Re: Questions about Version Negotiation Concerning Possible Handshake Interruption

Martin Thomson <martin.thomson@gmail.com> Fri, 09 February 2018 10:11 UTC

Return-Path: <martin.thomson@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D330A127342 for <quic@ietfa.amsl.com>; Fri, 9 Feb 2018 02:11:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5vX_EBx7d9as for <quic@ietfa.amsl.com>; Fri, 9 Feb 2018 02:11:09 -0800 (PST)
Received: from mail-ot0-x234.google.com (mail-ot0-x234.google.com [IPv6:2607:f8b0:4003:c0f::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B71E126CB6 for <quic@ietf.org>; Fri, 9 Feb 2018 02:11:09 -0800 (PST)
Received: by mail-ot0-x234.google.com with SMTP id f18so7247640otf.6 for <quic@ietf.org>; Fri, 09 Feb 2018 02:11:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=TRSr/+eF98ET0YWumd84J2j5M2ZQqyF+p6L/R0FRjLE=; b=PxDNB0MaT6tv6I1PIDZznCQo9RGKHriXfkEzJIQPcIuaPTDy0ABg0AOIcz4HjhEsXU 5TeJvdFVMoj5EiECddLhMV/pti6B9SLxedUgifueLPXEl+PTnuF4qtXuNt8H2wzL9PTJ bkujZwobqXQW83VGebu8D7DoL4RcKjTwMYsGckMQSUvlW9Pfmxm0OUyxurxYRKJoTeMQ GlEzPvCV03pYpMoDlnj3AiLZtqXJJIHVkDJQ4tZP0YL4B4LfBFUbJbY40/CXPrkvapRV QFHrr2tsCpHKFh01uh2BpGbkHINGAJcgPF4e0CXWh3vG1BKa2HZ5k8QUjpkK7n5Vom0m qgog==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=TRSr/+eF98ET0YWumd84J2j5M2ZQqyF+p6L/R0FRjLE=; b=UlwfB1uMbWB+V81FaHQvmBnLHbNwyhaHVIFHhyy0Qqq29xyUR6jEQev9nGJ+f8y7PT PuYt0rsrFBJssvPcfrllrxo2BIozCdwP674BiZ0Qibk4ncLL7O+Vcc/xDOKTCa3o3PP/ Sc+9wPri/rB298ECQ54BwgEdCG2jmkfkViZ20C0KNQhLENHqn3f2JDAyD8MHNhrlTOMs PbXlE9B6N8oUY094YTNhBF+nMFr9XJHKj/WOl/Va4Qf/j+LnTNIkGJRqmDgoI0GXqDIB dyU9ZjU47ayOZBkyqLCqF0HOpDRFQeCGkOaUBAT3KIdRtx9QfblMBu91LR3P0AQRCBf9 ndgQ==
X-Gm-Message-State: APf1xPDKfMdhJo1YHRavjXYlVcuIkTHKD9BRzD1H03lMJPI1Bxeke7FN Bg7xFRbtBxZySGgOMRhOAeUinHwoND+r0fSuyDQ=
X-Google-Smtp-Source: AH8x226kmZ0tNxFtUTCanKG4z4m/RPkXrj/HgQmZFms5lPp3vKk9dQiXxnlaBTW3fs42p3rKEq0l3YVaa8KWFMM8ZFU=
X-Received: by 10.157.46.206 with SMTP id w72mr1833586ota.16.1518171068877; Fri, 09 Feb 2018 02:11:08 -0800 (PST)
MIME-Version: 1.0
Received: by 10.157.52.196 with HTTP; Fri, 9 Feb 2018 02:11:08 -0800 (PST)
In-Reply-To: <1d386744-c46a-842a-b172-24e290e03668@gmail.com>
References: <1d386744-c46a-842a-b172-24e290e03668@gmail.com>
From: Martin Thomson <martin.thomson@gmail.com>
Date: Fri, 09 Feb 2018 21:11:08 +1100
Message-ID: <CABkgnnVRn+1sNZQFB8BZc4VyzN5usLmYJ3xLo+p2uTeW_0Ji_Q@mail.gmail.com>
Subject: Re: Questions about Version Negotiation Concerning Possible Handshake Interruption
To: Lingmo Zhu <zlm2006@gmail.com>
Cc: "quic@ietf.org" <quic@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/bleAVNjvITiY4Zr-HkKRJ_vY72I>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Feb 2018 10:11:11 -0000

Any spoofed version negotiation packet will be detected once the
handshake completes: the server is required to include its list of
supported versions in the TLS handshake.  See the link Mikkel provided
for details.

On Fri, Feb 9, 2018 at 8:34 PM, Lingmo Zhu <zlm2006@gmail.com> wrote:
> Hi
>
> I'm new to QUIC and not sure if that could be considered but for Version
> Negotiation with the same connection ID as Initial packet, client should
> choose an acceptable version from the list. What if spoofing from something
> like router happens? Should mitigations be considered, such as adding a
> delay for validated Version Negotiation handling so that following handshake
> packets could be received later and that fake Version Negotiation could be
> ignored?
>
> Such concerning is just come out from DNS hijacking which is partially
> similar, though for QUIC it would only interrupt the handshake. I'm not sure
> but it might be used by downgrade attack in the future. Of course I'm new to
> this field so my opinion would be wrong.
>
> Thanks.
>
> Lingmo Zhu
>