[quicwg/base-drafts] Short header reserved bits: make available for unilateral experimentation (#2022)

Igor Lubashev <notifications@github.com> Tue, 20 November 2018 02:02 UTC

Return-Path: <noreply@github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47EEC12D4F1 for <quic-issues@ietfa.amsl.com>; Mon, 19 Nov 2018 18:02:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.47
X-Spam-Level:
X-Spam-Status: No, score=-8.47 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.47, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KE7zM6TJbfEo for <quic-issues@ietfa.amsl.com>; Mon, 19 Nov 2018 18:02:53 -0800 (PST)
Received: from out-5.smtp.github.com (out-5.smtp.github.com [192.30.252.196]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2198127333 for <quic-issues@ietf.org>; Mon, 19 Nov 2018 18:02:53 -0800 (PST)
Date: Mon, 19 Nov 2018 18:02:52 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1542679372; bh=5oUUdMaZCcGrz2wuyFJDRwZ/47OuYMikBZgkG+5OUFM=; h=Date:From:Reply-To:To:Cc:Subject:List-ID:List-Archive:List-Post: List-Unsubscribe:From; b=1vhCjzJFUrc/uHVyYx1W5AwyMxR5YlnY//bixd4DHO8I3k+4Y/IaGyptBGfDFhhEl idfV6PRT/GK+F7Ztu4Xud6YmZ49472SzRYc92sztayWTJQ/BnzMqakUBO075c1I5kx sbr0xvXmHqEL5z9iISHUJy+0MiJJDT05jw1zccnQ=
From: Igor Lubashev <notifications@github.com>
Reply-To: quicwg/base-drafts <reply+0166e4ab2afae27cac8f167c3821f26270905f8d5322e3f592cf00000001180b2d4c92a169ce16cbfdb7@reply.github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <quicwg/base-drafts/issues/2022@github.com>
Subject: [quicwg/base-drafts] Short header reserved bits: make available for unilateral experimentation (#2022)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5bf36b4c942bf_31093fe509cd45b4638851"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: igorlord
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/_iG5c4R8MdIbUbgNVcpBV12YFh8>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Nov 2018 02:02:56 -0000

(Moving a discussion about this issue from https://github.com/quicwg/base-drafts/pull/2006#discussion_r234690190)

Presently, the two Reserved bits in the short header must be 0 (after removing header protection), unless both client and server agree to use them for a specific purpose.  Unilateral experimentation by the sender using these bits is intentionally disallowed.

The suggestion is to allow these reserved bits to be set at will by the sender and be AEAD protected but not masked during header protection -- just like the latency spin bit. If not in-use for a specific purpose by the sender, the bits should be randomized for greasing.

This way, the sender can use these bits in unilateral experiments (VEC, Loss bit, etc), and the middleboxes will be able to observe but not modify the bits.

There is concern that some experiment may inadvertently compromise connection privacy. Senders should be careful not to leak private information in anything they send, including IP ID fields / IPv6 Flow Labels, TTL/HopLimit fields, DS/ECN fields, packet size choices, packet timings, congestion avoidance behaviors, as well we these two Reserved short header bits.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/quicwg/base-drafts/issues/2022