Re: Getting to consensus on packet number encryption

Erik Kline <ek@google.com> Thu, 26 April 2018 01:46 UTC

Return-Path: <ek@google.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0991B12D95F for <quic@ietfa.amsl.com>; Wed, 25 Apr 2018 18:46:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.71
X-Spam-Level:
X-Spam-Status: No, score=-2.71 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zBDj0wLXUSu1 for <quic@ietfa.amsl.com>; Wed, 25 Apr 2018 18:46:32 -0700 (PDT)
Received: from mail-wm0-x236.google.com (mail-wm0-x236.google.com [IPv6:2a00:1450:400c:c09::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B9B78128961 for <quic@ietf.org>; Wed, 25 Apr 2018 18:46:31 -0700 (PDT)
Received: by mail-wm0-x236.google.com with SMTP id f6so10171975wmc.4 for <quic@ietf.org>; Wed, 25 Apr 2018 18:46:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=1SWHyw5Oonm1nbQ0W6KvPfh3S31OKnNp3H6AfLED5/U=; b=Ah59KXFWr9gp7XQ2K3z5qzdNQHDUzEVY2FZfJ2hDHKw8wLoAqrggNsCggswM5qMUPe MDBqxCbJP3D41vg/F2gLBb8mYia1WjArj3bpZwFQa6WaXlWiAOAjdt9REbAcD/uDxzci 9XJHPK1xBMr1RHNbzUcr/OQKz7FtV4N+0QoxiQQETwvMhnDvUvTsZ4yQrg6gKeXv37Y/ LhxO+9CC0dEcxTKlRfw3ME1yQtpBzkqWmtIP2ZqYsWh0Kj90VGWC9rf1g7RDd+LXjojm 2LXNjikA29Ts++h0GZgdM3YlS2IoOBdwdDS+sXXuGarVQ2z5LZOHu2LobG7iR/IE/bo0 DUhA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=1SWHyw5Oonm1nbQ0W6KvPfh3S31OKnNp3H6AfLED5/U=; b=ubEfc5ixhJ/agZyETlZtBKVZr7mV8tG3m8IYjkFp1kMw1Ea3EBXAopTNsQi6HBUWIH yZLOA/V2hmsOKCmkdjYYpxRApHmSKDnwojdYMvQq/UaSuIumVecfepFLy6zBgwKBwdq4 b8X7AxtcrLMgfoQxvptkY4VS3LNhq0NSU2sA16azrSoMoW/8LX/CJIsKMri0W/LqGEXY 79XaE2Pz3XyAvPqU/RcYFWMumNm8/cpwafIotc5IGk+uNBjIgCR4QrXjTP0W6NReNSfS /u5TgBi+6iGhKQtnvy5x/kKe/G93TBsKISDxQmfB1F7Cle0/jJayuii6VAz598mphXjG obmQ==
X-Gm-Message-State: ALQs6tB4HEfKnULwJz9IUsGSTKsk3pfsO6fSE2yjPkVH9JlFYWvv6S91 QIqu2DEHFaYAKlFh9xWZQZWfqWAfxrhN7G2n9brzOQ==
X-Google-Smtp-Source: AIpwx4/r1Pd8a4Ao5oGUYOf6+V9J0TySmMU42Z7LzLB2GfBMUSrtYB9OUgccA9RrUjcUojBv39gbXJvEWOIyUM2vzt4=
X-Received: by 10.28.6.149 with SMTP id 143mr17141469wmg.61.1524707189593; Wed, 25 Apr 2018 18:46:29 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.28.146.143 with HTTP; Wed, 25 Apr 2018 18:46:08 -0700 (PDT)
In-Reply-To: <CANatvzwCYrOZULG3iVmDFp97nr=M5=Gufo8TZjOGQVFUpsn0bQ@mail.gmail.com>
References: <7fd34142-2e14-e383-1f65-bc3ca657576c@huitema.net> <21C36B57-6AE2-40EF-9549-7196D7FA9B45@tik.ee.ethz.ch> <B176FC07-887D-4135-B01E-FE8B4986A5EE@mnot.net> <CAKcm_gOCeocLyrYpOS7Ud332xdz3xHSH0psPN8T6BGRjoL9ptQ@mail.gmail.com> <CY4PR21MB0630FA0EDD343396AD414641B6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <CAN1APde13JTzCvKFFvMd183Fka6QGD1kGBjsa9fcoLrYeA2hsA@mail.gmail.com> <CY4PR21MB0630C0FD4FBECBFEC3C863BBB6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <047d2ff0-ff8b-64c9-8983-0ecabeb9fea5@huitema.net> <B0F49097-F77A-4831-B68B-4266AA880A86@tik.ee.ethz.ch> <74E2F5C2-66AD-4902-8A4A-E481CC0A015C@fb.com> <75050158-3812-44F1-A01E-D70EED7FDFD6@tik.ee.ethz.ch> <BY2PR15MB0775B4ACF7DB9124E89016F0CDB00@BY2PR15MB0775.namprd15.prod.outlook.com> <c8e60ba4-d6be-c4fc-5bac-d569a28fb4e8@huitema.net> <56CE3592-EB1D-40A3-B1D2-965B238FA402@mnot.net> <ae7a63fe-0a32-893f-aa6b-e8d97b8ba87a@huitema.net> <1F436ED13A22A246A59CA374CBC543998B60C6DD@ORSMSX111.amr.corp.intel.com> <fc57394f-9516-04c0-0846-6d159b14bc9e@huitema.net> <SN1PR08MB1854FD2461597D81BEE31ED6DA8F0@SN1PR08MB1854.namprd08.prod.outlook.com> <CAKcm_gMRPXgCoZ958Oj4_Pnkvmc9a7PgNVS0iae0hCW7bLKqng@mail.gmail.com> <SN1PR08MB18545D0554DED1F83862EBFBDA8F0@SN1PR08MB1854.namprd08.prod.outlook.com> <CAKcm_gNMTQg-pV8vTXkMCTh48QPZ_ujyFSEKRYf+WurUFytaWw@mail.gmail.com> <CANatvzwCYrOZULG3iVmDFp97nr=M5=Gufo8TZjOGQVFUpsn0bQ@mail.gmail.com>
From: Erik Kline <ek@google.com>
Date: Thu, 26 Apr 2018 01:46:08 +0000
Message-ID: <CAAedzxqDcPXJUE83KVnDiU23PvqDcTCrc6rRMw09FexjJA-Y6Q@mail.gmail.com>
Subject: Re: Getting to consensus on packet number encryption
To: Kazuho Oku <kazuhooku@gmail.com>
Cc: Ian Swett <ianswett=40google.com@dmarc.ietf.org>, Christian Huitema <huitema@huitema.net>, Mark Nottingham <mnot@mnot.net>, IETF QUIC WG <quic@ietf.org>, Mike Bishop <mbishop@evequefou.be>, "Deval, Manasi" <manasi.deval@intel.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="001a1144234877640c056ab68e76"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/RLfC4Z6ZhdbjnCZfp5XlW0GC_3o>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Apr 2018 01:46:36 -0000

Couldn't a middlebox have a policy where it permits QUIC sessions w/o
PNE but blocks sessions with PNE?  Then implementations would be
forced to choose how adapt: break altogether, maybe try TCP, or
disable PNE and carry on.

On 26 April 2018 at 01:22, Kazuho Oku <kazuhooku@gmail.com> wrote:
> 2018-04-26 9:21 GMT+09:00 Ian Swett <ianswett=40google.com@dmarc.ietf.org>:
>> It has been, and I'm personally supportive of it, because I believe it'll be
>> useful for datacenter QUIC use cases.
>>
>> But the WG has to decide:
>>  1) Is it allowable to disable PNE?
>
> There are two concerns that PNE is trying to address: ossification and privacy.
>
> I won't mind if some portion of QUIC-like traffic has no mechanism to
> prevent ossification. This is because we can train the middleboxes to
> not ossify the PN field by having PNE in the majority of the traffic
> that they will see.
>
> OTOH, I would be worried of privacy implications. Once you define a
> protocol, it is hard to control how it is going to be used.
>
> But with that said, I think we might better wait to see if somebody
> still thinks he/she *needs* QUIC without PNE.
>
>>  2) What the mechanism is?  ie: Unilateral via TransportParams or negotiated
>> via an extension or ?
>>
>> On Wed, Apr 25, 2018 at 6:01 PM Mike Bishop <mbishop@evequefou.be> wrote:
>>>
>>> I think that’s been suggested before, though we’d need to sort out the
>>> details of what that looks like.  I don’t have a particular design in mind.
>>>
>>>
>>>
>>> From: Ian Swett [mailto:ianswett@google.com]
>>> Sent: Wednesday, April 25, 2018 12:57 PM
>>> To: Mike Bishop <mbishop@evequefou.be>
>>> Cc: Christian Huitema <huitema@huitema.net>; Deval, Manasi
>>> <manasi.deval@intel.com>; Mark Nottingham <mnot@mnot.net>; IETF QUIC WG
>>> <quic@ietf.org>
>>> Subject: Re: Getting to consensus on packet number encryption
>>>
>>>
>>>
>>> Hi Mike,
>>>
>>>
>>>
>>> To clarify, are you suggesting adding a way to disable packet number
>>> encryption via negotiation in the v1 spec as well as adopting #1079?  Or
>>> would the choice of whether PNE is to be used unilateral, such as a
>>> transport param?
>>>
>>>
>>>
>>> On Wed, Apr 25, 2018 at 3:54 PM Mike Bishop <mbishop@evequefou.be> wrote:
>>>
>>> Yes -- it seems that the biggest objection to #1079 was the difficulty in
>>> hardware implementation.  If we're hearing that hardware implementation is
>>> feasible at a reasonable cost, then I think we might have a winner.
>>>
>>> The CPU cost for a software implementation is still worth considering, and
>>> an option to not encrypt is probably reasonable to limit that burden for
>>> implementations / use cases that don't care.
>>>
>>> -----Original Message-----
>>> From: QUIC <quic-bounces@ietf.org> On Behalf Of Christian Huitema
>>> Sent: Wednesday, April 25, 2018 3:14 AM
>>> To: Deval, Manasi <manasi.deval@intel.com>; Mark Nottingham
>>> <mnot@mnot.net>
>>> Cc: quic@ietf.org
>>> Subject: Re: Getting to consensus on packet number encryption
>>>
>>> On 4/23/2018 6:55 PM, Deval, Manasi wrote:
>>>
>>> > I had brought up the issue with PNE several weeks ago as a barrier to
>>> > hardware offload. After further review, it looks like a hardware offload can
>>> > implement the PNE at a small cost.
>>> >
>>> > The implementation can modify current HW crypto accelerators to support
>>> > encrypting a buffer in the first pass and then encrypting packet number in
>>> > the 2nd pass as already discussed on this thread. The exact requirement
>>> > (header checksum, packet length encoding) is still in flux so there may be
>>> > some small variations depending on the accelerator and final algorithm
>>> > chosen for PNE. Future offload designs can do more to further reduce the
>>> > overhead.
>>>
>>> Thanks for the information, Manasi. I have modified the wiki page
>>> describing the PNE issues and alternatives to reflect this new data:
>>>
>>> https://github.com/quicwg/base-drafts/wiki/Summary-of-the-PN-encryption-issues-and-alternatives..
>>> With that new information, it appears that PR #1079 is superior to every
>>> other alternative.
>>>
>>> -- Christian Huitema
>
>
>
> --
> Kazuho Oku
>