Re: Consensus Calls for Transport/TLS issues, post-Cupertino

Eric Rescorla <ekr@rtfm.com> Wed, 30 October 2019 21:49 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74AF212011C for <quic@ietfa.amsl.com>; Wed, 30 Oct 2019 14:49:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zr9Qww2M8rfZ for <quic@ietfa.amsl.com>; Wed, 30 Oct 2019 14:49:25 -0700 (PDT)
Received: from mail-lj1-x235.google.com (mail-lj1-x235.google.com [IPv6:2a00:1450:4864:20::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A8F61200D6 for <quic@ietf.org>; Wed, 30 Oct 2019 14:49:25 -0700 (PDT)
Received: by mail-lj1-x235.google.com with SMTP id q64so4322233ljb.12 for <quic@ietf.org>; Wed, 30 Oct 2019 14:49:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=X4KlA0GNxWSk7ijvRjhrPNPuIGsaYqZoT0UXFQyZRIA=; b=IggEzGBBuNYMyYdXmZgwR4SnHWWsG0r5XIyrHzWiUOaQzNeQ9ql+/UO7qPg1g2H6/F 3E2H8WX8VW72XXIL4xNpD/dubnjsYhAKfFKL+N3Kuk30Nv0ZMgR76mISLX54TBVEBnaj p8MHUZVMg894/p4aIS2vi6GWR7ji4AUKYUGuUMEnq4/doIefcLr0WXvn20v12LTdSsFw wwAUJOmgIOEJgTcs1hR4gjWfC/wjRbGo8LCw/w0hkslqpJKSx9BFXSRR/a38uniFN9f3 DJ0IKfiJrg0OvYpxG6iunU34p2BmP3IzOWXculzpI6wekMARTM068B0A6OnyCGyp3R61 A/hg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=X4KlA0GNxWSk7ijvRjhrPNPuIGsaYqZoT0UXFQyZRIA=; b=A9pH2UGq5rWeT3pE3LzfKghomC4ZzyjH7PeGeIVOHZoSwbOXW5Kp2ryljr3aZ9Sdsq yVoWxUdYNnM47Q85vsJ2VZ8cjNbjabNRCqo2Hntmx57WBcCVDTC2Cmn+FwuOE35sbY7s u73SZ8Mc3yHuqvWuSMZT1nFvD6a3KoqpluyCQ0G6W3i7iMnfq26+Ae6x5PrIfQggU1Xp lkShe4zBCiVgEAo+DGJFjSERJh0aXVr67Lat+0BdmR1/WaARd18JTRhz3dPmH3ZrHz1N FS2hQnK0A5GaDW+ONHxDw+YeyGVHH/xJQqNvOm3+Ox7Yz7OqLwLwpKfCCkI0ArlH/UQw ZskA==
X-Gm-Message-State: APjAAAXU+0K/6toBAmk41RygZFYHFeCOtDfj9kqY2kee5BBkIxva6LBh zxgdmjC1NE9iGMSoseEpkx+Ru8GtK6J9MrorojHu5A==
X-Google-Smtp-Source: APXvYqw7AnHmyLpzHcI1pQySyYzFeDG8oEXi2v65xlugQA4DwzU7HbvwB7Ji6JtZmadDB0B+Vn/therIUNTu/zh9Bi0=
X-Received: by 2002:a05:651c:10c:: with SMTP id a12mr1305049ljb.93.1572472163584; Wed, 30 Oct 2019 14:49:23 -0700 (PDT)
MIME-Version: 1.0
References: <4D6397AF-B411-4E67-AFD2-76E8F2AD462C@mnot.net> <CANatvzwYA-NN+p5jLu4vpgKY_G-ZoUM03CacZWS2FAPyPqgiiw@mail.gmail.com> <BN3PR00MB0083E9A10A58F4CCC7B8A5C6B3680@BN3PR00MB0083.namprd00.prod.outlook.com> <22517ab5-9a6c-4486-b7ea-03badc064cbe@www.fastmail.com> <CANatvzx=RWB1Bio7tqX7nN_Vn1SfSaE69LZbuiU5pWeXP=BwNQ@mail.gmail.com> <DB6PR10MB176678E88FF226C2EB8FF78EAC680@DB6PR10MB1766.EURPRD10.PROD.OUTLOOK.COM> <CACpbDccOe01VBjwwy=mdSi5nync8bXa506OMTbLPpBH-hoj4Sw@mail.gmail.com> <CAPDSy+4S06qHBbitdH07Ah6gJYV+ZMY4huYLVGw14Q-n6isCrg@mail.gmail.com> <BN6PR2201MB17008576E4F8400B5DDB696FDA6B0@BN6PR2201MB1700.namprd22.prod.outlook.com> <CACpbDcf+n47NXh8XMEKx6n1fiJPZ+WyuivNmuBy1vKhZYZe6Uw@mail.gmail.com> <CAM4esxQYyTQPpF13v0AT4R=TcFOa9=UCn0nWsiqwMReYFOYDYg@mail.gmail.com> <CABcZeBM2QGC+wx-UUKMkJDqxKscOgJfhqwPhr7QXg3h-GpZwfQ@mail.gmail.com> <4d408d7a-7c50-4ccc-a42b-fb2b71b0c507@www.fastmail.com> <CABcZeBMdQPMeu862uizQYKr451Y9mvwhZ4MT7h_te5ho_Y9DOQ@mail.gmail.com> <98b890c7-d57f-484c-88d5-056e4e607465@www.fastmail.com> <CABcZeBP4BwBsySd8Phhg3fd3kTMoS6E=j5tit3pg7JKe7vrb6Q@mail.gmail.com> <1e5ae15f-56cf-47c5-930a-9f5bae59763b@www.fastmail.com> <CABcZeBP2yHXaaXYtAwYfqshrENwMaMCQsmnOd3KD2DurwGy8dg@mail.gmail.com> <CAN1APdeNFGuZh5gX0MBC-CotdSeHzrHk7jqUtZJKyCcFMc2aew@mail.gmail.com> <CABcZeBO_af+CZZse+-WpjRQWj35UjRpvZMTq0_wCGoMBQE0Z2g@mail.gmail.com> <CAN1APdcxvfjmzOvtdRWm5HXyyEmwAQYm2hYNCxmnFnUfgQJnGg@mail.gmail.com>
In-Reply-To: <CAN1APdcxvfjmzOvtdRWm5HXyyEmwAQYm2hYNCxmnFnUfgQJnGg@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Wed, 30 Oct 2019 14:48:46 -0700
Message-ID: <CABcZeBMryBDamWpuk2zdoP4FHUS5NRd+UUMJTwZanDJ+AU2i6A@mail.gmail.com>
Subject: Re: Consensus Calls for Transport/TLS issues, post-Cupertino
To: Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>
Cc: Jana Iyengar <jri.ietf@gmail.com>, Mike Bishop <mbishop@evequefou.be>, Martin Thomson <mt@lowentropy.net>, IETF QUIC WG <quic@ietf.org>, David Schinazi <dschinazi.ietf@gmail.com>, Martin Duke <martin.h.duke@gmail.com>, Kazuho Oku <kazuhooku@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000bae191059627b466"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/cyy3_kvGHQj2tGRdm7OBfxv-UY0>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Oct 2019 21:49:28 -0000

On Wed, Oct 30, 2019 at 2:33 PM Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>
wrote:

> If the goal is to decide when the handshake is complete at both ends in
>> finite time with high probability, then it appears that an explicit signal
>> is required because you cannot rely on random (organic) 1-RTT traffic to
>> drive this process.
>>
> Well, it's not clear to me that one needs to know this, actually. I agree
> we've used this as a proxy for various things, but it's not actually clear
> to me that we need to, so we should re-examine those cases to see what the
> real preconditions are.
>
> For one thing, I would be sad if an optimised implementation needs to
> handle multiple packet number spaces. That complicates implementations
> because you need to think performance through all layers. Of course you can
> just suck it up an deal with it. Likewise, you can probably find a way
> around path migration.
>
> By compared to sending a single 1-byte HANDSHAKE_DONE frame, why would you
> do that? To marginally simplify the handshake?
>
This isn't an argument that keeping the keys around doesn't work, but
rather that you think it's the wrong engineering tradeoff. It's possible
you're right about that, but I'd like to start by establishing the agreed
upon facts of what will and will not work before we debate engineering
tradeoffs.

-Ekr