CD: f581b3bf15296980c8de71c3e0f3c7f6
X-V-E-CD: a74a5d6400b49931d55494a656fbfdfd
X-V-R-CD: 6fc2ad2725cc996cb7fe19536e9b52f6
X-V-CD: 0
X-V-ID: 38a15c04-b027-4941-989c-232d6c67dbb2
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.425, 18.0.790 definitions=2021-11-10_04:2021-11-08, 2021-11-10 signatures=0
Received: from smtpclient.apple (unknown [17.11.19.52]) by rn-mailsvcp-mmp-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.12.20210903 64bit (built Sep 3 2021)) with ESMTPSA id <0R2C00UFVXY15U00@rn-mailsvcp-mmp-lapp02.rno.apple.com>; Wed, 10 Nov 2021 05:10:49 -0800 (PST)
From: Tommy Pauly <tpauly@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_F6731F54-CF82-483E-BD1D-29E0200B065A"
MIME-version: 1.0 (Mac OS X Mail 15.0 \(3691.0.3\))
Message-id: <036D2F47-3479-457A-AE30-9C117D75D8FB@apple.com>
Date: Wed, 10 Nov 2021 05:10:49 -0800
To: pearg@irtf.org, Antoine FRESSANCOURT <antoine.fressancourt@huawei.com>
X-Mailer: Apple Mail (2.3691.0.3)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.425, 18.0.790 definitions=2021-11-10_04:2021-11-08, 2021-11-10 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/CGv3zRrRdks7oyr4edM4srYGjaw>
Subject: [Pearg] Measuring latency in IP privacy architectures
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Nov 2021 13:11:00 -0000

Hello,

I was looking at the slides for one of the PEARG talks for tomorrow, and had some questions about one of the graphs. (I likely won’t be able to attend the meeting due to a conflict, so I thought I’d ask here!).

https://datatracker.ietf.org/meeting/112/materials/slides-112-pearg-state-of-the-art-on-privacy-preserving-techniques-used-at-the-network-layer-00 <https://datatracker.ietf.org/meeting/112/materials/slides-112-pearg-state-of-the-art-on-privacy-preserving-techniques-used-at-the-network-layer-00>

There’s a slide titled “Positioning SoA projects on a map”, with two axes—“attack class” and “latency”. While the “class” is a relatively subjective measurement, the latency metric should be pretty straightforward. I assume that the latency axis goes from lowest-latency on the left, and highest-latency on the right. There weren’t any numbers provided, but I was very surprised to see that both Gnatcatcher and iCloud Private Relay were listed further to the right than TOR! In the case of iCloud Private Relay, which I work on, our overall metrics show that the average page load time for the browser going through the relays is actually faster than going direct for most parts of world. To that end, our effective latency is quite good. Can anyone share insight into what the methodology was behind this graph?

More generally, if we’re discussing latency for IP privacy solutions, it would be good to agree on what methodology is appropriate across very different technologies. IP-tunnelling can end up requiring more round trips for typical workflows (due to DNS and TCP handshakes over the tunnel) than CONNECT-style proxying (which can end up doing DNS+TCP+TLS in one round trip). That changes the experience of latency, in addition to the actual round-trip-time between hops.

Best,
Tommy