Re: Packet number encryption

"Brian Trammell (IETF)" <ietf@trammell.ch> Sun, 04 February 2018 20:53 UTC

Return-Path: <ietf@trammell.ch>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C9081241F8 for <quic@ietfa.amsl.com>; Sun, 4 Feb 2018 12:53:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ILK_iBBXWLBB for <quic@ietfa.amsl.com>; Sun, 4 Feb 2018 12:53:31 -0800 (PST)
Received: from gozo.iway.ch (gozo.iway.ch [212.25.24.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BFA23120725 for <quic@ietf.org>; Sun, 4 Feb 2018 12:53:30 -0800 (PST)
Received: from gozo.iway.ch (localhost [127.0.0.1]) by localhost (Postfix) with ESMTP id 8251534047F; Sun, 4 Feb 2018 21:53:29 +0100 (CET)
Received: from localhost (localhost [127.0.0.1]) by localhost (ACF/6597.25836); Sun, 4 Feb 2018 21:53:29 +0100 (CET)
Received: from switchplus-mail.ch (switchplus-mail.ch [212.25.8.236]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by gozo.iway.ch (Postfix) with ESMTPS; Sun, 4 Feb 2018 21:53:29 +0100 (CET)
Received: from [145.14.214.39] (account ietf@trammell.ch HELO [10.11.33.5]) by switchplus-mail.ch (CommuniGate Pro SMTP 6.1.18) with ESMTPSA id 44291466; Sun, 04 Feb 2018 21:53:29 +0100
From: "Brian Trammell (IETF)" <ietf@trammell.ch>
Message-Id: <E1ED531B-3EDE-4F03-AC96-23E3CD23E9BF@trammell.ch>
Content-Type: multipart/signed; boundary="Apple-Mail=_73E64CE4-3C03-4C33-A1D1-3E8063E3EB1A"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Subject: Re: Packet number encryption
Date: Sun, 04 Feb 2018 21:53:28 +0100
In-Reply-To: <66B2703B-1BE8-4065-A182-22A793B5998D@trammell.ch>
Cc: Gorry Fairhurst <gorry@erg.abdn.ac.uk>, Eric Rescorla <ekr@rtfm.com>, "Lubashev, Igor" <ilubashe@akamai.com>, Roberto Peon <fenix@fb.com>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>, "Fossati, Thomas (Nokia - GB/Cambridge, UK)" <thomas.fossati@nokia.com>, "Roni Even (A)" <roni.even@huawei.com>, "Eggert, Lars" <lars@netapp.com>, Jana Iyengar <jri@google.com>, Piotr Galecki <piotr_galecki@affirmednetworks.com>, QUIC WG <quic@ietf.org>, Martin Thomson <martin.thomson@gmail.com>
To: Christian Huitema <huitema@huitema.net>
References: <CABkgnnVyo3MmWtVULiV=FJTnR528qfY8-OmKGWAs0bCvri-a_g@mail.gmail.com> <1F7FB3B8-A94C-4354-9944-FB09FB8DB68B@trammell.ch> <CABcZeBMbwdwyC9TxxHBLYaZKfNB-FG2wCGjqUZ_mNR-A1R47FA@mail.gmail.com> <9096e5ec-581e-875a-b1dd-bff0b05206fd@huitema.net> <CABkgnnWRQSAufwPss+qf=xAzCwRYeNNH8XLPm3yFaHxOb+ba4g@mail.gmail.com> <BF80500A-6277-45DC-8525-9C3FE138B76D@tik.ee.ethz.ch> <5A7191E0.6010003@erg.abdn.ac.uk> <5214AD93-8376-4B25-922F-AF5551CC2E95@netapp.com> <F990E064-E6F8-41A3-B791-F776C9955E15@nokia.com> <CAGD1bZab0GaZFsHwC+nw3AxxC4VusxMJ6oDanzk3dSDdWKAXdw@mail.gmail.com> <2C515BE8694C6F4B9B6A578BCAC32E2F83BA1443@MBX021-W3-CA-2.exch021.domain.local> <BY2PR15MB07757473DB9788558B902EB5CDF80@BY2PR15MB0775.namprd15.prod.outlook.com> <6E58094ECC8D8344914996DAD28F1CCD861B7F@DGGEMM506-MBX.china.huawei.com> <e529144067624fcba636fc8c24ee3ff4@usma1ex-dag1mb5.msg.corp.akamai.com> <888DE2C2-4EDA-445A-B08F-76DD016C9CA0@huitema.net> <66B2703B-1BE8-4065-A182-22A793B5998D@trammell.ch>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/T89UVxzLa80TkRfAhYlcC2TfP5A>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Feb 2018 20:53:33 -0000

> On 4 Feb 2018, at 21:52, Brian Trammell (IETF) <ietf@trammell.ch> wrote:
> 
>> 
>> On 4 Feb 2018, at 18:40, Christian Huitema <huitema@huitema.net> wrote:
>> 
>> 
>> 
>> On Feb 4, 2018, at 7:18 AM, Lubashev, Igor <ilubashe@akamai.com> wrote:...
>>> 
>>> Having networks wrap and unwrap packets at their boundaries is a possibility, though it has real costs and downsides. First, while networks could setup such wrapping for UDP port 443 traffic, what about QUIC traffic using other ports?  Would networks need to wrap all UDP traffic?  Second, this does reduce MTU for end users, reducing available bandwidth.  Third, this would allow networks to only answer questions like: “Is my network the culprit of the problem?” instead of “Is the problem in my network, upstream from me, or downstream from me?”.
>> 
>> This is exactly why I believe the proper place for things like spin bits or short sequence numbers is in the IP header. That would be a really neat use of the IPv6 flow ID.
> 
> Let me say this again, more directly: the IPv6 flow ID will absolutely not work for this. It's used, when it's used, for ECMP entropy and other end-of-the-path routing things. This is equivalent to the problems with ECN on older hardware / configurations using TOS for ECMP entropy: reassign these

... and things will break in unexpected and hard to debug ways.

> 
> Measurement bits aren't flow identifiers. Overloading the latter to become the former because we don't want to deal with the protocol stack we've inherited is not a serious option.
> 
> If you've got data to the contrary, please share it. But saying this will work is an exceptional claim, and requires exceptional evidence.
> 
>>> 
>>> Would it be considered outrageous to suggest that packet number encryption be an option negotiated during connection handshake?  An end user client in “Privacy-Enhanced” mode would negotiate this, while end users not particularly concerned with connection migration linkability issues would leave this off?
>> 
>> Negotiate privacy off in the name of network performance? Very slippery slope! For example, the connections that do require privacy would stick out.
>> 
>> -- Christian Huitema