Re: Handling consensus on design issues identified during AD Review

Ian Swett <ianswett@google.com> Tue, 20 October 2020 14:45 UTC

Return-Path: <ianswett@google.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBCBE3A0EBC for <quic@ietfa.amsl.com>; Tue, 20 Oct 2020 07:45:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.599
X-Spam-Level:
X-Spam-Status: No, score=-17.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 50xreQSJSnND for <quic@ietfa.amsl.com>; Tue, 20 Oct 2020 07:45:02 -0700 (PDT)
Received: from mail-yb1-xb30.google.com (mail-yb1-xb30.google.com [IPv6:2607:f8b0:4864:20::b30]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 89A013A0EB8 for <quic@ietf.org>; Tue, 20 Oct 2020 07:45:02 -0700 (PDT)
Received: by mail-yb1-xb30.google.com with SMTP id f140so2148291ybg.3 for <quic@ietf.org>; Tue, 20 Oct 2020 07:45:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=fYJzyLBKRlRvI3mm2dUkGnfV5B0oVDN+FHkagqZA1EE=; b=ZLYskY4sUNUBoIbrDMtRcB/oFvz4A8U0qW4Yltybrmuyq7WdUegjb7n78ovbyzaxJ8 ORwKAXcUK0s1iZ3l+c5NeI8ARsBK5qGmaF8VfMzWPe6JYQ/94SzdED7fqHEEEXiAvxO3 cbZznPWLcR6ToaXuQMT1v/Uok6tZWw52oQLmT5v2S+4Vs/aiFUCCnEaQa2NqfsCCCD4/ tqa7pltBkX3x7Nms2bhmIxHMEynQ2yKyj+QqqWsI2Y5SB2DYR6YsU25mvGQr/IQJjXs5 e+sNKc9WAX4FUxt3FhEqvTB+3X4RJACcrZfujn4bXEmBmLLU5kTXQLD8RAmKXnx0QRyE gTOw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=fYJzyLBKRlRvI3mm2dUkGnfV5B0oVDN+FHkagqZA1EE=; b=hqlOQRHIB3Kn8xk7y75m1NR8z5yYUPi6bGxDnR9x/+jBQ0vnc/HWwwy++EpASRNPC5 DneLiFlZCnrfa2pnmCstn8wzJesJKBGbEAOlUruxj3sFudOxQE0eKnQRthkhzbFfdopG nM2vRF1CK7wL0VgcH20aREWBzByhDOIMvaaptPoBVmWawprPDIgvOvd7rfv/gswMm/43 ftI/K3tFCXkrx2pv7CMLupY02CRcG3zkbZcmfH5HH0yueX3wcIorp4UB+RR51TQ/0NMN 5IAxJgyvP3PpMGptQP41XZwFmtrnKxKD1qlijwkel/TZyV5zpKnWtYX9M2oSmf66OqRl JUhQ==
X-Gm-Message-State: AOAM530a+sRWRiQDB0pnHJbiqoGOdaUSDArCH8shrGekXJGRxlP1tZmE TkaCAqpDtc71CHbw4/5nCfrapt0FpeLo6Y4+YHGXcr/pg+M=
X-Google-Smtp-Source: ABdhPJwWjsYBQjq+7z9Y2ZouqhGntlrYmTA7nNgvPBuT3gRr7N/Zqss3AZ2w79eozAvCxDKQ4LGaAaRPL/xlgaSTDxc=
X-Received: by 2002:a05:6902:52d:: with SMTP id y13mr4234719ybs.364.1603205101419; Tue, 20 Oct 2020 07:45:01 -0700 (PDT)
MIME-Version: 1.0
References: <77CE8B82-23CB-40D0-B28C-B2BC1BEABED3@eggert.org> <CANatvzwgVRGnJN_HCCDvYwZh7ix4=NEV7a_HOJPb1tnNUokSyw@mail.gmail.com> <0d3d9b02-2fc3-4a43-ba71-0d3056b92f17@www.fastmail.com>
In-Reply-To: <0d3d9b02-2fc3-4a43-ba71-0d3056b92f17@www.fastmail.com>
From: Ian Swett <ianswett@google.com>
Date: Tue, 20 Oct 2020 10:44:49 -0400
Message-ID: <CAKcm_gM6JseUM4=SVgtD18kkeV7gORgWxxCAySD5_=hUoeCsoA@mail.gmail.com>
Subject: Re: Handling consensus on design issues identified during AD Review
To: Martin Thomson <mt@lowentropy.net>
Cc: IETF QUIC WG <quic@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000092e6bb05b21b4670"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/EiwL4MWvwcfIq_uvGQMU8DOAidY>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Oct 2020 14:45:05 -0000

I agree, thanks Kazuho.

On Tue, Oct 20, 2020 at 10:41 AM Martin Thomson <mt@lowentropy.net> wrote:

> Kazuho has identified the set of changes that I too think we should take.
> Thanks Kazuho.
>
> On Wed, Oct 21, 2020, at 01:32, Kazuho Oku wrote:
> > Thanks to chairs / editors / ADs for pushing the draft forward.
> >
> > My comments inline.
> >
> > 2020年10月20日(火) 21:32 Lars Eggert <lars@eggert.org>:
> > > Hi,
> > >
> > > we are getting very close to publishing a new set of drafts that
> address Magnus' AD Review comments and will then be taken to IETF Last Call.
> > >
> > > The vast majority of changes were editorial, but there were three
> "design" issues that changed the protocol in non-editorial ways, for which
> we need to confirm WG consensus. These issues are:
> > >
> > > * #4183 Handshake failure (infinite ping-pong) when path MTU is
> asymmetric
> > >   https://github.com/quicwg/base-drafts/issues/4183
> >
> > Just to make sure, the solution is #4188 (merged on GitHub).
> > https://github.com/quicwg/base-drafts/pull/4188
> >
> > > * #4216 Connection Migration Failure when Path MTU is asymmetric
> > >   https://github.com/quicwg/base-drafts/issues/4216
> >
> > The solution is #4226 (open on GitHub).
> > https://github.com/quicwg/base-drafts/pull/4226
> >
> > > * #3701 The QUIC-TLS draft should define anti-forgery limits for
> packet lengths up to 2^16
> > >   https://github.com/quicwg/base-drafts/issues/3701
> >
> > The solution is #4175 (merged on GitHub).
> > https://github.com/quicwg/base-drafts/pull/4175
> >
> > Regarding #4183 and #4216, I have a tiny preference, in short, I think
> > #4253 (PR #4254) should be merged as part of the pair.
> > https://github.com/quicwg/base-drafts/pull/4254
> >
> > The two issues cover the same problem: how to fail when the MTU of the
> > path in one direction is below 1200 bytes. Both say "MUST pad to
> > datagrams to at least 1200 bytes," and that's fine. OTOH, #4183 says
> > that a receiver MAY close the connection if the sender fails to meet
> > the padding requirement. #4216 does not provide guidance to the
> > receiver side.
> >
> > For #4216, it is my understanding that we have to state that the
> > receiver MUST NOT try to enforce the behavior of the sender, as the
> > size of UDP datagrams is not authenticated. Ignoring unauthenticated
> > signal is the basis of a secure transport protocol. That in turn raises
> > the question on if the guidance that we adopted in #4183 (i.e. MAY
> > close) has been correct. To be precise, it is questionable if Initial
> > packets are "authenticated," as they are not protected by keys only
> > known to the endpoints. But still, it sticks out from the design
> > principle of a secure transport protocol.
> >
> > That's why I think we should merge #4254 alongside the other two, so
> > that we'd be principled, that we'd have less rules.
> >
> > >
> > >
> > > The resolutions for these issues are linked from the respective issue
> pages, and will be merged into the text of the upcoming draft revisions,
> together with the editorial changes.
> > >
> > > Instead of performing a separate WG Last Call and further delaying the
> start of the IETF Last Call, we've agreed with our AD to judge WG consensus
> on these design changes as part of the IETF Last Call.
> > >
> > > Thanks,
> > > Lars and Lucas
> >
> >
> > --
> > Kazuho Oku
>
>