Re: [quicwg/base-drafts] Repeat tokens in all Initial packets (#2089)
Martin Thomson <notifications@github.com> Sun, 02 December 2018 03:02 UTC
Return-Path: <noreply@github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3679129A87 for <quic-issues@ietfa.amsl.com>; Sat, 1 Dec 2018 19:02:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.46
X-Spam-Level:
X-Spam-Status: No, score=-9.46 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KKgxLdhhyvUa for <quic-issues@ietfa.amsl.com>; Sat, 1 Dec 2018 19:02:26 -0800 (PST)
Received: from out-1.smtp.github.com (out-1.smtp.github.com [192.30.252.192]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A96D12958B for <quic-issues@ietf.org>; Sat, 1 Dec 2018 19:02:26 -0800 (PST)
Date: Sat, 01 Dec 2018 19:02:24 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1543719744; bh=ogue7DCDHTtoB23YhR8PZK4pG2FBUoQHAN+8W70Vmhk=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=ClhyBHnDpTbymQyFlT5iJXEGNhNWVt5NUovIPUoZ7vhOYdUWPLGvWeA6H6P7nOvvP WDZFFcj9Z/FESWWicU0cFwpVnqo1Jwc0cOA9ATKxwAZwnQyVW4PK9oxTSNxP2iigDg PtXozP3egdFiO2yqfVCd4BgE1jjabASv13Dtn0YQ=
From: Martin Thomson <notifications@github.com>
Reply-To: quicwg/base-drafts <reply+0166e4ab1df9dd5156e925c59a57d597bd543a492b29ee1092cf00000001181b0d4092a169ce17097d1f@reply.github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <quicwg/base-drafts/pull/2089/review/180545823@github.com>
In-Reply-To: <quicwg/base-drafts/pull/2089@github.com>
References: <quicwg/base-drafts/pull/2089@github.com>
Subject: Re: [quicwg/base-drafts] Repeat tokens in all Initial packets (#2089)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5c034b40eae1_6ee93fa95c0d45b85139b0"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: martinthomson
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/LG9t4fvMwRSjca6J0I7yb4Pkprk>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Dec 2018 03:02:29 -0000
martinthomson commented on this pull request. This is fine, pending the small suggested tweaks. Though we need to settle on "reject" vs. "discard" to close this one. > Upon receiving the client's Initial packet, the server can request address validation by sending a Retry packet ({{packet-retry}}) containing a token. This -token is repeated by the client in an Initial packet after it receives the Retry -packet. In response to receiving a token in an Initial packet, a server can -either abort the connection or permit it to proceed. +token is repeated by the client in all Initial packets after it receives the ```suggestion token MUST be repeated by the client in all Initial packets it sends after it receives the ``` > Upon receiving the client's Initial packet, the server can request address validation by sending a Retry packet ({{packet-retry}}) containing a token. This -token is repeated by the client in an Initial packet after it receives the Retry -packet. In response to receiving a token in an Initial packet, a server can -either abort the connection or permit it to proceed. +token is repeated by the client in all Initial packets after it receives the +Retry packet. In response to receiving a token in an Initial packet, a server +can either abort the connection or permit it to proceed. + +As long as it is not possible for an attacker to generate a valid token for +its own address (see {{token-integrity}}) and the client is able to return +that token, it proves to the server that it received the token. It only proves that it received it, not when. I think that we can probably defer discussion of the reuse/replay aspects of this. > @@ -1590,9 +1588,11 @@ amount of data to a client in response to 0-RTT data. The server uses the NEW_TOKEN frame {{frame-new-token}} to provide the client with an address validation token that can be used to validate future -connections. The client may then use this token to validate future connections -by including it in the Initial packet's header. The client MUST NOT use the -token provided in a Retry for future connections. +connections. The client includes this token in Initial packets to provide +address validation in a future connection. The client MUST include the +token in all Initial packets it sends, unless a Retry replaces the token +with a newer token. The client MUST NOT use the token provided in a Retry +for future connections. Is the desired action "reject" or "ignore/discard"? I would say either is OK, though I might be inclined more toward the latter (on the basis that spoofing implies DoS). > @@ -1614,17 +1614,19 @@ token was issued and any connection where it is used. Clients that want to break continuity of identity with a server MAY discard tokens provided using the NEW_TOKEN frame. Tokens obtained in Retry packets MUST NOT be discarded. -A client SHOULD NOT reuse a token. Reusing a token allows connections to be -linked by entities on the network path (see {{migration-linkability}}). A -client MUST NOT reuse a token if it believes that its point of network -attachment has changed since the token was last used; that is, if there is a -change in its local IP address or network interface. A client needs to start -the connection process over if it migrates prior to completing the handshake. +A client SHOULD NOT reuse a token in different connections. Reusing a token +allows connections to be linked by entities on the network path +(see {{migration-linkability}}). A client MUST NOT reuse a token if it +believes that its point of network attachment has changed since the token was +last used; that is, if there is a change in its local IP address or network +interface. A client needs to start the connection process over if it migrates +prior to completing the handshake. @huitema has it right here. We are adding text in #2064 that should help. > When a server receives an Initial packet with an address validation token, it -SHOULD attempt to validate it. If the token is invalid then the server SHOULD -proceed as if the client did not have a validated address, including potentially -sending a Retry. If the validation succeeds, the server SHOULD then allow the +SHOULD attempt to validate it, unless it has already completed address +validation. If the token is invalid then the server SHOULD proceed as if +the client did not have a validated address, including potentially sending +a Retry. If the validation succeeds, the server SHOULD then allow the handshake to proceed. #2064. -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/quicwg/base-drafts/pull/2089#pullrequestreview-180545823
- [quicwg/base-drafts] Repeat tokens in all Initial… ianswett
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… MikkelFJ
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… Christian Huitema
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… Martin Thomson
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… Christian Huitema
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… ianswett
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… ianswett
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… ianswett
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… Mike Bishop
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… MikkelFJ
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… ianswett
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… ianswett
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… ianswett
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… MikkelFJ
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… Martin Thomson
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… Martin Thomson
- Re: [quicwg/base-drafts] Repeat tokens in all Ini… ianswett