Re: Consensus Calls for Transport/TLS issues, post-Cupertino

Eric Rescorla <ekr@rtfm.com> Sun, 27 October 2019 23:02 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4752C1200B6 for <quic@ietfa.amsl.com>; Sun, 27 Oct 2019 16:02:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BUMHqnl0jiRZ for <quic@ietfa.amsl.com>; Sun, 27 Oct 2019 16:02:21 -0700 (PDT)
Received: from mail-lj1-x232.google.com (mail-lj1-x232.google.com [IPv6:2a00:1450:4864:20::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 54842120044 for <quic@ietf.org>; Sun, 27 Oct 2019 16:02:21 -0700 (PDT)
Received: by mail-lj1-x232.google.com with SMTP id s4so8396732ljj.10 for <quic@ietf.org>; Sun, 27 Oct 2019 16:02:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=oE+wBYohF1pxM3i9icoNoGWhC7Be3crCSIK598+9izw=; b=o/qLrNJwhzrfXlsLWCVAvGiab5hUS6x+UN0UuBolbDWSUYWmI0nnMr0GOEPncB5q7Z m/K+mSt6AUtJx1YfLZmUxRJ9EbHcrO9gHrjod76+018o46f5Irkke+dznEG++NwLIEI+ Mi7e8mnkX7g1BDqKYRnueSNc89sboRfRo/Psyuc5XsBkjBmmZ+xI842nOS0J/2wbE3AC OzJECNVvbw6A+sMX7x/lsAjOJJqj+UPqrCx6QUlMYJ4C+MdUdKq0Fa5j9MQgu3hmkQbj aJ2Z9nFQ/xJAdPKu0ZM09IvCRdNIR/gzWjYuCHaqhWS2KhlxR0zwdOmHK9y/rRbcUU0D PSEw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=oE+wBYohF1pxM3i9icoNoGWhC7Be3crCSIK598+9izw=; b=eL+X0kf2DSo9TvGITEgTpxDEHENjsnK8SaxeBM2dLyLOH2Db3qlaE0caOGg4quBWxB aci/qw1osQ0qJc72zwz96RkHD6KOqlPsgh40nO1L62hW9WTHLPB2GAOU3vX3l8kSY21A WL4XgrkvqKnsVF2/En6adVFmbDLU8hIaVYfiT2isZreOJmZ/sucMMzShLOmrFUJf2aNs ui3px89aFwaI21tiVM+YSOUb1mfgV/UXz8SmUu63/6UYgxcC/mhc+jcBbVnxJdq7BPgl +NIChl03RVggarWr7bkaBZmn/9wMcqjVhkirz3nCQMtGeyF2wDnmJwXCU+0cpRHXzkKd p5yg==
X-Gm-Message-State: APjAAAU+5VSieLxSVZMhyv6xy6V5twm+Bnpk+zFKgrA8xkq9jn7AMx9j Te+OxuF2HvkDdmaawJpAFO4EgfiF5UetuyZj5ozoqw==
X-Google-Smtp-Source: APXvYqzx7Eb70xgU18AtyhGFh8ZSCETzsJQllUlc788Em6wOXH6Is6VCAF7LSCOBzbFvwcIna2o8xRiI/nCTqtmljPM=
X-Received: by 2002:a05:651c:1196:: with SMTP id w22mr2588716ljo.217.1572217339464; Sun, 27 Oct 2019 16:02:19 -0700 (PDT)
MIME-Version: 1.0
References: <4D6397AF-B411-4E67-AFD2-76E8F2AD462C@mnot.net> <CANatvzwYA-NN+p5jLu4vpgKY_G-ZoUM03CacZWS2FAPyPqgiiw@mail.gmail.com> <BN3PR00MB0083E9A10A58F4CCC7B8A5C6B3680@BN3PR00MB0083.namprd00.prod.outlook.com> <22517ab5-9a6c-4486-b7ea-03badc064cbe@www.fastmail.com> <CANatvzx=RWB1Bio7tqX7nN_Vn1SfSaE69LZbuiU5pWeXP=BwNQ@mail.gmail.com> <DB6PR10MB176678E88FF226C2EB8FF78EAC680@DB6PR10MB1766.EURPRD10.PROD.OUTLOOK.COM> <CACpbDccOe01VBjwwy=mdSi5nync8bXa506OMTbLPpBH-hoj4Sw@mail.gmail.com> <CAPDSy+4S06qHBbitdH07Ah6gJYV+ZMY4huYLVGw14Q-n6isCrg@mail.gmail.com> <BN6PR2201MB17008576E4F8400B5DDB696FDA6B0@BN6PR2201MB1700.namprd22.prod.outlook.com> <CACpbDcf+n47NXh8XMEKx6n1fiJPZ+WyuivNmuBy1vKhZYZe6Uw@mail.gmail.com> <CAM4esxQYyTQPpF13v0AT4R=TcFOa9=UCn0nWsiqwMReYFOYDYg@mail.gmail.com>
In-Reply-To: <CAM4esxQYyTQPpF13v0AT4R=TcFOa9=UCn0nWsiqwMReYFOYDYg@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 27 Oct 2019 16:01:43 -0700
Message-ID: <CABcZeBM2QGC+wx-UUKMkJDqxKscOgJfhqwPhr7QXg3h-GpZwfQ@mail.gmail.com>
Subject: Re: Consensus Calls for Transport/TLS issues, post-Cupertino
To: Martin Duke <martin.h.duke@gmail.com>
Cc: Jana Iyengar <jri.ietf@gmail.com>, Mike Bishop <mbishop@evequefou.be>, David Schinazi <dschinazi.ietf@gmail.com>, Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>, IETF QUIC WG <quic@ietf.org>, Martin Thomson <mt@lowentropy.net>, Kazuho Oku <kazuhooku@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000000765f00595ec60f1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/0KCqDYweZfY93Qz2xhDzZxFhO50>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Oct 2019 23:02:25 -0000

I think we're clearly going to need to spend some time on this. I don't
think the spec is satisfactory as-is: we should be designing a transport
that works for all use cases, not just H3. That said, I also don't agree
that we need an additional explicit signal. We have one, it's called "ACK".
We should figure out how to make that work.
-Ekr


On Fri, Oct 25, 2019 at 9:36 AM Martin Duke <martin.h.duke@gmail.com> wrote:

> I agree with the dissenters. The current spec works in the HTTP3 use case,
> though I think we should fix it. Keeping keys forever is unsatisfactory for
> several reasons. We should use an explicit signal, and there is no reason
> to kick the can down the road. Let's just leave #2863 open till we resolve
> it.
>
> On Wed, Oct 23, 2019 at 7:40 PM Jana Iyengar <jri.ietf@gmail.com> wrote:
>
>> Yup. We need to get this over with in the dumbest way possible.
>>
>> On Thu, Oct 24, 2019 at 3:53 AM Mike Bishop <mbishop@evequefou.be> wrote:
>>
>>> I think we’ve amply demonstrated that implicit signals don’t work.  I’d
>>> like to see an explicit confirmation of handshake completion that happens
>>> at 1-RTT.
>>>
>>>
>>>
>>> *From:* QUIC <quic-bounces@ietf.org> *On Behalf Of * David Schinazi
>>> *Sent:* Tuesday, October 22, 2019 4:07 PM
>>> *To:* Jana Iyengar <jri.ietf@gmail.com>
>>> *Cc:* Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>; IETF QUIC WG <
>>> quic@ietf.org>; Martin Thomson <mt@lowentropy.net>; Kazuho Oku <
>>> kazuhooku@gmail.com>
>>> *Subject:* Re: Consensus Calls for Transport/TLS issues, post-Cupertino
>>>
>>>
>>>
>>> +1
>>>
>>>
>>>
>>> I think the text we have in the spec today is better than the proposal
>>> to never discard the handshake keys.
>>>
>>> My preference would be to spend the time to fix the issue, and not add a
>>> temporary workaround for now.
>>>
>>>
>>>
>>> On Tue, Oct 22, 2019 at 12:51 AM Jana Iyengar <jri.ietf@gmail.com>
>>> wrote:
>>>
>>> I agree with Kazuho here. The issue of migration was not one we had
>>> considered. I was going through this with Kazuho, and we may have
>>> identified yet another issue with handshake retransmissions and migration,
>>> which is present in the current spec.
>>>
>>>
>>>
>>> Sadly, I don't think we can call this issue done...
>>>
>>>
>>>
>>> On Tue, Oct 22, 2019 at 2:14 PM Mikkel Fahnøe Jørgensen <
>>> mikkelfj@gmail.com> wrote:
>>>
>>> Without a way to move to a single PN space I find this a deal breaker. I
>>> might do a custom version of the protocol.
>>>
>>>
>>>
>>>
>>> ------------------------------
>>>
>>> *Fra:* QUIC <quic-bounces@ietf.org> på vegne af Kazuho Oku <
>>> kazuhooku@gmail.com>
>>> *Sendt:* tirsdag, oktober 22, 2019 6:58 AM
>>> *Til:* Martin Thomson
>>> *Cc:* IETF QUIC WG
>>> *Emne:* Re: Consensus Calls for Transport/TLS issues, post-Cupertino
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> 2019年10月22日(火) 11:38 Martin Thomson <mt@lowentropy.net>:
>>>
>>> On Tue, Oct 22, 2019, at 12:39, Nick Banks wrote:
>>> >  I'd also prefer to fix the problem, even if it means bringing back
>>> > something like RETIRE_KEY.
>>>
>>> I would prefer to think of this proposed resolution as a temporary one.
>>> I don't think that we agreed to keep the handshake keys indefinitely, only
>>> that we would use that option as a fallback position until we found a
>>> better solution.
>>>
>>>
>>>
>>> I might point out that #3121 is not proposal-ready as a way to resolve
>>> #2863. That is because it does not define how to send and receive Handshake
>>> packets until or after migration happens. There would be a deadlock unless
>>> both endpoints agree on how that should be done (e.g., how to select SCID,
>>> whether the path used for Handshake packets migrates too).
>>>
>>>
>>>
>>> Without that being clarified, can we say that we are ready for a
>>> consensus call?
>>>
>>>
>>>
>>>
>>> On that basis, I think that it would be best if we open a new issue that
>>> says "Handshake keys can't ever be dropped".
>>>
>>> We might still conclude not to address that issue, but the important
>>> thing is to ensure that any solution works properly.
>>>
>>>
>>>
>>>
>>> --
>>>
>>> Kazuho Oku
>>>
>>>