Re: Should QUIC have a path-verifiable proof of source address?

Erik Kline <ek@google.com> Wed, 31 May 2017 12:04 UTC

Return-Path: <ek@google.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E79D129BBD for <quic@ietfa.amsl.com>; Wed, 31 May 2017 05:04:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nXT_sccIEeYb for <quic@ietfa.amsl.com>; Wed, 31 May 2017 05:04:24 -0700 (PDT)
Received: from mail-yw0-x229.google.com (mail-yw0-x229.google.com [IPv6:2607:f8b0:4002:c05::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AFCF2126CC7 for <quic@ietf.org>; Wed, 31 May 2017 05:04:24 -0700 (PDT)
Received: by mail-yw0-x229.google.com with SMTP id l14so5487015ywk.1 for <quic@ietf.org>; Wed, 31 May 2017 05:04:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=DPRe86Su/Rgc2A6qMz1tIWYY9/yfoJLDb08JOfb7fOs=; b=GtIgvAhOvuklwWtIsGWQQ9t7gjhr90kbxnOFCd4pEItIKhGgjhRcPwYkZUMZ6tB9tt kp5QEhC04wLzdpMFAYMb62RPXHB2dI79RauZD5HfvhOf3eAAf3q8naa/GPY3ZbHxpYEB ZXKGomTD4a/Ajpb1Q1iIu/oVAu7NIE3ZPMy7SHERm3PckJ2X1PkgQAwgJ+GIptukHDvy HM1TXa5RAQ4AEedPYHrylxSyDPmQHdj7i3vxtjsUAhdigEixZY2JLIFK0jH0zBBwizKi 1BrRPJvr2tL7gTIv2eYXG57ZFDeMLTUtqlEa0eL4ItWSJ8uSZ7PhJjdncmP/oCE8OYFS sm7w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=DPRe86Su/Rgc2A6qMz1tIWYY9/yfoJLDb08JOfb7fOs=; b=D7WudYG82CZU5ECX37MuZcF2YGgCOUxjAH9FcUWRPhcECxCgYajR7lQo2eBhM43dUP ktb0SE1nlQJyiaYbbMapq62hhb1Du5oxx0jCtZmrK6pBTZlOo2mqeet+5oqM7flFRI5I 2msnRZ+qQ7Zp08cDaQxDRsiDC4yU53eWUIC0KgORmj7jb+OzNbqnS5WGvGX+KpKZBAkb g57HXQZ4WInjeAImQkA3zu9pGkMrrXmISlDyKIp5jEW+AIziMKJKs03gohn5QAX+tE8y b+/JVw3vr/7t6rruER3y1MQW7Q7lRhRRlHefePNVKyZp13ZHysT3ekB750aKK9mWfGBe 5GhA==
X-Gm-Message-State: AODbwcCKz0JUkh5y8ZWODP6WsytZUPVwxKMbfushFUt1nyEkHDJBUOLB AZpmcaV5vvLlrAynQwVknCcU6vmaf9FnUXQ=
X-Received: by 10.129.89.131 with SMTP id n125mr19053638ywb.181.1496232263684; Wed, 31 May 2017 05:04:23 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.37.212.133 with HTTP; Wed, 31 May 2017 05:04:03 -0700 (PDT)
In-Reply-To: <179F2CCB-89DB-4E6E-9175-F850F89B4E5F@trammell.ch>
References: <179F2CCB-89DB-4E6E-9175-F850F89B4E5F@trammell.ch>
From: Erik Kline <ek@google.com>
Date: Wed, 31 May 2017 21:04:03 +0900
Message-ID: <CAAedzxr2VyXpvvz8iyiyUWUZA4TZeWfCY58-tDgNfhRHqg5Oqg@mail.gmail.com>
Subject: Re: Should QUIC have a path-verifiable proof of source address?
To: "Brian Trammell (IETF)" <ietf@trammell.ch>
Cc: QUIC WG <quic@ietf.org>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="001a114920c69ba9510550d0b872"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/CYUCi5yK78OFq1ltkEpAuaATiXM>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 May 2017 12:04:26 -0000

On 31 May 2017 at 20:53, Brian Trammell (IETF) <ietf@trammell.ch> wrote:

> Greetings, all,
>
> We have a few contentious points in the design of QUIC, and how that
> design interacts with devices deployed in the Internet. I'd like to start
> the discussion on two such points, to see if we can come to some kind of
> consensus as to what we want QUIC to do without regard to how it does it,
> keeping in mind our charter requirement that QUIC have "security and
> privacy properties that are at least as good as a stack composed of TLS 1.3
> using TCP (or MPTCP when using multipath)."
>
> I'll start with the easier one:
>
> "Shoud QUIC allow devices on path to distinguish QUIC traffic with valid
> source addresses from traffic with spoofed source addresses?"
>
> The utility of this property is obvious: it would allow in-network
> reflection/amplification, backscatter, and spoofed-DoS protection
> equivalent to that available with TCP. This is already provided by TCP
> state tracking devices for TCP endpoints more or less as a side effect of
> their operation.
>
> One could argue that this is pointless, since botnets-of-things have made
> spoofing irrelevant, and careful design (of new UDP protocols), aggressive
> patching (e.g. of ntpd), and lagging DNSSEC deployment are taking care of
> the most severe amplification vectors. The other side of that argument is
> essentially that every little bit helps.
>
> The risks and efficiency tradeoffs are a matter of the exact design used,
> of course. However, it seems to me that establishing whether this is a
> desirable feature, and at what cost, seems like a good way to decide
> whether we should design for it, as opposed to letting discussion of
> mechanisms drive discussion of requirements.
>
> Cheers,
>
> Brian
>

My main concern here would be that preserve the ability to migrate
connections.

Allowing on-path but non-endpoint devices to distinguish traffic as you
describe opens up the opportunity for them to do it incorrectly/badly
thereby making some implementations of connection migration unreliable (at
best).

There may still be ways to support connection migration and support this
kind of traffic analysis, though.