Re: Handling consensus on design issues identified during AD Review

Kazuho Oku <kazuhooku@gmail.com> Tue, 20 October 2020 14:33 UTC

Return-Path: <kazuhooku@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2788A3A0DA6 for <quic@ietfa.amsl.com>; Tue, 20 Oct 2020 07:33:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UAQG59GOvT_Y for <quic@ietfa.amsl.com>; Tue, 20 Oct 2020 07:33:30 -0700 (PDT)
Received: from mail-ed1-x52e.google.com (mail-ed1-x52e.google.com [IPv6:2a00:1450:4864:20::52e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 768C43A0FCD for <quic@ietf.org>; Tue, 20 Oct 2020 07:32:54 -0700 (PDT)
Received: by mail-ed1-x52e.google.com with SMTP id dg9so2063926edb.12 for <quic@ietf.org>; Tue, 20 Oct 2020 07:32:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=9tXMEOCoSv7x6NcRMLrbCvUrZ/xNvWFctjNd1F4ZyVE=; b=TN4vyrkntBak0Og0osrH8UC0qCZN7SNTLebBm9sLdCCIhuYdc2xp36qj1Pmie5Jem2 HkhhMNQGLfCaetr1cVSlvNushkHmldmVP3HuNJMYsyGdQNApGa2sCM8NvWJGM6hULd+6 6jeMmh5kJ78WdXPMLWaJYZYrTK8cpYiuhMyYNdl/8Mrg8ydnT5KpAcpWZ/lzoxkZ9ql9 p3vGvPa4gChIAA/AMqy04N78yufD3//8kAhtkEvaGX5ASrQEzAonM3w91bSkmYXWLRnm uF3YRgKATwD9m8voMc68K+le4lDQuVUP7W5Z4dS8vMsZa+h62sdXu//zVxtVyORce9H0 x+Bw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=9tXMEOCoSv7x6NcRMLrbCvUrZ/xNvWFctjNd1F4ZyVE=; b=Tgx5qmNDxYyNk7tHUcZkUJXnUkCz4FkY9KY71Y1GIjZbPibJXGd+oGhotxMhGZxW88 2D6xH73dMQ/7BNE7OdpGZIsqLpP1Q2cpycduM4kn8YdBq92SaKYFV67ldEl6radkDp1K UwQF9waRk6RwoGv4ORx207q5Wnp8u2e1lw5eg7071U9Drbg9QBSRF7Fg8wTLYVRWYcfv pVsmlwuAv6u7+nMXmWpRKROol913c2kl8PwJoI/PZZWBLm+SaAWfpMuFDU9dJwRvScXR sQP616eFCMi4ddeg63lY4qySWaO/ZXyLIsbGueo5xXvC/iUzqEm4umuTi5uAwO1y1qRH y6sA==
X-Gm-Message-State: AOAM530dA1QLl8u4CjA1eBiXu5fzgblt2vVuHEW6V8dwKoZUUkFBcead yhHIxcAd8A33NG0SKEr4MOUiXPBWIadi53XuWdg=
X-Google-Smtp-Source: ABdhPJxpBXKUqCci+OJrTNdi871/81dkS3bTntvy9nZAeJzIuT8LLUpLldh3xebB8wpkOc1LI15+x1PPCEbWh1d/FLU=
X-Received: by 2002:a50:852a:: with SMTP id 39mr3141763edr.63.1603204372988; Tue, 20 Oct 2020 07:32:52 -0700 (PDT)
MIME-Version: 1.0
References: <77CE8B82-23CB-40D0-B28C-B2BC1BEABED3@eggert.org>
In-Reply-To: <77CE8B82-23CB-40D0-B28C-B2BC1BEABED3@eggert.org>
From: Kazuho Oku <kazuhooku@gmail.com>
Date: Tue, 20 Oct 2020 23:32:41 +0900
Message-ID: <CANatvzwgVRGnJN_HCCDvYwZh7ix4=NEV7a_HOJPb1tnNUokSyw@mail.gmail.com>
Subject: Re: Handling consensus on design issues identified during AD Review
To: Lars Eggert <lars@eggert.org>
Cc: QUIC WG <quic@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000278b9405b21b1b7c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/IpfLKdKmq9WAVlTMb0m2NkEXqys>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Oct 2020 14:33:32 -0000

Thanks to chairs / editors / ADs for pushing the draft forward.

My comments inline.

2020年10月20日(火) 21:32 Lars Eggert <lars@eggert.org>:

> Hi,
>
> we are getting very close to publishing a new set of drafts that address
> Magnus' AD Review comments and will then be taken to IETF Last Call.
>
> The vast majority of changes were editorial, but there were three "design"
> issues that changed the protocol in non-editorial ways, for which we need
> to confirm WG consensus. These issues are:
>
> * #4183 Handshake failure (infinite ping-pong) when path MTU is asymmetric
>   https://github.com/quicwg/base-drafts/issues/4183


Just to make sure, the solution is #4188 (merged on GitHub).
https://github.com/quicwg/base-drafts/pull/4188


> * #4216 Connection Migration Failure when Path MTU is asymmetric
>   https://github.com/quicwg/base-drafts/issues/4216


The solution is #4226 (open on GitHub).
https://github.com/quicwg/base-drafts/pull/4226

* #3701 The QUIC-TLS draft should define anti-forgery limits for packet
> lengths up to 2^16
>   https://github.com/quicwg/base-drafts/issues/3701


The solution is #4175 (merged on GitHub).
https://github.com/quicwg/base-drafts/pull/4175

Regarding #4183 and #4216, I have a tiny preference, in short, I think
#4253 (PR #4254) should be merged as part of the pair.
https://github.com/quicwg/base-drafts/pull/4254

The two issues cover the same problem: how to fail when the MTU of the path
in one direction is below 1200 bytes. Both say "MUST pad to datagrams to at
least 1200 bytes," and that's fine. OTOH, #4183 says that a receiver MAY
close the connection if the sender fails to meet the padding requirement.
#4216 does not provide guidance to the receiver side.

For #4216, it is my understanding that we have to state that the receiver
MUST NOT try to enforce the behavior of the sender, as the size of UDP
datagrams is not authenticated. Ignoring unauthenticated signal is the
basis of a secure transport protocol. That in turn raises the question on
if the guidance that we adopted in #4183 (i.e. MAY close) has been correct.
To be precise, it is questionable if Initial packets are "authenticated,"
as they are not protected by keys only known to the endpoints. But still,
it sticks out from the design principle of a secure transport protocol.

That's why I think we should merge #4254 alongside the other two, so that
we'd be principled, that we'd have less rules.


>
> The resolutions for these issues are linked from the respective issue
> pages, and will be merged into the text of the upcoming draft revisions,
> together with the editorial changes.
>
> Instead of performing a separate WG Last Call and further delaying the
> start of the IETF Last Call, we've agreed with our AD to judge WG consensus
> on these design changes as part of the IETF Last Call.
>
> Thanks,
> Lars and Lucas
>


-- 
Kazuho Oku