Re: Getting to consensus on packet number encryption

Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch> Wed, 04 April 2018 18:33 UTC

Return-Path: <mirja.kuehlewind@tik.ee.ethz.ch>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D970A12D775 for <quic@ietfa.amsl.com>; Wed, 4 Apr 2018 11:33:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 29zTbjuKLssJ for <quic@ietfa.amsl.com>; Wed, 4 Apr 2018 11:33:39 -0700 (PDT)
Received: from virgo02.ee.ethz.ch (virgo02.ee.ethz.ch [129.132.72.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD151126C0F for <quic@ietf.org>; Wed, 4 Apr 2018 11:33:39 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by virgo02.ee.ethz.ch (Postfix) with ESMTP id 40GZNL27WGz15NYJ; Wed, 4 Apr 2018 20:33:38 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at virgo02.ee.ethz.ch
Received: from virgo02.ee.ethz.ch ([127.0.0.1]) by localhost (virgo02.ee.ethz.ch [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O2N0-cOU7kSZ; Wed, 4 Apr 2018 20:33:37 +0200 (CEST)
X-MtScore: NO score=0
Received: from [192.168.178.24] (i577BCE70.versanet.de [87.123.206.112]) by virgo02.ee.ethz.ch (Postfix) with ESMTPSA; Wed, 4 Apr 2018 20:33:37 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Subject: Re: Getting to consensus on packet number encryption
From: Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>
In-Reply-To: <CA+9kkMD6a_hF-a8J+Tz-kzEVra8dUqsmpgD_PnD+RshhuzjsUA@mail.gmail.com>
Date: Wed, 04 Apr 2018 20:33:35 +0200
Cc: Brian Trammell <ietf@trammell.ch>, Lars Eggert <lars@eggert.org>, Mark Nottingham <mnot@mnot.net>, IETF QUIC WG <quic@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <15157F08-4DBF-45E9-A1DD-C071EDDE7792@tik.ee.ethz.ch>
References: <7fd34142-2e14-e383-1f65-bc3ca657576c@huitema.net> <F9FCC213-62B9-437C-ADF9-1277E6090317@gmail.com> <CABcZeBM3PfPkqVxPMcWM-Noyk=M2eCFWZw2Eq-XytbHM=0T9Uw@mail.gmail.com> <CAN1APdfjuvd1eBWCYedsbpi1mx9_+Xa6VvZ3aq_Bhhc+HN67ug@mail.gmail.com> <CABcZeBMtQBwsAF85i=xHmWN3PuGRkJEci+_PjS3LDXi7NgHyYg@mail.gmail.com> <1F436ED13A22A246A59CA374CBC543998B5CCEFD@ORSMSX111.amr.corp.intel.com> <CABcZeBNfPsJtLErBn1=iGKuLjJMo=jEB5OLxDuU7FxjJv=+b=A@mail.gmail.com> <1F436ED13A22A246A59CA374CBC543998B5CDAD4@ORSMSX111.amr.corp.intel.com> <BBB8D1DE-25F8-4F3D-B274-C317848DE872@akamai.com> <CAN1APdd=47b2eXkvMg+Q_+P254xo4vo-Tu-YQu6XoUGMByO_eQ@mail.gmail.com> <CAKcm_gMpz4MpdmrHLtC8MvTf5uO9LjD915jM-i2LfpKY384O2w@mail.gmail.com> <HE1PR0702MB3611A67E764EE1C7D1644FAD84AD0@HE1PR0702MB3611.eurprd07.prod.outlook.com> <d8e35569-e939-4064-9ec4-2cccfba2f341@huitema.net> <CACpbDccqKoF-Y1poHMN2cLOK9GOuvtMTPsF-QEen3b30kUo9bg@mail.gmail.com> <CAKcm_gNffwpraF-H2LQBF33vUhYFx0bi_UXJ3N14k4Xj4NmWUw@mail.gmail.com> <40C1F6FE-2B2C-469F-8F98-66329703ED50@mnot.net> <2DB3AC71-89B1-425C-8128-E673D34B7AFA@trammell.ch> <CA+9kkMD6a_hF-a8J+Tz-kzEVra8dUqsmpgD_PnD+RshhuzjsUA@mail.gmail.com>
To: Ted Hardie <ted.ietf@gmail.com>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/BYd4FrmYizmkh6LWJeVT5lOPOcw>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Apr 2018 18:33:42 -0000

Hi Ted,

based on what you say here, I’d like to further pick on an important point

> Am 04.04.2018 um 20:06 schrieb Ted Hardie <ted.ietf@gmail.com>:
> 
> My emphasis is slightly different:  how much does this choice constrain the working group's later choices?  From my take, making the choice to encrypt the packet number in v1 has the lesser set of constraints, because it is possible for later versions to add a path-visible signal of sequence numbers if we see a reason to do so.  That set of sequence numbers might not be the same as those being used for protocol state mechanics by the endpoints, but that's okay as they wouldn't be serving the same purpose.  

Currently the PN is used for a least two different purposes: 1) congestion control/retransmissions and as 2) input for the decryption. For the first purpose, the PN would not need to be in the wire image and could just be part of the encrypted payload. I guess the main reason that we use the same bits for both purposed is to save bits...

While you say, we can still add an unencrypted PN for a third purpose (measurements), it is also possible to add any time later (in a new version or with extension frames) a separate PN for 1 to the fully encrypted part of the packet that is independent of the exposed packet number (in case that gets ossified and does not address the needs of the quic transport machinery anymore). 

So even if the exposed PN gets ossified, I think we still have ways to handle that. However, the question is, do we want to burn the bits and complexity now, or later when we might (or might not) figure out that it is needed?

Mirja