Re: Grips in the Wire Image for In-Network State (was Re: Privacy holes (was Re: Getting to consensus on packet number encryption))

Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com> Fri, 06 April 2018 09:44 UTC

Return-Path: <mikkelfj@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 73D77120725 for <quic@ietfa.amsl.com>; Fri, 6 Apr 2018 02:44:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level:
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f_LHGStoo2tJ for <quic@ietfa.amsl.com>; Fri, 6 Apr 2018 02:44:15 -0700 (PDT)
Received: from mail-it0-x22c.google.com (mail-it0-x22c.google.com [IPv6:2607:f8b0:4001:c0b::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 241731241F3 for <quic@ietf.org>; Fri, 6 Apr 2018 02:44:15 -0700 (PDT)
Received: by mail-it0-x22c.google.com with SMTP id h143-v6so1095845ita.4 for <quic@ietf.org>; Fri, 06 Apr 2018 02:44:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:in-reply-to:references:mime-version:date:message-id:subject:to :cc; bh=ckotiVvGsgX1AY2z3xStcLYD6P0Jts63CXrSORl4UeU=; b=EPtQORYqvzSEdHDFpJxbd38WE+SVLWr1H4flCkvxVjAEPZRH8XD2UClysXe8+mWOxP dcI/v5GQc+RjgQYTM6+URcjMjnKDNo+zqwBf96o/WxXqNp9SuhiZNPT1Q6ikyuiQ3NJ0 JIhYJVA+6RwdAqp+0injUC5XaMgEoBWEAzQqhTgmgCkiAoqH0A8cDv5qiIf+s1NBi604 Sudw7eaP+I2qAT9OuC8cZ3FzgGR28P/MEIy2ERTZm7VMStwzqC1ttvXoG/heT3tmInS1 CibDMlDOES6xlQFYwuTliLZRVJPhxuIJ6EzfOjKBNaiy66Wt3ePPyC0CaUDqVgra5nEV uRfw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:in-reply-to:references:mime-version:date :message-id:subject:to:cc; bh=ckotiVvGsgX1AY2z3xStcLYD6P0Jts63CXrSORl4UeU=; b=h7hbtf4yaJbobY2k+M0nCVVMYkRstaWgEtUrBR2PO/sQNHsMpeM8hH5PV1u9qXcCjn vIaTPkznOIjGmPbXTdRIcIDuGGaLjA9TcijoWmQsPS1wZbTEKzP0C0MD0OwZtnvXTyDU kP3YCiKsRvIPXosCpLMz8GnkcgatT2px+eIBQ90p9m6cHxp0omJfmRcIFO1IMEEpcHnk gNoRC8ZnMKRY/9rp8hItNj5TOdqBR8JTFvZlIGxeM2M80Uw1RndP94vY+fFStIaZbrDo GjU7LJ/YycwuSq0phGZCMqUGd5RFc3YW+Xwx6RlTiFQxLWactBOXbFGi77kcPOKVTYB5 D+rQ==
X-Gm-Message-State: ALQs6tD4U9rEoDrIKFhXq7Bvfa9CflIFrLo95ex1YNygPCJK44UEGBC0 73KPTM58AHjMdrtIKKTT/iiNU2odkxdCLCUVHLU=
X-Google-Smtp-Source: AIpwx48J6Xg65EOr0Y/vA0ZDKGswPmsU/Lu2ksP6mEUJQ/TecWgJ6zHzY55tDwomPEmFzWKZQmdXDxPYzfwEe9gq614=
X-Received: by 2002:a24:7088:: with SMTP id f130-v6mr17157508itc.39.1523007854427; Fri, 06 Apr 2018 02:44:14 -0700 (PDT)
Received: from 1058052472880 named unknown by gmailapi.google.com with HTTPREST; Fri, 6 Apr 2018 02:44:13 -0700
From: Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>
In-Reply-To: <FFEC6258-4B0F-473F-BAF6-28C655EE6DAF@trammell.ch>
References: <7fd34142-2e14-e383-1f65-bc3ca657576c@huitema.net> <BBB8D1DE-25F8-4F3D-B274-C317848DE872@akamai.com> <CAN1APdd=47b2eXkvMg+Q_+P254xo4vo-Tu-YQu6XoUGMByO_eQ@mail.gmail.com> <CAKcm_gMpz4MpdmrHLtC8MvTf5uO9LjD915jM-i2LfpKY384O2w@mail.gmail.com> <HE1PR0702MB3611A67E764EE1C7D1644FAD84AD0@HE1PR0702MB3611.eurprd07.prod.outlook.com> <d8e35569-e939-4064-9ec4-2cccfba2f341@huitema.net> <CACpbDccqKoF-Y1poHMN2cLOK9GOuvtMTPsF-QEen3b30kUo9bg@mail.gmail.com> <CAKcm_gNffwpraF-H2LQBF33vUhYFx0bi_UXJ3N14k4Xj4NmWUw@mail.gmail.com> <40C1F6FE-2B2C-469F-8F98-66329703ED50@mnot.net> <21C36B57-6AE2-40EF-9549-7196D7FA9B45@tik.ee.ethz.ch> <B176FC07-887D-4135-B01E-FE8B4986A5EE@mnot.net> <CAKcm_gOCeocLyrYpOS7Ud332xdz3xHSH0psPN8T6BGRjoL9ptQ@mail.gmail.com> <CY4PR21MB0630FA0EDD343396AD414641B6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <CAN1APde13JTzCvKFFvMd183Fka6QGD1kGBjsa9fcoLrYeA2hsA@mail.gmail.com> <CY4PR21MB0630C0FD4FBECBFEC3C863BBB6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <759C5BE4-DE4C-4A82-929C-B03234B88A37@huitema.net> <CAJGwveB=qs+J2iBQRs3d5jdGuP9yBWoAgv0t3mwD=Wrf6Q5g8g@mail.gmail.com> <F395D018-FFCA-405F-BBD5-1313C6F6DAF9@huitema.net> <CABkgnnWAgGJaKs8teKTURiNDRA61fRhN6pxYQuD1MbkPDqasKQ@mail.gmail.com> <2F06334E-C3DF-4034-A6A4-AF383505D930@trammell.ch> <CABkgnnX1=h4qx+3YjXj=ZME5ihZbJ2rqE8zeT4j84dJj0ZfZGg@mail.gmail.com> <29F2FB1B-3A82-4E60-A4A5-70AC36CEEC54@trammell.ch> <CANatvzzoAK0SRrLOfz6HecbsE3oevWWkzJcfhceuqECF0VL=MA@mail.gmail.com> <FFEC6258-4B0F-473F-BAF6-28C655EE6DAF@trammell.ch>
X-Mailer: Airmail (420)
MIME-Version: 1.0
Date: Fri, 06 Apr 2018 02:44:13 -0700
Message-ID: <CAN1APddN4xaDm=mzXJd4g1hsxnfaDOYHckaUAFjOU-ZHWzyKWA@mail.gmail.com>
Subject: Re: Grips in the Wire Image for In-Network State (was Re: Privacy holes (was Re: Getting to consensus on packet number encryption))
To: "Brian Trammell (IETF)" <ietf@trammell.ch>, Kazuho Oku <kazuhooku@gmail.com>
Cc: Frederick Kautz <fkautz@alumni.cmu.edu>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>, QUIC WG <quic@ietf.org>, Martin Thomson <martin.thomson@gmail.com>, Christian Huitema <huitema@huitema.net>
Content-Type: multipart/alternative; boundary="0000000000002742fa05692ae65a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/JCrWPnbHE-KFIqU7CziNswYkaFo>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Apr 2018 09:44:17 -0000

Adding a “grib” sounds reasonable.

I previously mentioned my concern with CID ossification because length or
content might be used in lack of anything better.

The defense suggested - to grease the CID, will not work when a load
balancer says “I only support QUIC connections that use CID length x, and
sets the upper two bits like this.”, and this load balancer then gets a big
market share. Then greasing is out the window.

So it is better to provide an explicit signal for the cases that are
immediately obvious.

Kind Regards,
Mikkel Fahnøe Jørgensen


On 6 April 2018 at 11.39.07, Brian Trammell (IETF) (ietf@trammell.ch) wrote:

Hi, Kazuho,

> On 6 Apr 2018, at 11:14, Kazuho Oku <kazuhooku@gmail.com> wrote:
>
>> It's multiplicative by a factor of three, which means that the max flow
concurrency will reduce by a factor of three. I agree it's probably
tolerable, but we do need to understand what we're actually getting for
that cost. I remain dubious about the actual privacy benefits WRT third
party passive surveillance here -- they don't accrue at all unless there's
a CGNAT in the way that doesn't bind an address/port range to a customer at
a given point in time. In the common case, ISTM that just burn more
in-network state than they additionally require at the surveillance point
to track the change. Defenses with such scaling curves are not a good idea.
>>
> I think I share the same concern.
>
> One way to minimize the impact could be to suggest certain amount of
connections (e.g., 5%) to gratuitously migrate to a new tuple just once,
right after the connection is being established.
>
> If we specify that way, we can assume that the impact on the NAT will be
having 5% more flows. Middlebox vendor that mistakenly tries to use the
cleartext bits in the packet header as the signal of connection initiation
will also see failures at the same rate.

If the goal is only ossification agility, ensuring that migration can
actually work, then this seems like a much better approach.

However, I would submit that if we think we are in a position where:

- there is a strong incentive for firewalls/NATs to want to see start- (and
end-) of flow (which seems to me to be the threat model we're trying to
mitigate with this); and

- we do not want arbitrary information in the QUIC wire image to be used to
detect these conditions, since that might cause bits of the wire image we
don't want to end up in the accidental invariants;

then we really should consider adding explicit advisory flow state signals,
both for establishment and teardown. The theory here is that if you give
in-network functions a "grip" in the wire image of the protocol they can
use for state management, they won't try to grab on to the slippery bits.
Together with probabilistic migration, these signals would divorce "on-path
state" from "transport session state", reducing the privacy impact with
respect to SYN/FIN in TCP.

(The alternative is to make the wire image so inscrutable that on-path
state tracking becomes completely futile and goes away. I'm not sure we're
that good at inscrutable wire images.)

Cheers,

Brian