Re: Is "Version Greasing" a new benfit or a new obstacle?

Mirja Kuehlewind <mirja.kuehlewind@ericsson.com> Thu, 11 April 2019 08:11 UTC

Return-Path: <mirja.kuehlewind@ericsson.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D215812011D for <quic@ietfa.amsl.com>; Thu, 11 Apr 2019 01:11:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OjuSQw199S-J for <quic@ietfa.amsl.com>; Thu, 11 Apr 2019 01:11:16 -0700 (PDT)
Received: from FRA01-PR2-obe.outbound.protection.outlook.com (mail-eopbgr120049.outbound.protection.outlook.com [40.107.12.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5F191200F8 for <quic@ietf.org>; Thu, 11 Apr 2019 01:11:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hOMsJq2aqg7v9tq4DvHqoszHAlOlzlTpCgNTh2NiR7c=; b=c/UQVFqcgwvfhLH21xUU3jHPITUtkch7MVKIafrgGsF41itZrQgKRjNYSqgY2sI7p9TsAL4HMndJWUZdcvCf0OzFKFjYfj2RxI4rtj1P82QrFrVoCJPZ+Wc/G8mycwZjioLH6Y7TBTqpIYCml4F/y4y60cYxdZuS3itcI+/Qw1Q=
Received: from PR1PR07MB5898.eurprd07.prod.outlook.com (20.177.212.19) by PR1PR07MB5020.eurprd07.prod.outlook.com (20.177.209.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1792.12; Thu, 11 Apr 2019 08:11:12 +0000
Received: from PR1PR07MB5898.eurprd07.prod.outlook.com ([fe80::9d5b:fab9:4cc2:2f0d]) by PR1PR07MB5898.eurprd07.prod.outlook.com ([fe80::9d5b:fab9:4cc2:2f0d%5]) with mapi id 15.20.1792.009; Thu, 11 Apr 2019 08:11:12 +0000
From: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
To: Martin Thomson <mt@lowentropy.net>, "quic@ietf.org" <quic@ietf.org>
Subject: Re: Is "Version Greasing" a new benfit or a new obstacle?
Thread-Topic: Is "Version Greasing" a new benfit or a new obstacle?
Thread-Index: AQHU73pAMRMlXHrk8EeORXfrw42uF6Y2MXSAgACNXwA=
Date: Thu, 11 Apr 2019 08:11:12 +0000
Message-ID: <0B91FC74-DDF4-4D9D-80E5-274C3956E85E@ericsson.com>
References: <5CADADDD.7010005@erg.abdn.ac.uk> <d749e9e5-301a-4dde-83f7-86a95e80ff07@www.fastmail.com>
In-Reply-To: <d749e9e5-301a-4dde-83f7-86a95e80ff07@www.fastmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=mirja.kuehlewind@ericsson.com;
x-originating-ip: [192.176.1.97]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: fe710863-37b5-4309-c27c-08d6be55431e
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600139)(711020)(4605104)(2017052603328)(7193020); SRVR:PR1PR07MB5020;
x-ms-traffictypediagnostic: PR1PR07MB5020:
x-microsoft-antispam-prvs: <PR1PR07MB50204B7FCB1DB0B0E00D92B8F42F0@PR1PR07MB5020.eurprd07.prod.outlook.com>
x-forefront-prvs: 00046D390F
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(136003)(366004)(376002)(39860400002)(346002)(189003)(199004)(3846002)(110136005)(6512007)(44832011)(6506007)(256004)(5660300002)(6486002)(305945005)(8936002)(14444005)(7736002)(6436002)(66066001)(33656002)(229853002)(2616005)(8676002)(81166006)(11346002)(476003)(105586002)(446003)(186003)(76176011)(102836004)(106356001)(26005)(68736007)(81156014)(486006)(71200400001)(71190400001)(6246003)(83716004)(53936002)(478600001)(66574012)(36756003)(6116002)(14454004)(97736004)(2501003)(82746002)(86362001)(316002)(25786009)(2906002)(99286004); DIR:OUT; SFP:1101; SCL:1; SRVR:PR1PR07MB5020; H:PR1PR07MB5898.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: vIAwJixuek5lQEFpp9tNAHXYq4xzrgIY6Ae3qNW0I79elk1O3maiJ76qf5QEjHv9gSdtiQl0/hVKwNtJSgJZctQh0s0iSvi4wgmYWvuP9KgRYPk9SeejkiFpPjE5rQKSa6W7cc4mJ9/pIRZXVo7EA4onv4OSs58drkkoGDDOcH8pzB9rUsHZte0j+UqRM828FGc5vuRF/BPU6JZXDrPy6HSP8l83I9uwdDvZ+eS8gGU0VUQkeZ+RlBDjAqv3R5NiuWVmKmubJ0mZxk11s0iUD2+fS+QsFOJC17z2nDKHowskFd8s8S8YZoLU8E1i7VP2vNDe1XzEZSFfsghnSaWRL9/mG3r7xc8klp83HTPQgiTWQt3+n9Sn0h91uEZM2ieQMBCHzkZMU61BNGtYSmUq6xqwepS939U5oxfo5Az7d6o=
Content-Type: text/plain; charset="utf-8"
Content-ID: <FE34A583F75ACC448B587DD990F8EF16@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fe710863-37b5-4309-c27c-08d6be55431e
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Apr 2019 08:11:12.6370 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR1PR07MB5020
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/JcQ-5tXVF1pO7rSSFE8rFlelmM4>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Apr 2019 08:11:19 -0000

Hi Martin,

I'm still very undecided what is the better choice now: paying the additional complexity cost straight away and for everybody (basically out of fear based on past experience but without taking into account that the circumstances may have changed as Gorry mentioned) or having to add one of the those, from a design point of view, ugly hacks potentially later (which still may be less complex). It might be silly to "not" learn from the past but it might also be a chance. Maybe I'm a bit naïve here but I don't want to give up yet. But I also uncertain because we all can predict the future. However, I think the important plan is to have a usable path for version updates (even thought it might be a hack).

Mirja



On 11.04.19, 03:45, "QUIC on behalf of Martin Thomson" <quic-bounces@ietf.org on behalf of mt@lowentropy.net> wrote:

    It's always possible to come up with a scenario where the network helps here, but the cost of help is the risk of harm.
    
    I would cast this question differently: who has the right(?) to decide when a new version of the protocol is permitted?  The motivation behind this is that it is considerably more likely if only endpoints are involved in that process.
    
    The architectural consequences of protecting a "clean" version negotiation process are what makes me positive about this change.  It is always possible to invent a new version negotiation process that looks very much like QUIC v1, but enables the use of v2.  That is what we ended up doing for the TLS 1.2 to 1.3 transition.  For instance, you could learn that you can negotiate QUICv2 by changing the case of certain characters in the server_name extension.  Or you could use the ordering of transport parameters to signal the support for an alternative version.  If you are willing to tolerate a risk of downgrade, then you can even negotiate different versions in a way that can't be detected without access to session keys.
    
    I don't want to have to repeat the ugly hacks we had to add to TLS.  If we can deploy aliasing, I have a little hope that we can use the versionin gmechanism we have designed.
    
    On Wed, Apr 10, 2019, at 18:48, G Fairhurst wrote:
    > Obscuring the version of a protocol seems like a major design design 
    > decision for wider use cases. So, I'm trying to understand the 
    > motivation for version greasing.
    > 
    > (1) I know there were instances where some early versions of QUIC were 
    > blocked due to an uninitentional matching of the header. Is there 
    > evidence of intentional attempts to block updates to protocols?
    > 
    > (2) Thinking about operating a network that cares about user support and 
    > protection from unwanted traffic, I would expect that there would be 
    > cases where traffic pattern anomolies are found and the appropriate 
    > thing would be to try to determine if a new protocol had been deployed 
    > and monitor it, if not, then the next most obvious thing could be to 
    > block all unexpected traffic, that seems like a decision to hide the 
    > version could increase ossification for new versions in these cases.
    > 
    > (3) Similarly, if a threat is known to impact only a specific (older) 
    > version, it would seem to motivate a drop of that traffic that seeks to 
    > use that version, while still permitting other traffic. Forcing version 
    > detection to use pattern matching/ML will lead to less predictable 
    > outcomes, or blocking based on address, etc.
    > 
    > (4) This obfusticates the most basic piece of reporting information used 
    > for support. It hides the extent of deployment of the current protocol 
    > version and prevlance of old implementations.
    > 
    > (5) On the support, if a problem only emerges when a particular version 
    > is used with a particular address, then this helps pinpoint the issues. 
    > Matching client versions to servers is much more of an issue if the user 
    > community uses a wide range of servers (less so, I expect for major 
    > providers: google, facebook, etc, etc), but significant when there is a 
    > use of a diverse set of external sites and sites with their own load 
    > balancers, etc and a need to manage interactions with L2 services.
    > 
    > I am intersted in knowing if this is likely to benefit or be a new obstacle?
    > 
    > Gorry
    > 
    >