Re: Getting to consensus on packet number encryption

Ian Swett <ianswett@google.com> Thu, 26 April 2018 00:21 UTC

Return-Path: <ianswett@google.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B101912DA0C for <quic@ietfa.amsl.com>; Wed, 25 Apr 2018 17:21:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level:
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EnfIEPltwlbF for <quic@ietfa.amsl.com>; Wed, 25 Apr 2018 17:21:17 -0700 (PDT)
Received: from mail-yb0-x231.google.com (mail-yb0-x231.google.com [IPv6:2607:f8b0:4002:c09::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4EF512D965 for <quic@ietf.org>; Wed, 25 Apr 2018 17:21:16 -0700 (PDT)
Received: by mail-yb0-x231.google.com with SMTP id q74-v6so8864456ybg.6 for <quic@ietf.org>; Wed, 25 Apr 2018 17:21:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=lgKKUS20Zkpom8wkIc5zLEv5iNXw7MsefjQGmCAgf3M=; b=opXMe/4t/FRQa6ftG0tyOKQwnRCvHz7f8RUFXB9oTUL+tNmj2K1N50mG0AuRfNYruo +FEs2RKK5ZClRttfdeNqLUEnD30YQs1II2bDbfSpjUN8QLDlBzOOInULcuEMS7TdWPHN eALYI70Yhq+huftWjHDRWLiTQlyGYRRgh4jz/WKSOvHwR/sVFrfbiTd7/ocAtt6aY6Du FcA5vwd6wOulMauZ0z+mjvTT3HfZInxhzkxEv8sR8qg4HZc2BWrVrRzOBM60jj4bka0N c1QDQ4101RQlXSVNx5uJr3i8oXpcrVQbKETPl8psRNnBVPKw7gYdX0OfZFa31p0cJ+pY hbMg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=lgKKUS20Zkpom8wkIc5zLEv5iNXw7MsefjQGmCAgf3M=; b=Mf+rmUEnhrJaE7HPFbPemPgRLBYh85pp6OrKfqTuBwQ8es0eCVBfFWVBGTJziGETvV kt0YJex30ugd7qpdWwmBsic9wPGSn6bOcGt1kId8s1sUrUvbT446sAcSpX7tHFqTu3Sk QNak+0IyfhmLw+B9eiZQMwPiEJISGzxJw9tyci4FUOsqZ/NQBHYUBd8HyAuTZda0FeAK k+3I/o7aNs36nYGsrWeEC6BTxaZXcVJ+T+DaCjIVrrxI2D47yFqeqLKKyqTP0xvJtJoz 74zHLooTjGSruQwwajQrAh8rxSnq3kJ/HbkYaUrXmM+eh1eokr3pODzpk8+npc37zaXI 6zkg==
X-Gm-Message-State: ALQs6tC529tSvy/5/KYKOXU3y8hT0UHiTwq8S9cQ047QtKumQ8LFn1DY LokrMJfdVFBg12cT9K8mKTEU/Gg60uxK63IFHTP/iQ==
X-Google-Smtp-Source: AIpwx48udS7f1T4YwvJLbiIskK15+cpAAuyl1LmF5kRHfrXttzW+qZ2N+8GMMJ9iTAfhuMbhzpA7fPskrj4VqSSHuvk=
X-Received: by 2002:a5b:c0e:: with SMTP id f14-v6mr17102764ybq.107.1524702075819; Wed, 25 Apr 2018 17:21:15 -0700 (PDT)
MIME-Version: 1.0
References: <7fd34142-2e14-e383-1f65-bc3ca657576c@huitema.net> <21C36B57-6AE2-40EF-9549-7196D7FA9B45@tik.ee.ethz.ch> <B176FC07-887D-4135-B01E-FE8B4986A5EE@mnot.net> <CAKcm_gOCeocLyrYpOS7Ud332xdz3xHSH0psPN8T6BGRjoL9ptQ@mail.gmail.com> <CY4PR21MB0630FA0EDD343396AD414641B6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <CAN1APde13JTzCvKFFvMd183Fka6QGD1kGBjsa9fcoLrYeA2hsA@mail.gmail.com> <CY4PR21MB0630C0FD4FBECBFEC3C863BBB6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <047d2ff0-ff8b-64c9-8983-0ecabeb9fea5@huitema.net> <B0F49097-F77A-4831-B68B-4266AA880A86@tik.ee.ethz.ch> <74E2F5C2-66AD-4902-8A4A-E481CC0A015C@fb.com> <75050158-3812-44F1-A01E-D70EED7FDFD6@tik.ee.ethz.ch> <BY2PR15MB0775B4ACF7DB9124E89016F0CDB00@BY2PR15MB0775.namprd15.prod.outlook.com> <c8e60ba4-d6be-c4fc-5bac-d569a28fb4e8@huitema.net> <56CE3592-EB1D-40A3-B1D2-965B238FA402@mnot.net> <ae7a63fe-0a32-893f-aa6b-e8d97b8ba87a@huitema.net> <1F436ED13A22A246A59CA374CBC543998B60C6DD@ORSMSX111.amr.corp.intel.com> <fc57394f-9516-04c0-0846-6d159b14bc9e@huitema.net> <SN1PR08MB1854FD2461597D81BEE31ED6DA8F0@SN1PR08MB1854.namprd08.prod.outlook.com> <CAKcm_gMRPXgCoZ958Oj4_Pnkvmc9a7PgNVS0iae0hCW7bLKqng@mail.gmail.com> <SN1PR08MB18545D0554DED1F83862EBFBDA8F0@SN1PR08MB1854.namprd08.prod.outlook.com>
In-Reply-To: <SN1PR08MB18545D0554DED1F83862EBFBDA8F0@SN1PR08MB1854.namprd08.prod.outlook.com>
From: Ian Swett <ianswett@google.com>
Date: Thu, 26 Apr 2018 00:21:05 +0000
Message-ID: <CAKcm_gNMTQg-pV8vTXkMCTh48QPZ_ujyFSEKRYf+WurUFytaWw@mail.gmail.com>
Subject: Re: Getting to consensus on packet number encryption
To: Mike Bishop <mbishop@evequefou.be>
Cc: Christian Huitema <huitema@huitema.net>, "Deval, Manasi" <manasi.deval@intel.com>, Mark Nottingham <mnot@mnot.net>, IETF QUIC WG <quic@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000009ec683056ab55dd9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/3jnHFy_ss8RUxdpphnQci2C50BA>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Apr 2018 00:21:20 -0000

It has been, and I'm personally supportive of it, because I believe it'll
be useful for datacenter QUIC use cases.

But the WG has to decide:
 1) Is it allowable to disable PNE?
 2) What the mechanism is?  ie: Unilateral via TransportParams or
negotiated via an extension or ?

On Wed, Apr 25, 2018 at 6:01 PM Mike Bishop <mbishop@evequefou.be> wrote:

> I think that’s been suggested before, though we’d need to sort out the
> details of what that looks like.  I don’t have a particular design in mind.
>
>
>
> *From:* Ian Swett [mailto:ianswett@google.com]
> *Sent:* Wednesday, April 25, 2018 12:57 PM
> *To:* Mike Bishop <mbishop@evequefou.be>
> *Cc:* Christian Huitema <huitema@huitema.net>; Deval, Manasi <
> manasi.deval@intel.com>; Mark Nottingham <mnot@mnot.net>; IETF QUIC WG <
> quic@ietf.org>
> *Subject:* Re: Getting to consensus on packet number encryption
>
>
>
> Hi Mike,
>
>
>
> To clarify, are you suggesting adding a way to disable packet number
> encryption via negotiation in the v1 spec as well as adopting #1079?  Or
> would the choice of whether PNE is to be used unilateral, such as a
> transport param?
>
>
>
> On Wed, Apr 25, 2018 at 3:54 PM Mike Bishop <mbishop@evequefou.be> wrote:
>
> Yes -- it seems that the biggest objection to #1079 was the difficulty in
> hardware implementation.  If we're hearing that hardware implementation is
> feasible at a reasonable cost, then I think we might have a winner.
>
> The CPU cost for a software implementation is still worth considering, and
> an option to not encrypt is probably reasonable to limit that burden for
> implementations / use cases that don't care.
>
> -----Original Message-----
> From: QUIC <quic-bounces@ietf.org> On Behalf Of Christian Huitema
> Sent: Wednesday, April 25, 2018 3:14 AM
> To: Deval, Manasi <manasi.deval@intel.com>; Mark Nottingham <mnot@mnot.net
> >
> Cc: quic@ietf.org
> Subject: Re: Getting to consensus on packet number encryption
>
> On 4/23/2018 6:55 PM, Deval, Manasi wrote:
>
> > I had brought up the issue with PNE several weeks ago as a barrier to
> hardware offload. After further review, it looks like a hardware offload
> can implement the PNE at a small cost.
> >
> > The implementation can modify current HW crypto accelerators to support
> encrypting a buffer in the first pass and then encrypting packet number in
> the 2nd pass as already discussed on this thread. The exact requirement
> (header checksum, packet length encoding) is still in flux so there may be
> some small variations depending on the accelerator and final algorithm
> chosen for PNE. Future offload designs can do more to further reduce the
> overhead.
>
> Thanks for the information, Manasi. I have modified the wiki page
> describing the PNE issues and alternatives to reflect this new data:
>
> https://github.com/quicwg/base-drafts/wiki/Summary-of-the-PN-encryption-issues-and-alternatives
> .
> With that new information, it appears that PR #1079 is superior to every
> other alternative.
>
> -- Christian Huitema
>
>