Re: A question about user tracking with QUIC

Stephane Bortzmeyer <bortzmeyer@nic.fr> Mon, 07 June 2021 12:58 UTC

Return-Path: <stephane@sources.org>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D0793A14F4 for <quic@ietfa.amsl.com>; Mon, 7 Jun 2021 05:58:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.65
X-Spam-Level:
X-Spam-Status: No, score=-1.65 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vxldbZYn5FYt for <quic@ietfa.amsl.com>; Mon, 7 Jun 2021 05:58:12 -0700 (PDT)
Received: from ayla.bortzmeyer.org (ayla.bortzmeyer.org [92.243.4.211]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99A353A14EB for <quic@ietf.org>; Mon, 7 Jun 2021 05:58:12 -0700 (PDT)
Received: by ayla.bortzmeyer.org (Postfix, from userid 10) id 2A66CA0278; Mon, 7 Jun 2021 14:58:07 +0200 (CEST)
Received: by mail.sources.org (Postfix, from userid 1000) id A9CA5190B87; Mon, 7 Jun 2021 14:55:54 +0200 (CEST)
Date: Mon, 07 Jun 2021 14:55:54 +0200
From: Stephane Bortzmeyer <bortzmeyer@nic.fr>
To: Robin MARX <robin.marx@uhasselt.be>
Cc: Stephane Bortzmeyer <bortzmeyer@nic.fr>, IETF QUIC WG <quic@ietf.org>
Subject: Re: A question about user tracking with QUIC
Message-ID: <20210607125554.GA27518@sources.org>
References: <20210607123854.GA16312@nic.fr> <CAC7UV9bkqOeCgDsCH+Hdq0v=zmRKNNDtpfiq6Ap_vzm5zUzGVg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CAC7UV9bkqOeCgDsCH+Hdq0v=zmRKNNDtpfiq6Ap_vzm5zUzGVg@mail.gmail.com>
X-Transport: UUCP rules
X-Operating-System: Debian GNU/Linux 10.9
X-Charlie: Je suis Charlie
User-Agent: Mutt/1.10.1 (2018-07-13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/0MCw3RlAvaA-6GBmQqxNA_4vMmg>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Jun 2021 12:58:17 -0000

On Mon, Jun 07, 2021 at 02:46:32PM +0200,
 Robin MARX <robin.marx@uhasselt.be> wrote 
 a message of 127 lines which said:

> Could you give more (technical) details why you feel long-lived QUIC
> connections can allow user tracking, and specifically in the IP-switching
> case?
> 
> For an on-path attacker observing encrypted QUIC

Indeed, I forgot an important thing: tracking BY THE SERVER
(obviously, QUIC protects against an observer).

> For an attacker with access to the decrypted payloads, I'm not sure how
> QUIC differs from TCP or H3 differs from H2 in your view?

TCP and H2 do not survive IP address change. And I suspect that
long-term connections might be more common with QUIC.