Re: Opsdir last call review of draft-ietf-quic-manageability-14

"Brian Trammell (IETF)" <ietf@trammell.ch> Tue, 22 March 2022 12:53 UTC

Return-Path: <ietf@trammell.ch>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCD273A1598; Tue, 22 Mar 2022 05:53:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=trammell.ch
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4ihTIkRjIsPN; Tue, 22 Mar 2022 05:53:18 -0700 (PDT)
Received: from smtp-42aa.mail.infomaniak.ch (smtp-42aa.mail.infomaniak.ch [IPv6:2001:1600:4:17::42aa]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D5A363A12E8; Tue, 22 Mar 2022 05:53:08 -0700 (PDT)
Received: from smtp-2-0001.mail.infomaniak.ch (unknown [10.5.36.108]) by smtp-3-3000.mail.infomaniak.ch (Postfix) with ESMTPS id 4KNBH53LmyzMpvVG; Tue, 22 Mar 2022 13:53:05 +0100 (CET)
Received: from smtpclient.apple (unknown [IPv6:2001:67c:1232:144:25b4:bbe1:2bbd:39a9]) by smtp-2-0001.mail.infomaniak.ch (Postfix) with ESMTPA id 4KNBH50HNpzljsTR; Tue, 22 Mar 2022 13:53:04 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=trammell.ch; s=20191114; t=1647953585; bh=3wVNjfmBQieZp8XPzsmC/H977WWySa4iTJ13Cf5BEf8=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From; b=jRW2FJux7IAqUOenorEY10Pv+fcWLdAnu79OH8ZvyeEnpMpu9N5U8ZHmn/rSXwfmM IT2ZbhT9bGPGqjsq+6MeIM6XL+rZaYnCz5tsolMP3WNi44F7bedCm8inrishDZaBWb 6D8hsvNRDvjotYxk9El1Zf6Ik/FKv/kE1r1poRN8=
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.80.82.1.1\))
Subject: Re: Opsdir last call review of draft-ietf-quic-manageability-14
From: "Brian Trammell (IETF)" <ietf@trammell.ch>
In-Reply-To: <9f8d0243-c5c8-b335-96c8-57027e7da692@redbarn.org>
Date: Tue, 22 Mar 2022 13:53:04 +0100
Cc: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>, "quic@ietf.org" <quic@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "draft-ietf-quic-manageability.all@ietf.org" <draft-ietf-quic-manageability.all@ietf.org>, "ops-dir@ietf.org" <ops-dir@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <DB8CC21F-2F61-4553-B1A8-837252E81DA9@trammell.ch>
References: <CH0PR02MB7980CA04E5EADBF6D25AD8F2D3319@CH0PR02MB7980.namprd02.prod.outlook.com> <D82872C2-4C79-45AB-92F1-9F27B324ADE0@ericsson.com> <CH0PR02MB79803C4AF8ED0F28A5F81D30D3009@CH0PR02MB7980.namprd02.prod.outlook.com> <5224BCAC-B8EC-4150-B3B1-5735056BC54C@ericsson.com> <CH0PR02MB798003A25A1C96D02F1FE525D3069@CH0PR02MB7980.namprd02.prod.outlook.com> <346C0025-B1CB-4CAF-BB23-A7E09D79E9B5@ericsson.com> <DM8PR02MB7973BBE35F26700D004BF9A3D3119@DM8PR02MB7973.namprd02.prod.outlook.com> <9f8d0243-c5c8-b335-96c8-57027e7da692@redbarn.org>
To: Paul Vixie <paul=40redbarn.org@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3696.80.82.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/e-PQHo8beC2epmsXHK_OFmNrgjw>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 12:53:27 -0000

Hi Paul,

Thanks for the comments… a couple of points in reply inline...

> On 16 Mar 2022, at 20:57, Paul Vixie <paul=40redbarn.org@dmarc.ietf.org> wrote:
> 
> mirja, et al, in reviewing manageability-15, i see this text:
> 
>>   The QUIC wire image is not specifically designed to be
>>   distinguishable from other UDP traffic by a passive observer in the
>>   network.
> 
> i think this has an excluded middle problem, and should be changed to:
> 
> <<The QUIC wire image is specifically designed to be indistinguishable from other UDP traffic by a passive observer in the network.>> 
> 
> this follows from RFC 7258, and is uncontroversial in the light thereof.

It’s a bit more subtle than this, I think. There is a bit of distance between the QUIC wire image and “indistinguishable from other UDP traffic” in practice. udp/443 gets you most H3 traffic, the V1 wire image has a QUIC bit designed for multiplexing, etc. A truly observation-resistant wire image would have different properties.

What the design of QUIC does do is purposefully eliminate the role of intermediary third parties that do not cooperate with either endpoint, with a background understanding that the opportunities for abuse in this case outweigh the benefits to the first and second parties. It does this by reducing the observable surface (and eliminating the mutable surface) of that wire image. If a non-cooperative intermediate third party wants to interact with the mechanics of an application running over QUIC, it has the option of blocking QUIC, since all such applications must have a fallback to run on networks where UDP is blocked anyway. 

IOW, if you want to run a firewall protecting QUIC servers, you'll need to integrate that functionality with the front-end or load balancers. If you want to run a firewall protecting QUIC clients, or of protecting yourself from QUIC clients (exfil), you'll need to do that integrated with the clients, or through proxies. If you're not in a position to cooperate with either endpoint, then you're not part of the security architecture anymore, aside from forcing fallback to TCP or UDP.

But from a wire image standpoint, I believe the existing text is more accurate than the proposed change.

> further to this point, i'd like to suggest adding a paragraph to the end of section 3.1 (Identifying QUIC Traffic):
> 
> <<Management of QUIC traffic can never be reliable, and if it becomes so over time, then the QUIC wire image would be forced to evolve. Therefore a heuristic along the lines of "any unrecognizable UDP traffic could be QUIC" is the least unappealing way for a network operator to characterize their network's UDP traffic in the QUIC era.>>

This formulation seems to make the following assumptions:

- that management of other traffic can be reliable for some definition thereof, 
- that there is a implementably precise definition of “recognizable UDP traffic”,
- that traffic manageability necessarily requires uncooperative third-party intermediaries to be part of the security architecture,
- that the QUIC WG pursues as a matter of policy that QUIC be indistinguishable from UDP background and would evolve the protocol to protect against changes to that.

I’m not sure that any of those assumptions hold.

Thanks, cheers,

Brian