Re: Fwd: New Version Notification for draft-kazuho-quic-address-bound-token-00.txt

Kazuho Oku <kazuhooku@gmail.com> Thu, 04 April 2019 07:33 UTC

Return-Path: <kazuhooku@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83A64120448 for <quic@ietfa.amsl.com>; Thu, 4 Apr 2019 00:33:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JNy5zuXL8425 for <quic@ietfa.amsl.com>; Thu, 4 Apr 2019 00:33:12 -0700 (PDT)
Received: from mail-lf1-x141.google.com (mail-lf1-x141.google.com [IPv6:2a00:1450:4864:20::141]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E29C12042E for <quic@ietf.org>; Thu, 4 Apr 2019 00:33:12 -0700 (PDT)
Received: by mail-lf1-x141.google.com with SMTP id r25so984085lfn.13 for <quic@ietf.org>; Thu, 04 Apr 2019 00:33:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=y6zUS4Thnni22fCymppy7WpO/yq0Ygd7WO+gUNs6x7w=; b=WDDfm8dL9zak5oM5f3GGRhdmuvML/aFrfRkg8ZbWLDQ7bscd+v5oK0UN446yCoDN7P ++N3rZLfgjsTYTloZxmSeZQF2pC8li5Fosq5nfNv9wnN8lTmBIAxfIv1T2Onvri/gllI 49SNiq3kScJ5cLPspWdQBBip90sp8rnYt9ETM3Wn4St8IVeYr6gn+9+KhDOfTckEGCdF QCNC4bB7JPuw0Rv1Awmk/+GcbkQ4gOCVahTPbtApyvkqjD8aDcLS0mA+EgTFUV29de/u HY209F9wgYrs/DiWpKhUc0pzRiEitbl/s3PYQZKuN3tUSJhCBAAT52S4Xq1pmt2I/XRU kL2w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=y6zUS4Thnni22fCymppy7WpO/yq0Ygd7WO+gUNs6x7w=; b=cHzsoYpk8vVLfFTVMmqs4KoStbdLMmXAoh9T2t2BB34oBtvyytP+EIykYDg99plnYU W+BWGSwn4mYEl1HpJvdKSSjcrfPeVCs4GHTQC4Y4uw20kOZkW2zM/AMllh8ghvD8qd4X A/adIOxfTjG0YKwS6AFfjbgul8d7uAO+i7D6OiIJtlmI3dzjQ0Rzhang88htr+5txlX0 SdB1Gz4Nc3KMP5K7I6h/JAZkBI7ex+1TBZg2Wp3vGFHlp8x2xcC8P+jUeVD1Z7kMc93c h5o86LwFah9Zw+tTUn7nhiWpzSBb/SqduUOaH3wYt/MfHAAxpv8WqmCar2KrHR0od9MZ 56xw==
X-Gm-Message-State: APjAAAXCiEMzKC6y8zGJw6DpqVeFHGl4EQWCpt3wCRxdAzrB+DyyhXMM KzvhCRLlHRWrfZhqJr/dpbVR3uYed4IOw3tIqNx0kf4G
X-Google-Smtp-Source: APXvYqyIDwFROWj0qafFNXOZVX5fWWIvJYQJnSx5mZ+PNBYZX9jVQEGvd/1SwIMKKIOvnrGVFjVTlskPuDQlcKkl6CY=
X-Received: by 2002:ac2:489a:: with SMTP id x26mr2272610lfc.49.1554363190192; Thu, 04 Apr 2019 00:33:10 -0700 (PDT)
MIME-Version: 1.0
References: <155435502215.22668.17009854749523198767.idtracker@ietfa.amsl.com> <CANatvzz+AUc=j+36yNq78Eu6vTjs1_OThCY2O=ivJLyZRe+3Og@mail.gmail.com> <CAN1APdf-vH2B-1OSX-ndrK=JM3vQet0Sf2tqeMMyrDKxtZyofg@mail.gmail.com> <7a20865a-b368-80eb-378d-1744c9577117@huitema.net>
In-Reply-To: <7a20865a-b368-80eb-378d-1744c9577117@huitema.net>
From: Kazuho Oku <kazuhooku@gmail.com>
Date: Thu, 04 Apr 2019 16:32:58 +0900
Message-ID: <CANatvzxj8iH-W3WC-7S=YR6T_JD2ES+b-mB2q4iDLLb=QNEuVA@mail.gmail.com>
Subject: Re: Fwd: New Version Notification for draft-kazuho-quic-address-bound-token-00.txt
To: Christian Huitema <huitema@huitema.net>
Cc: IETF QUIC WG <quic@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/3h4ZF4PVUSQyZhZYo1ajUbSGJEw>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Apr 2019 07:33:15 -0000

Hi Christian,

Thank you for your comments. My responses inline.

2019年4月4日(木) 15:48 Christian Huitema <huitema@huitema.net>:
>
> I am reading the draft, and I think that the discussion of congestion control should be removed. Senders have all latitude to coordinate transmission control across multiple connections, including using some form of multi-connection congestion control. I think the draft would be easier to read if it concentrated on just one purpose, the linkage of new tokens to server addresses instead of service identities.

That's a good suggestion. I agree that it does not need to be in this
document, even though I think it is beneficial to describe how you
could have a shared congestion controller. At the very least, it
should be moved to the appendix.

>
> We probably need a slightly larger security analysis. What if a service part of a farm issued such a token without coordinating with the other services that use the same address? Could that be a form of DOS?

Would you mind elaborating about the scenario a bit more? I ask this
because I am not sure if that is a practical attack. Assuming that it
is about an attacker running on the same server tuple, why can't the
attacker just send packets by itself? I might also point out that
section 8.1.3 of the transport draft [1] prevents such attacks from
being run.

[1] https://quicwg.org/base-drafts/draft-ietf-quic-transport.html#rfc.section.8.1.3

>
> -- Christian Huitema
>
> On 4/3/2019 11:15 PM, Mikkel Fahnøe Jørgensen wrote:
>
> Nice work.
>
> Just a minor thing on priority in the appendix: what about IPv6 priorities? That, and flow labels - are we starting to bypass much of the IPv6 design because it is not (yet?) sufficiently widely deployed? Or are there security implications, and if so, should QUIC consider authenticating parts of the IPv6 header?
>
> Also, on name based alternative:
> I’m wondering which non-HTTP/3 connections would really benefit as new designs can build in multi-purpose into the protocol whereas HTTP/3 must follow HTTP semantics. You could argue about WebRTC/3 - but then - what should it co-locate with which has sufficient intelligence to share the congestion controller? You could argue share with HTTP/3, but that would probably not rule out a name based solution either.
> I’m not saying name based CG sharing is necessarily better, I’m just wondering.
>
> OTOH if name based sharing is used that could place some assumptions on a given load balancers tuple stickiness, if I understand correctly. That could be unfortunate. Or, if name sharing is only to target address validation of the client perhaps different server hosts could share that information successfully with a random or round robin load balancer?
>
> Mikkel
>
> On 4 April 2019 at 07.22.32, Kazuho Oku (kazuhooku@gmail.com) wrote:
>
> Hi,
>
> I have (finally) submitted "Address-bound Token for QUIC" I-D, that
> proposes a QUIC extension allowing tokens to be shared between
> connections that go to the same server address, even when the value of
> SNI is different. Having such tokens would maximize our chance of
> skipping address validation and slow-start phase.
>
> The I-D and the repo can be found at the links below:
>
> I-D: https://datatracker.ietf.org/doc/draft-kazuho-quic-address-bound-token/
> Github repo: https://github.com/kazuho/draft-kazuho-quic-address-bound-token
>
> Please let us know what you think.
>
> Rationale behind the proposal:
>
> The startup phase (a.k.a. slow-start) is one of the things that has
> negative impact on user experience. QUIC, in addition to reducing the
> connection establishment latency from TCP, provides the possibility of
> a server skipping the startup phase when a client provides a valid
> token.
>
> However, the probability of a server being able to skip the startup
> phase relies on how frequent a user revisits a particular server,
> identified by the value of the TLS SNI extension. To put another way,
> there is a missed opportunity if a client is visiting a server
> instance that it has previously visited with a different server name.
>
> Our proposal addresses exactly that. The proposed extension allows a
> client to use a token for a different server name, if the server
> address is the same. This maximizes the chance of the server skipping
> address validation and the startup phase.
>
>
> ---------- Forwarded message ---------
> From: <internet-drafts@ietf.org>
> Date: 2019年4月4日(木) 14:17
> Subject: New Version Notification for
> draft-kazuho-quic-address-bound-token-00.txt
> To: Kazuho Oku <kazuhooku@gmail.com>
>
>
>
> A new version of I-D, draft-kazuho-quic-address-bound-token-00.txt
> has been successfully submitted by Kazuho Oku and posted to the
> IETF repository.
>
> Name: draft-kazuho-quic-address-bound-token
> Revision: 00
> Title: Address-bound Token for QUIC
> Document date: 2019-04-04
> Group: Individual Submission
> Pages: 6
> URL:
> https://www.ietf.org/internet-drafts/draft-kazuho-quic-address-bound-token-00.txt
> Status:
> https://datatracker.ietf.org/doc/draft-kazuho-quic-address-bound-token/
> Htmlized:
> https://tools.ietf.org/html/draft-kazuho-quic-address-bound-token-00
> Htmlized:
> https://datatracker.ietf.org/doc/html/draft-kazuho-quic-address-bound-token
>
>
> Abstract:
> This document describes a QUIC extension for an address-bound token.
> This token can be used for sharing address validation and congestion
> controller state between the same two endpoints across multiple
> connections and origins.
>
>
>
>
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
>
>
> --
> Kazuho Oku
>


-- 
Kazuho Oku