Re: draft-tiesel-quic-unreliable-streams-01 - comments

"Philipp S. Tiesel" <phils@in-panik.de> Tue, 07 November 2017 16:49 UTC

Return-Path: <phils@in-panik.de>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D40213320D for <quic@ietfa.amsl.com>; Tue, 7 Nov 2017 08:49:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wNZhACgFAmnB for <quic@ietfa.amsl.com>; Tue, 7 Nov 2017 08:48:58 -0800 (PST)
Received: from einhorn-mail.in-berlin.de (einhorn.in-berlin.de [192.109.42.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15E8613316B for <quic@ietf.org>; Tue, 7 Nov 2017 08:48:57 -0800 (PST)
X-Envelope-From: phils@in-panik.de
Received: from x-berg.in-berlin.de (x-change.in-berlin.de [217.197.86.40]) by einhorn.in-berlin.de (8.14.4/8.14.4/Debian-8+deb8u2) with ESMTP id vA7GmQ3X021430 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 7 Nov 2017 17:48:26 +0100
Received: from [2001:638:809:ff1f::8295:dc66] by x-berg.in-berlin.de with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from <phils@in-panik.de>) id 1eC72b-00051P-IM; Tue, 07 Nov 2017 17:47:57 +0100
From: "Philipp S. Tiesel" <phils@in-panik.de>
Message-Id: <7A7BC718-CA7C-4DF1-87DC-EB7C48B48C56@in-panik.de>
Content-Type: multipart/alternative; boundary="Apple-Mail=_CBE3E2C2-BEFA-4C3C-8390-67D1505DD093"
Mime-Version: 1.0 (Mac OS X Mail 11.1 \(3445.4.7\))
Subject: Re: draft-tiesel-quic-unreliable-streams-01 - comments
Date: Tue, 07 Nov 2017 17:48:25 +0100
In-Reply-To: <DB4PR07MB348012BC630A37881C3852CC2510@DB4PR07MB348.eurprd07.prod.outlook.com>
Cc: Roni Even <roni.even@huawei.com>, QUIC WG <quic@ietf.org>
To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
References: <6E58094ECC8D8344914996DAD28F1CCD82A735@DGGEMM506-MBS.china.huawei.com> <FBF9665E-15CE-437B-A575-25AEA7C88073@in-panik.de> <6E58094ECC8D8344914996DAD28F1CCD832288@DGGEMM506-MBX.china.huawei.com> <B814D19D-2FD6-42B6-867E-8A26C7475E0F@in-panik.de> <DB4PR07MB34899FCFC336AE2F0B72A6CC2510@DB4PR07MB348.eurprd07.prod.outlook.com> <6E58094ECC8D8344914996DAD28F1CCD8351F8@DGGEMM506-MBX.china.huawei.com> <DB4PR07MB348012BC630A37881C3852CC2510@DB4PR07MB348.eurprd07.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.4.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/AL0M3Jzmo88ZSDu7V-ymEGo5HCw>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Nov 2017 16:49:01 -0000

Hi,

the whole point came up in the security considerations of the draft:

	If one uses unreliable streams as-a-message to cut down
	delay, it is also necessary to send them out right away
	and don’t wait unit a MTU-sized packet is full.

	Despite encryption, this allows an attacker to learn about message
 	sizes and, assuming the protocol within the QUIC connection is known,
	might allow guessing what messages were used.
 
	One _example_ for such an attack was an hypothetical streaming protocol
	which an attacker can drop delivery reports for and thus could influence
	rate adaption.

I came to the conclusion this was not the best example for the message guessing attack.


> On 7. Nov 2017, at 15:47, Ingemar Johansson S <ingemar.s.johansson@ericsson.com> wrote:
> 
> Hi
>  
> OK, then I understand, maybe.. Still don’t get it, sorry. If you are about to selectively discard ACK packets, then the ACK spacing will become larger and the ACK clocking will be degraded. The end effect is that also the media (or whatever) that constitute the large packets will also get a degraded performance ? 
>  
> I assume that we will still be running one congestion control for the connection ?
>  
> /Ingemar
>  
> From: Roni Even [mailto:roni.even@huawei.com] 
> Sent: den 7 november 2017 12:50
> To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>; Philipp S. Tiesel <phils@in-panik.de>
> Cc: QUIC WG <quic@ietf.org>
> Subject: RE: draft-tiesel-quic-unreliable-streams-01 - comments
>  
> Hi Ingemar,
> It is not CCM the attacker just does heuristics to understand that this is not media but report (RTCP or ACK frames) and drops it, BTW: audio packets may also be small.
> This is an example. The claim is that you can use heuristics to drop “selected” frames even though you do not know what is in the packet.
> Roni
>  
>  
>  
> From: Ingemar Johansson S [mailto:ingemar.s.johansson@ericsson.com <mailto:ingemar.s.johansson@ericsson.com>] 
> Sent: יום ג 07 נובמבר 2017 09:41
> To: Philipp S. Tiesel; Roni Even
> Cc: QUIC WG
> Subject: RE: draft-tiesel-quic-unreliable-streams-01 - comments
>  
> Hi Philip and Roni
>  
> I assume that by reception reports is meant the RTCP CCM messages such as TMMBR or ?
>  
> So.. unless I misunderstood it completely.
> I am not at all convinced that media rate/congestion control in QUIC should rely on TMMBR.
> SCReAM for instance, specified in the RMCAT WG for instance does not depend on TMMBR as it is ACK clocked, the media transmission is reduced to a very low rate if the ACKs are discarded by an attacker.
>  
> I would say that it is more straightforward to use a multipurpose congestion control in QUIC, this is perhaps based on BBR, but SCReAM style is not excluded. In any case this means that it is not possible to prevent rate adaptation.
>  
> /Ingemar
>  
>  
> From: Philipp S. Tiesel [mailto:phils@in-panik.de <mailto:phils@in-panik.de>] 
> Sent: den 6 november 2017 10:15
> To: Roni Even <roni.even@huawei.com <mailto:roni.even@huawei.com>>
> Cc: QUIC WG <quic@ietf.org <mailto:quic@ietf.org>>
> Subject: Re: draft-tiesel-quic-unreliable-streams-01 - comments
>  
>  
>  
> 
> On 5. Nov 2017, at 08:32, Roni Even <roni.even@huawei.com <mailto:roni.even@huawei.com>> wrote:
> From: Philipp S. Tiesel [mailto:phils@in-panik.de <mailto:phils@in-panik.de>]
> 
> On 1. Nov 2017, at 14:03, Roni Even <roni.even@huawei.com <mailto:roni.even@huawei.com>> wrote:
> 
> In the security section “ An active, on path attacker can drop selected
> frames “ . What does it mean selected frames, the whole payload is
> encrypted.
> 
> This is a little complicated:
> - Assume having “stream-as-a-message” streams with two different kins of
> messages sized A,B
> - Assume each message fits into one packet, but two messages will not fit
> - Assume one doesn't want to split packets to fill packets to MTU due to
> latency constrains  => If an attacker know the inside protocol, the attacker
> can distinguish from the packet length wether it is an A or B kind message
> 
> To avoid this, one has to pad all packets… I should clarify this.
> [Roni Even] I understand this case but what does selected frames mean, I assume that the attacker does not know what is in each stream in order to select a specific one, so why will he just drop one and not the other or why not both?
>  
> Assuming the attacker _knows the protocol_, the attacker would also know the sizes of all kinds of messages and may use this knowledge to recover protocol state or selectively drop messages.
>  
> For a protocol like HTTP, the attack vector is rather small.
> If one uses this against video conferencing applications, an attacker could prevent rate adaption  by dropping reception reports (larger than a pure QUIC ACK, smaller than a video frame).
> If one uses this on IoT control stuff, an attacker might be able to learn a lot about the system state by observing sizes and timings.
>  
> This is nothing we can fix within QUIC without massive scarifies, but application developers must keep in mind.
>  
>  
> AVE!
>   Philipp S. Tiesel / phils…
> -- 
>    {phils}--->---(phils@in-panik.de <mailto:phils@in-panik.de>)--->---(http://phils.in-panik.de <http://phils.in-panik.de/>)----,
>       wenn w eine   aube ist dn      man au dran dre en                   |
>            o     Schr        an muss     hc         h   (Kurt Schwitters) |
> :wq!  <----(phone: +49-179-6737439)---<---(jabber: phils@in-panik.de <mailto:phils@in-panik.de>)----'

AVE!
  Philipp S. Tiesel / phils…
-- 
   {phils}--->---(phils@in-panik.de)--->---(http://phils.in-panik.de)----,
      wenn w eine   aube ist dn      man au dran dre en                   |
           o     Schr        an muss     hc         h   (Kurt Schwitters) |
:wq!  <----(phone: +49-179-6737439)---<---(jabber: phils@in-panik.de)----'