Re: Questions about Version Negotiation Concerning Possible Handshake Interruption

Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com> Fri, 09 February 2018 11:56 UTC

Return-Path: <mikkelfj@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79B4F126E01 for <quic@ietfa.amsl.com>; Fri, 9 Feb 2018 03:56:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level:
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CtO0z37ThHws for <quic@ietfa.amsl.com>; Fri, 9 Feb 2018 03:56:53 -0800 (PST)
Received: from mail-it0-x233.google.com (mail-it0-x233.google.com [IPv6:2607:f8b0:4001:c0b::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D1362126BF0 for <quic@ietf.org>; Fri, 9 Feb 2018 03:56:52 -0800 (PST)
Received: by mail-it0-x233.google.com with SMTP id i144so10608299ita.3 for <quic@ietf.org>; Fri, 09 Feb 2018 03:56:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:in-reply-to:references:mime-version:date:message-id:subject:to :cc; bh=MAdaVyCKitDHPoyYLEm9O8RZ53uml4zTEJEDfA4zjBg=; b=EdOUcvaonI+iUIIZJrqnBRqzJ8aO+S43VpBH9Ctuvb71oG7NNmeYtbT7g0xpEbxcov CjsAaFpcjFVBu4/KQdZFaaAV371ppMgr1uaW9OmV14/Obv1xQ2Lz14qCc1FF8iLTtjHs Xy1+PyToa4hik64FJEHt3ckt4fQKKFyX4tZAOvt9yJ3wcUgv03V37BtI3PkmVTi6dc8Y kMKHq1kFks1DXFefeo19AGEnlCMkWwDrspNpTfyRBVXhzZgkuMoAnH6QgKAIqs9y6HuB 8ULbBUdzlGe2RQH8wOuBP7Nb7igugexHJ2w0ucRbe0Kwk2Hv3LZhrhCyZbjSa/BY+9np VO5A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:in-reply-to:references:mime-version:date :message-id:subject:to:cc; bh=MAdaVyCKitDHPoyYLEm9O8RZ53uml4zTEJEDfA4zjBg=; b=dqDz1IpNctMbcJPv76PUjPn7t5d3LiBXpvxRGo3eJ8Y4vuShklzZIsM+5HtX/4+jM4 x93bnEPCGT1n0L/lKiYzIZp4tmkSCHFD2nN1I9tqVFsld+U23/iqbXgMqEtXr4lInfIA XRyXZfR3hZcraMOKfNvqLfg6sjEDNkavKv8QqpUNUIt1MEjpsqoF3+vV56waqMU9sLBF R9SEzgqt7G/ZJfW+VD1dmcdR58QRJ1BTE9Odas98l6y9RvYXiU79/CENy1NqfraQFeKK du4mzl+ZVsFEdMQWmcpfE/aZOWNh6th6kWCe1RLpGJj3ckmPEjFCOsWo5PKVLUTqj8+s eFfQ==
X-Gm-Message-State: APf1xPBMfApdUwjpFzyAYNxTRlW7Jh4yhsCqEQNvX/P6jA+7WRF6vhrA aaW7qk0BKJnVCG7wcan0YXpt2Xs/jLFw9/zAB7s=
X-Google-Smtp-Source: AH8x224nzkGoL/FqABhY/J1LHYT5F4GZAIRuwpwKMkP/9w7YC9yH1z3VlCZR8pKI0q4/rst08LGYBfkaPGvJWBrdmIs=
X-Received: by 10.36.10.207 with SMTP id 198mr3058854itw.42.1518177412180; Fri, 09 Feb 2018 03:56:52 -0800 (PST)
Received: from 1058052472880 named unknown by gmailapi.google.com with HTTPREST; Fri, 9 Feb 2018 06:56:51 -0500
From: Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>
In-Reply-To: <CANatvzzZEuJ3TY=+0BMLqbBE5mScG_Jnrypg3xkciykOX78G8A@mail.gmail.com>
References: <1d386744-c46a-842a-b172-24e290e03668@gmail.com> <CABkgnnVRn+1sNZQFB8BZc4VyzN5usLmYJ3xLo+p2uTeW_0Ji_Q@mail.gmail.com> <CAN1APdfpJ0rYPPiOgfcdDRx3noh+YYvJatP0MYTqRRXMBwF6pA@mail.gmail.com> <3d558827-f2a7-877c-e00a-d6a22ef241c5@gmail.com> <CANatvzzZEuJ3TY=+0BMLqbBE5mScG_Jnrypg3xkciykOX78G8A@mail.gmail.com>
X-Mailer: Airmail (420)
MIME-Version: 1.0
Date: Fri, 09 Feb 2018 06:56:51 -0500
Message-ID: <CAN1APdfov8Q3E+5NkT5pmMeU=eB=fsnDFe_=BK7TDE0TpXD3yA@mail.gmail.com>
Subject: Re: Questions about Version Negotiation Concerning Possible Handshake Interruption
To: Lingmo Zhu <zlm2006@gmail.com>, Kazuho Oku <kazuhooku@gmail.com>
Cc: Martin Thomson <martin.thomson@gmail.com>, "quic@ietf.org" <quic@ietf.org>
Content-Type: multipart/alternative; boundary="001a1144b8285bf0f20564c63989"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/1ZQbxVC3U1JVmYcxgt7HEgPVPZM>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Feb 2018 11:56:54 -0000

A realistic on-path attack involves a government body that taps optic fiber
at an internet distribution node. The original intention behind the
construct may be to trigger an alarm whenever the string “dirty bomb”
appears in a protocol RFC 821 message (such as this one), and subsequently
for logging purposes to monitor traffic directed towards bulk fertiliser
suppliers. It is not possible to drop packets both due to the mechanical
construct, due to legislation, and because it might be too obvious.
However, having a datacenter with optic fibre near said access point gives
excellent insights into early handshakes including IP, port, connection ID,
and possible even a profile of the PRNG being used at some endpoint.

This makes it very simple to spoof and inject packets into handshake with a
good chance of winning any race. More difficult, but possible, it could
also observe packets and inject packets closer to the endpoint, for example
using long distance point to point radio communication to race the ordinary
packet stream.

Any argument about friendly gov is void because the internet travels across
multiple regions that each with near certainty have taps as those described
above making it a prime target in cyber warfare.

The question is then to what extend such a position can be utilised to
interfere with the handshake and what the outcome of such interference
would be, rather than a discussion of how plausible such an attack is,
because it is probably a 99% given if feasible.