Re: Getting to consensus on packet number encryption

Eric Rescorla <ekr@rtfm.com> Thu, 05 April 2018 07:43 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2A81126DC2 for <quic@ietfa.amsl.com>; Thu, 5 Apr 2018 00:43:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qwhyH6CgLg0n for <quic@ietfa.amsl.com>; Thu, 5 Apr 2018 00:43:22 -0700 (PDT)
Received: from mail-oi0-x232.google.com (mail-oi0-x232.google.com [IPv6:2607:f8b0:4003:c06::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 51F35120725 for <quic@ietf.org>; Thu, 5 Apr 2018 00:43:22 -0700 (PDT)
Received: by mail-oi0-x232.google.com with SMTP id 188-v6so21682730oih.8 for <quic@ietf.org>; Thu, 05 Apr 2018 00:43:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=7NQ9owGve2xlWYhri9kmCPylJwRx//gqzRszTA15EnA=; b=oYvP1vHqOkNSgFL5T0sGCvzyweMXOkqo0c0QiEAl0rlmBpOijpaENgmx1onHmCrG59 rbtevwwpBq7p/Cwm3QIRSXvlU2lTu8NFAVJC4UvaBAvwcDWcIvG8OkreNzyMC7iyeja8 uW2pVAxLfThwN6kspV43YOya7Bsuz5QZ1qp/bs3YERdg99DO16t4ALWq2y32SBiHnSzH pv25kDFzNDFqaAIEO+TuYoZvY0mhWO6KmQn6PAlcGy5Dznj3F+lFbbLMqEkDWMo+nQ6W exXZKrVLvDDBX+d33H2JzekZvr3s4Qs4iFIbWSeWnP167BtAzHc19U4Z0IBvvtR5JtdC dCtA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=7NQ9owGve2xlWYhri9kmCPylJwRx//gqzRszTA15EnA=; b=WByq8n3Hwz4q6vc6nQ+HEVBSwoI/GoUlFFs7y9TmjzGbHbkAFWCcXLNKCNfr4fwH00 x0nPmhV+4nl4G1T+Ox09soSMM8u91lUWdY74tomNhsMMsYHDU60utn/Ek9OcDHm/tY+N Xi4CYGMoY7FecmuYNuUy2Z+VhvQVEgy8z/kJP5i5fReqdEJGV2D050UTKFRp/xZmGCum y8QPsyOsPr+lEZnOIhKT5X16l67lFj/JiWAkjk6odfo7PtgG7g5GX2m83Bm4KqRyOvfh rWYPjhqnuWF+LlyAoPw04nTSKB3WGXbViFkjb4z85QPJPDym2aewyLApEFKzpSD3d+91 ph3Q==
X-Gm-Message-State: ALQs6tBzEPWfWhbusoVfiCkoEDvJsP/vPJ6TKcU0OIDmPXwo6k8YQSw1 QMlU3frMwPgmgT/zVyUJSMcvA/CFJXJrm7QN+ini9g==
X-Google-Smtp-Source: AIpwx48g8dagfAwpFuuHByx8JXxV9dt/IPY0Y8Spusj17GR4BVmkCBntheVRe/16phk7NC96LAX81ysPoVZiOOu5sHg=
X-Received: by 2002:aca:b3d4:: with SMTP id c203-v6mr12692600oif.91.1522914201476; Thu, 05 Apr 2018 00:43:21 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.138.18.130 with HTTP; Thu, 5 Apr 2018 00:42:41 -0700 (PDT)
In-Reply-To: <047d2ff0-ff8b-64c9-8983-0ecabeb9fea5@huitema.net>
References: <7fd34142-2e14-e383-1f65-bc3ca657576c@huitema.net> <BBB8D1DE-25F8-4F3D-B274-C317848DE872@akamai.com> <CAN1APdd=47b2eXkvMg+Q_+P254xo4vo-Tu-YQu6XoUGMByO_eQ@mail.gmail.com> <CAKcm_gMpz4MpdmrHLtC8MvTf5uO9LjD915jM-i2LfpKY384O2w@mail.gmail.com> <HE1PR0702MB3611A67E764EE1C7D1644FAD84AD0@HE1PR0702MB3611.eurprd07.prod.outlook.com> <d8e35569-e939-4064-9ec4-2cccfba2f341@huitema.net> <CACpbDccqKoF-Y1poHMN2cLOK9GOuvtMTPsF-QEen3b30kUo9bg@mail.gmail.com> <CAKcm_gNffwpraF-H2LQBF33vUhYFx0bi_UXJ3N14k4Xj4NmWUw@mail.gmail.com> <40C1F6FE-2B2C-469F-8F98-66329703ED50@mnot.net> <21C36B57-6AE2-40EF-9549-7196D7FA9B45@tik.ee.ethz.ch> <B176FC07-887D-4135-B01E-FE8B4986A5EE@mnot.net> <CAKcm_gOCeocLyrYpOS7Ud332xdz3xHSH0psPN8T6BGRjoL9ptQ@mail.gmail.com> <CY4PR21MB0630FA0EDD343396AD414641B6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <CAN1APde13JTzCvKFFvMd183Fka6QGD1kGBjsa9fcoLrYeA2hsA@mail.gmail.com> <CY4PR21MB0630C0FD4FBECBFEC3C863BBB6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <047d2ff0-ff8b-64c9-8983-0ecabeb9fea5@huitema.net>
From: Eric Rescorla <ekr@rtfm.com>
Date: Thu, 05 Apr 2018 00:42:41 -0700
Message-ID: <CABcZeBOOaM6EzeFrmbQy8Sjnqx741-rjbtGHguGPrTActBce=w@mail.gmail.com>
Subject: Re: Getting to consensus on packet number encryption
To: Christian Huitema <huitema@huitema.net>
Cc: IETF QUIC WG <quic@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000000b628056915181e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/IJgA5YroLPC4AWkyltgeLZzM_4M>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Apr 2018 07:43:25 -0000

On Wed, Apr 4, 2018 at 5:44 PM, Christian Huitema <huitema@huitema.net>
wrote:

> If we are in the business of repeating our positions, so be it. I am
> pretty much on the same line as Patrick and others:
>
> 1) Privacy is not optional. And yes, removing "linkability through PN" is
> important, because when the connection ID and the source address also
> change, the only other cue for linkability is timing. Timing can be
> addressed by having overlapping connections.
>
> 2) Packet number encryption is the simplest of the many options presented
> so far. It is in particular much simpler to implement than the "predictable
> offset" scheme presented in previous drafts.
>
> 3) I am happy to discuss alternatives that appear simpler to implement in
> hardware, but so far the only plausible alternative is to insert an extra
> nonce in the packet header. Given birthday paradoxes and all that, this
> probably requires 8 extra bytes of overhead per packet, which is not very
> attractive.
>
8 seems pretty close to the line unless we are going to rekey *very*
frequently. Probably more like 12 bytes.

In any case, I concur that we should do PN encryption and IMO PR#1079 is
the best -- or at least close to the best -- design we have. I would prefer
to land it, and then if we find something better later, we can improve it
then.

-Ekr

-- Christian Huitema
>
> On 4/4/2018 4:42 PM, Praveen Balasubramanian wrote:
>
> What is the privacy issue if you are not doing migration? Migration + PNE
> (or multiple PN spaces) should go hand in hand.
>
>
>
> *From:* QUIC [mailto:quic-bounces@ietf.org <quic-bounces@ietf.org>] *On
> Behalf Of *Mikkel Fahnøe Jørgensen
> *Sent:* Wednesday, April 4, 2018 4:40 PM
> *To:* Praveen Balasubramanian <pravb=40microsoft.com@dmarc.ietf.org>
> <pravb=40microsoft.com@dmarc.ietf.org>; Ian Swett
> <ianswett=40google.com@dmarc.ietf.org>
> <ianswett=40google.com@dmarc.ietf.org>; Mark Nottingham <mnot@mnot.net>
> <mnot@mnot.net>
> *Cc:* Lars Eggert <lars@eggert.org> <lars@eggert.org>; IETF QUIC WG
> <quic@ietf.org> <quic@ietf.org>; Mirja Kühlewind
> <mirja.kuehlewind@tik.ee.ethz.ch> <mirja.kuehlewind@tik.ee.ethz.ch>
> *Subject:* RE: Getting to consensus on packet number encryption
>
>
>
> Without pro / con anything:
>
>
>
> Optional privacy does not work. In part it cannot be retrofitted when the
> need arise, in part it can be incriminating to enable.
>
>
>
> On 5 April 2018 at 01.22.38, Praveen Balasubramanian (
> pravb=40microsoft.com@dmarc.ietf.org) wrote:
>
> Make PNE (and hence connection migration) an optional negotiated extension
> in V1
>
>
>