Re: Packet number encryption

Marten Seemann <martenseemann@gmail.com> Wed, 07 February 2018 08:01 UTC

Return-Path: <martenseemann@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B204120726 for <quic@ietfa.amsl.com>; Wed, 7 Feb 2018 00:01:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VTEIjh1iRbZ8 for <quic@ietfa.amsl.com>; Wed, 7 Feb 2018 00:00:57 -0800 (PST)
Received: from mail-ua0-x230.google.com (mail-ua0-x230.google.com [IPv6:2607:f8b0:400c:c08::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 45F761204DA for <quic@ietf.org>; Wed, 7 Feb 2018 00:00:57 -0800 (PST)
Received: by mail-ua0-x230.google.com with SMTP id j23so2947129uak.13 for <quic@ietf.org>; Wed, 07 Feb 2018 00:00:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=jqocO9GK3Ue2AuzzFXnxQPn2WI274LnzmiaY6aCG5ag=; b=OwPhkSrojEPiR6Q5Mq+y0k4S2REri7Xau/OrvjnHzgq1hqaA8isGSfS8Sq42wYOfF1 KslI96n2dDAsle52gtqJqNvfNJt4C57db0yrV6FxH0hBkGVZ1xtqSuoUiq3+RzzxhD42 8CCPw/FjWVoWZJJHTfxL7dlWl2Xnz2MkftDtDKcsp3qCEqXBYBgXyfS0EBZiKq75JAWd hqnGtqWag4U52Y6sqxx9njOCLO1bIcFH/8aVoC3UjDFkfaYBQCoB56GvxlK+FyqaTj/E iYTtN7Y9mEBTeRU9FSR5JwFHCzAewGvKpkzlwxQ9QS/aTKdM4C3VN8SNnrS1yOT8djjt gXCw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=jqocO9GK3Ue2AuzzFXnxQPn2WI274LnzmiaY6aCG5ag=; b=VUHpipRwXP24jbpbDMDklFXCQegR+SUeFHJI9qYNrkLMZ5XpwWpJNjFh5iqbYvHbwu vsUfvLmZuuQwaG0IZNU7LjEyMiIZTvoc2Zeb/qBg3cZqmCA6t84Q36muI226GM1zSFES AxGnJhhwpMtW+eD9Vnrm9QU+FFBCw9AfB26tPiZ7UDLtAxwQ1YSLSCwSbs6ya/ADdLjp gtiQpUDCDx4P40chYvPkkIFsvrlp9xFkgnIQIstDEe4LUoWLo3tlNnNQfgruUHs1O4jN xiZ9PvbL/g5UBBaetostCX5XBT3Y1SUfegHTDDi/MflfpQtqCPy9HWqPn8OCekI/dhCk KQ+A==
X-Gm-Message-State: APf1xPB6SAX7ASCvOAmLgrb1+quN+A6CqNQPqcx3Lfim8QbGXtJq8Dml QYqdr/uoc37pNmb681VY5uQQvnQJEHKP3jU51IE=
X-Google-Smtp-Source: AH8x227dgNl8B78THU7orVDQ6w7TNClAOvBr1ZCJopEfncQYwJDeD3yGRRo5uttjcoqjLc5SW8DWALJyTV5QpFTfK3k=
X-Received: by 10.176.4.165 with SMTP id 34mr129189uaw.183.1517990456138; Wed, 07 Feb 2018 00:00:56 -0800 (PST)
MIME-Version: 1.0
References: <CABkgnnVyo3MmWtVULiV=FJTnR528qfY8-OmKGWAs0bCvri-a_g@mail.gmail.com> <2102BDC2-62C0-4A76-8ADE-8167437E2D07@trammell.ch> <CAN1APde6o6=aCXuWajPFSU=jXv-ERdVHk=uyjM71uQ_uU-oMTg@mail.gmail.com> <8e833029-68b5-2787-3897-a0f7818a259f@tik.ee.ethz.ch> <1de39727-eeec-0e7a-1e8b-5ed50433c5bd@cs.tcd.ie> <MWHPR08MB2432D0216BC8FE1B0D9E3690DAFD0@MWHPR08MB2432.namprd08.prod.outlook.com> <CAGD1bZauKbucs_5n7RQbK8H2HiyfiqpGVEcKreGA6umhMBSFgg@mail.gmail.com> <CABcZeBPNrc-9vANSH02r++p53s6gN4pVB8DMd80nUxOhKTp3dA@mail.gmail.com> <CAKcm_gMvHSBhpUvsQCCkV2_o+d_wchF3R3L6H8mp6nKNaaRmSw@mail.gmail.com> <CY4PR21MB0133CCAA6807469BA983D00BB6FC0@CY4PR21MB0133.namprd21.prod.outlook.com> <CABkgnnW4xr_YzpsvCxaJJgcQdBTuX=Yv735_sdd4VoMfji8mbA@mail.gmail.com> <CY4PR21MB0133C759D4A08A4988B641B2B6FC0@CY4PR21MB0133.namprd21.prod.outlook.com> <bdf88936-8edc-d56e-ee59-c9d597058edd@huitema.net> <CY4PR21MB01337C8A700E58B49D90B712B6FC0@CY4PR21MB0133.namprd21.prod.outlook.com> <119b3276-5799-1cc3-8982-7479171bbf27@huitema.net>
In-Reply-To: <119b3276-5799-1cc3-8982-7479171bbf27@huitema.net>
From: Marten Seemann <martenseemann@gmail.com>
Date: Wed, 07 Feb 2018 08:00:45 +0000
Message-ID: <CAOYVs2pi8-NVuS+crNMfjsP-n5upK3=5tPeQ8OSGpOvL6RTrjA@mail.gmail.com>
Subject: Re: Packet number encryption
To: Christian Huitema <huitema@huitema.net>
Cc: Praveen Balasubramanian <pravb@microsoft.com>, "quic@ietf.org" <quic@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c12585ae91f3605649ab1e1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/PvXQ50Bc3DslIhyrzbsdqsYL4U8>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Feb 2018 08:01:00 -0000

On Wed, Feb 7, 2018 at 3:20 PM Christian Huitema <huitema@huitema.net>
wrote:

>
>
> On 2/6/2018 8:55 PM, Praveen Balasubramanian wrote:
>
> First, the proposal does not obscure the position of the packet number field in the header. The field contains a number that increments with every packet, and is thus easy to identify. This means that middle-boxes will get accustomed to seeing that field and tracking its increments.
> Hence, this simple obfuscation provides no protection against ossification of the packet number field.
>
>
> Well it seems like it is a requirement (see bullet 3 in Jana's list) to allow middleboxes to see sequencing information. By picking the initial random value middleboxes cannot assume any particular value. If packet number location and size is not part of invariants then it cannot be ossified, middleboxes will need to be resilient.
>
>
> This is why I would rather see the exposed bits copied at a fixed
> location, while the PN itself cannot be located. That way, the exposed bits
> can ossify, but the actual PN does not.
>

We still need to be very careful here. If we decide to expose bits, we must
make sure that a middlebox can only extract coarse-grained information, if
we want to prevent middleboxes from buffering and delaying packets in order
to fix / reduce reordering.
At this point however, I'm not convinced that exposing any reordering
information to the network should be a requirement at all. There's a real
risk of misuse of this information, and of ossification of whatever bits we
expose.