Re: Is "Version Greasing" a new benfit or a new obstacle?

Ian Swett <ianswett@google.com> Fri, 12 April 2019 15:57 UTC

Return-Path: <ianswett@google.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 235E5120372 for <quic@ietfa.amsl.com>; Fri, 12 Apr 2019 08:57:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.5
X-Spam-Level:
X-Spam-Status: No, score=-17.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f1T4adf7ehe9 for <quic@ietfa.amsl.com>; Fri, 12 Apr 2019 08:57:38 -0700 (PDT)
Received: from mail-wm1-x32a.google.com (mail-wm1-x32a.google.com [IPv6:2a00:1450:4864:20::32a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F28E1200F6 for <quic@ietf.org>; Fri, 12 Apr 2019 08:57:38 -0700 (PDT)
Received: by mail-wm1-x32a.google.com with SMTP id z11so11940689wmi.0 for <quic@ietf.org>; Fri, 12 Apr 2019 08:57:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=i+OC+qFAcUupzUmPVIWL4T0W3BWtQp1gsZJjDEV7Njg=; b=bb4vtAGl5NLRzFUikQkOF9//dLByhFZsslQwM2fTqWRvc58S9L8e+VgzR56QAXajP9 xtsL2n31ltww/OofdYB7GHwD3vE+4p+CB8conHbX5kVnPA2qFGZg/qp0xmdiMiBTcGWi Qc/W6CTEnknHBcn4gA5u9oQqxsQfrCfCBvlsorTxxhBPPzeW1DEt/6gCgYhTQDF0tQb2 Do/CUM4g9CBMgPxBrnlnSUjYEV2us5IthiRawwiDcsmXeMNIGydWCmkh1zQSu83b/P1y 9hL9zzgPrbeB2BoASLMWc1SXqWhj2RwsoGCmW4Jk6tWcB4RFx42NXzhZfBG4YGHSZwhH E2OQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=i+OC+qFAcUupzUmPVIWL4T0W3BWtQp1gsZJjDEV7Njg=; b=UUj4MIwuND4mwXNATSfRnQ31QRcTjs9kzFg3IbRWiA7zaSj5SD89p7Nfkj+hJSK7P7 RTe27lSWXol7y/4xj9ITbUU/PF/EK+aQBLEN1aIoOgRfjU//Yp3VJDguG9TJCTubWma7 khu5ke+8/HtZvFHEgOV0QJP0tEvOzJCrwtxtigvcX4fHBVhKmBOp38xcnLbvb+wDfcQt LnqrxeJMEV8wrqjDCIMVekU2rqyhen52fanOWfDrrdlwZTdr47DyaEkT2jTcRsSGCoSS Ycu7xCqbHf63gdgJd0rSAsXZ3bmwRvOi1jmUjioxF4XLYvlPw6aKNPIHwKCW9p0v/xhE q62w==
X-Gm-Message-State: APjAAAWVFA+iRXLeQ+zvQhq7MAFyGZSBKGW6L9NyCSwQhv6E8iVpzbSQ jirlhuEhnK32hXnl3y444c7GIBNej060fPnHssjJdw==
X-Google-Smtp-Source: APXvYqx/IxQzvqxsm8jNc5QvZGkwfIBJGw0dl/S9Aryz2l/ZZcHo7FGvf9prJoha1ZApijPfNLq87IItjDHHdRPEpkI=
X-Received: by 2002:a1c:1f08:: with SMTP id f8mr10753240wmf.97.1555084656436; Fri, 12 Apr 2019 08:57:36 -0700 (PDT)
MIME-Version: 1.0
References: <5CADADDD.7010005@erg.abdn.ac.uk> <EBF1BF30-62A5-4659-8AEC-0D5B3F2D65C6@fb.com> <BL0PR11MB3394294313F8F54A3D0CF4A3902E0@BL0PR11MB3394.namprd11.prod.outlook.com> <CAN1APdcm0hnT_Mu7D7x5QM6pApOQw1RdWCBkgY16bd5YWNtFkA@mail.gmail.com> <9084B09D-5E13-49FA-BA93-0D7276CDE420@erg.abdn.ac.uk> <CAN1APdeSF0-_N=mb1xkoe_qLwoVqP+X9_Wawi=Zu__6wdHtbOQ@mail.gmail.com> <699E2135-A3CE-4D33-91F6-D3C96E66674F@ericsson.com> <CAN1APde2SO6fkNzyznbv2-xNuXkkuC=bN3p8xRgwmRAmsZxrgA@mail.gmail.com> <MW2PR2101MB104902B6BC7C67D8688EA852B6280@MW2PR2101MB1049.namprd21.prod.outlook.com> <MW2PR2101MB104996C29680DF7B79230C8CB6280@MW2PR2101MB1049.namprd21.prod.outlook.com>
In-Reply-To: <MW2PR2101MB104996C29680DF7B79230C8CB6280@MW2PR2101MB1049.namprd21.prod.outlook.com>
From: Ian Swett <ianswett@google.com>
Date: Fri, 12 Apr 2019 11:57:23 -0400
Message-ID: <CAKcm_gMwcwZ0VzK4vDt-sCQctHVrwOm9ekPPi3O3Y2UnRrZaBw@mail.gmail.com>
Subject: Re: Is "Version Greasing" a new benfit or a new obstacle?
To: Praveen Balasubramanian <pravb=40microsoft.com@dmarc.ietf.org>
Cc: Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>, "Gorry (erg)" <gorry@erg.abdn.ac.uk>, Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>, "quic@ietf.org" <quic@ietf.org>, "Border, John" <john.border@hughes.com>, Roberto Peon <fenix@fb.com>
Content-Type: multipart/alternative; boundary="0000000000008b6d1d0586575ce4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/iHd6SRRPKI-a7kFG9HwkGPqZjds>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Apr 2019 15:57:43 -0000

Possibly I'm missing something, but wouldn't version greasing be an
optional extension?  So if you wanted to do so you could, but those with
load balancing that couldn't handle it would not?

On Fri, Apr 12, 2019 at 11:55 AM Praveen Balasubramanian <pravb=
40microsoft.com@dmarc.ietf.org> wrote:

> Sorry for a typo. Plain old UDP not QUIC.
>
>
>
> *From:* Praveen Balasubramanian
> *Sent:* Friday, April 12, 2019 8:53 AM
> *To:* Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>; Gorry (erg) <
> gorry@erg.abdn.ac.uk>; Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
> *Cc:* quic@ietf.org; Border, John <john.border@hughes.com>; Roberto Peon <
> fenix@fb.com>
> *Subject:* RE: Is "Version Greasing" a new benfit or a new obstacle?
>
>
>
> Version greasing will create problems for DDoS protection. The DDoS
> protection middlebox will have to treat all traffic with unknown version
> numbers as plain old QUIC and rate limit it. Any solution that requires per
> connection state to track version numbers doesn’t scale. Especially in the
> cloud scenario customers bring their own web servers so this makes any
> opt-out solution not good enough. So I do think this is an obstacle for
> many deployments.
>
>
>
> *From:* QUIC <quic-bounces@ietf.org> *On Behalf Of *Mikkel Fahnøe
> Jørgensen
> *Sent:* Thursday, April 11, 2019 1:20 AM
> *To:* Gorry (erg) <gorry@erg.abdn.ac.uk>; Mirja Kuehlewind <
> mirja.kuehlewind@ericsson.com>
> *Cc:* quic@ietf.org; Border, John <john.border@hughes.com>; Roberto Peon <
> fenix@fb.com>
> *Subject:* Re: Is "Version Greasing" a new benfit or a new obstacle?
>
>
>
> In a not so distant future, a fallback to TCP would not be a viable
> alternative for a number of services. Think WebRTC.
>
> If QUIC and other encrypted protocols become dominant, just blocking
> everything would literally block everything.
>
> Of course, http(s) as we know it, it will continue to live on, but many
> mobile apps would not.
>
>
>
>
>
> On 11 April 2019 at 10.03.14, Mirja Kuehlewind (
> mirja.kuehlewind@ericsson.com) wrote:
>
> Hi Mikkel,
>
> I guess it is much more likely that any of those actors would just block
> QUIC all together (as there is actually a fallback to TCP).
>
> Mirja
>
>
>
> On 10.04.19, 21:57, "QUIC on behalf of Mikkel Fahnøe Jørgensen" <
> quic-bounces@ietf.org on behalf of mikkelfj@gmail.com> wrote:
>
>
> Let’s say China makes a deal with Google to allow their search engine (a
> not entirely unreasonably proposition).
> The Great Firewall of China (GFC) is reconfigured to accept traffic from a
> specific IP range for QUIC protocol v1.
>
>
>
> Google later upgrades to v2. GFC is updated. Later, out of ignorance, some
> other department within said company decides that its browsers should all
> use forced version aliases as a rule. GFC breaks. (Assuming Googles servers
> are not located within the demilitarised
> zone and users use Chrome).
>
>
> Alternative 1: Google up front decides to deploy forced version aliasing.
> China rejects the deal because they do not want to support random traffic
> through GFC.
>
>
> Alternative 2: Google up front decides to deploy forced version aliasing,
> and China does not reject the deal, out of ignorance. Later some department
> in China GFC oversight realises the deal and forces Google to remove forced
> version aliasing, or shut down
> its service.
>
>
> Alternative 3: Google up front decides to deploy forced version aliasing
> and China says, of course, we trust everything from Googles IP range.
>
>
> Alternative 4: Google realises that forced version aliasing does not work
> in the general case, and makes a special case for users within a certain
> geographical area.
>
>
> Disclaimer: I’m not affiliated with Google and this might not at all be
> how things would work, but it does highlight some of the challenges.
>
>
> Of course, to be fair, China is not the only government entity that might
> have a vested interest. Let's take a fictional example of US a real estate
> investor with heavy ties to the eastern european block who somehow finds
> himself elected as president needing
> to find leverage on trade negotiations without effectively hurting
> personal finances. It turns out that blocking certain digital services from
> said eastern european block is the perfect tool in the trade negotiations..
> Advisers point out that those services
> run heavily encrypted on the dark web with perpetual circulation of IP
> ranges so, ignoring any legal concerns, it would not be practically
> possible. Eventually someone figures out that these services all usually
> are at the forefront of technology and currently
> use QUIC v3.2 and no-one else has deployed that version yet, so it would
> suffice to ask NSA to tap into the backbone and disrupt specific packets.
> Of course, this ends up taking down the Bavarian local government election
> process in Germany where they are
> the first to use a new digital election system. Not that the is an issue,
> since trade negotiations are also running hot in that area, so that is just
> an accidental bonus.
>
>
> Or an endless number of other developments over the next few decades if
> the past few years is anything to go by.
>
>
>
>
>
> On 10 April 2019 at 20.13.59, Gorry (erg) (gorry@erg.abdn.ac.uk) wrote:
>
> Thanks Mikkel, I do understand that various actors intentionally drop -
> but are you saying these actors would specifically choose to block a new
> version of QUIC ... I do not understand that assertion.
>
>
> Gorry
>
> On 10 Apr 2019, at 18:25, Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>
> wrote:
>
>
>
> China blocks as a rule.
> Russia is running an experiment to block the rest of the internet.
> USA blocks net neutrality.
> EU blocks cookies.
> GB blocks itself.
>
>
> So blocking is not limited to what an operator considers best for
> business.
>
>
>
> On 10 April 2019 at 18.59.15, Border, John (john.border@hughes.com)
> wrote:
>
>
> I understand why people want to come down on the side of preventing
> ossification. But, things have changed. There are a lot of more negative
> consequences now when people unnecessarily block things. I think operators
> would put a lot of pressure on vendors to
> not do it now and to fix it if they did "by accident". Of course, I am
> only one operator. It would be nice to hear from others...
>
>
>
> John
>
>
> -----Original Message-----
> From: QUIC <quic-bounces@ietf.org> On Behalf Of Roberto Peon
> Sent: Wednesday, April 10, 2019 12:52 PM
> To: G Fairhurst <gorry@erg.abdn.ac.uk>;
> quic@ietf.org
> Subject: Re: Is "Version Greasing" a new benfit or a new obstacle?
>
> WARNING: The sender of this email could not be validated and may not match
> the person in the "From" field.
>
> CAUTION: This email originated from outside of the organization. Do not
> click links or open attachments unless you recognize the sender and know
> the content is safe.
>
>
> You're kinda between a rock-and-a-hard-place either way:
>
> - We've seen how much fun ossification is in TCP and HTTP. If the thing is
> observable, it will be ossified seems to be the lesson. A lot of the reason
> why QUIC was started in the first place was because of the inability to
> improve TCP due to this ossification.
> - OTOH, there is the fear of unknown/unobservable which might cause
> operators to block things, whether predictably or not.
>
> My opinion is that it is better to start with preventing ossification, and
> then if that results in too large a percentage of operators blocking
> things, to re-evaluate.
>
> My guesses:
> IP+port tuples and traffic patterns are still observable (for better and
> worse), which implies operators will still have significant tools for
> managing traffic. I believe that these are acted on/matched (ML or not)
> regardless of any other data presented. In
> other words, I have a doubt that stating the version in an observable way
> will prevent the use of such tools.
>
> Most problems I've seen associated with implementations rather than
> protocol versions (though when the latter happens it is pretty severe).. If
> you believe this assertion, then acting on protocol version is less
> interesting than attempting to act based on implementation
> fingerprints.
> -=R
>
>
> On 4/10/19, 1:48 AM, "QUIC on behalf of G Fairhurst" <
> quic-bounces@ietf.org on behalf of
> gorry@erg.abdn.ac.uk> wrote:
>
> Obscuring the version of a protocol seems like a major design design
> decision for wider use cases. So, I'm trying to understand the
> motivation for version greasing.
>
> (1) I know there were instances where some early versions of QUIC were
> blocked due to an uninitentional matching of the header. Is there
> evidence of intentional attempts to block updates to protocols?
>
> (2) Thinking about operating a network that cares about user support and
> protection from unwanted traffic, I would expect that there would be
> cases where traffic pattern anomolies are found and the appropriate
> thing would be to try to determine if a new protocol had been deployed
> and monitor it, if not, then the next most obvious thing could be to
> block all unexpected traffic, that seems like a decision to hide the
> version could increase ossification for new versions in these cases..
>
> (3) Similarly, if a threat is known to impact only a specific (older)
> version, it would seem to motivate a drop of that traffic that seeks to
> use that version, while still permitting other traffic. Forcing version
> detection to use pattern matching/ML will lead to less predictable
> outcomes, or blocking based on address, etc.
>
> (4) This obfusticates the most basic piece of reporting information used
> for support. It hides the extent of deployment of the current protocol
> version and prevlance of old implementations.
>
> (5) On the support, if a problem only emerges when a particular version
> is used with a particular address, then this helps pinpoint the issues.
> Matching client versions to servers is much more of an issue if the user
> community uses a wide range of servers (less so, I expect for major
> providers: google, facebook, etc, etc), but significant when there is a
> use of a diverse set of external sites and sites with their own load
> balancers, etc and a need to manage interactions with L2 services.
>
> I am intersted in knowing if this is likely to benefit or be a new
> obstacle?
>
> Gorry
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>