Re: Packet number encryption

Eric Rescorla <ekr@rtfm.com> Wed, 07 February 2018 00:14 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D27AF12DA1A for <quic@ietfa.amsl.com>; Tue, 6 Feb 2018 16:14:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KkmPQhs1T4jF for <quic@ietfa.amsl.com>; Tue, 6 Feb 2018 16:14:14 -0800 (PST)
Received: from mail-yw0-x232.google.com (mail-yw0-x232.google.com [IPv6:2607:f8b0:4002:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0488A1242EA for <quic@ietf.org>; Tue, 6 Feb 2018 16:14:14 -0800 (PST)
Received: by mail-yw0-x232.google.com with SMTP id v196so2689012ywc.6 for <quic@ietf.org>; Tue, 06 Feb 2018 16:14:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=f6jAW4CsRxQamotzpftf1KZtSYQ9ymg3qgWlcm34Ics=; b=dxm8HW8HgEwp3TaC2hEv3f3MOU3D3cGMpp3SIyaluN3B6fzgnWUXzpzhe236vS4/8x 439VuHVwMdHE1VTkgFHg2+MPkm0cKIxO/qi0qFkxkDbydpT9kDVHgiyQPBdCIR8iDLfC cKJ7zxLSKGkXe0E8U/SPs2MCZX3yni2NyOdxscxWbjWbP6pvhFrxfo8g6eb0UMn/ct40 RSCk++2gAEq4ygpAaNI0ytSv2UJqkcHVDc4zw5ULf6UBc02Gm7NN6AKzlTNmn7tkTjhO EwannDnrb+K0zZSOPJ6YZuq632zrC7fMN4tt/+aKFVptabgR3QpJY1vqMASqgEKcdOp5 xQNQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=f6jAW4CsRxQamotzpftf1KZtSYQ9ymg3qgWlcm34Ics=; b=TdivS6K4Mxik5XT826XnMo9br9L2QFwStdsKt6NX30AqjwAnNMupVfEE61UAjRe2BN GVD6nBPhILY175B2PumOnfqe0ne/s5DrMVlpBKs1ev6IBBZ+ETPAtm573MhOSjMBODpF dw8zqoHmiDn3oVWB4Rs2zRDO7vOjNwUOXQFjCLk3a/8BJiosJK1zeLCcO5GoGG5hgbj7 rjGRhJBW2sFz36cO2Q59iA5j6lHtkXg44enGTNrAFAZl2N+vjSYXLKVlYUGvhta+8Gzm MY4qivCxIkWIHg1yn6WU0JUJT4EV6P3tsO6p/vP7bj1x1SvoQJeeT0oFhqqSpAs8ksst EQgg==
X-Gm-Message-State: APf1xPCckh4mI3fVmUnvLV55BU3J1mxjRMuRm8CvsC8XxSbvGhOdFfPs ruywQbm17CByPzyQ6SmXpm4PMbfvryUkfU+k7cNVRw==
X-Google-Smtp-Source: AH8x226IYjxYS2sau/5p0KjClHTndot4TxLzz2VIs+Ri+7HWEMF7DDhzr8gGtTPj30lOzEtEpt4YFBwl94NU99ZbDA4=
X-Received: by 10.37.239.79 with SMTP id w15mr2650410ybm.293.1517962453135; Tue, 06 Feb 2018 16:14:13 -0800 (PST)
MIME-Version: 1.0
Received: by 10.129.160.201 with HTTP; Tue, 6 Feb 2018 16:13:32 -0800 (PST)
In-Reply-To: <CAGD1bZauKbucs_5n7RQbK8H2HiyfiqpGVEcKreGA6umhMBSFgg@mail.gmail.com>
References: <CABkgnnVyo3MmWtVULiV=FJTnR528qfY8-OmKGWAs0bCvri-a_g@mail.gmail.com> <2C515BE8694C6F4B9B6A578BCAC32E2F83BA1443@MBX021-W3-CA-2.exch021.domain.local> <BY2PR15MB07757473DB9788558B902EB5CDF80@BY2PR15MB0775.namprd15.prod.outlook.com> <6E58094ECC8D8344914996DAD28F1CCD861B7F@DGGEMM506-MBX.china.huawei.com> <e529144067624fcba636fc8c24ee3ff4@usma1ex-dag1mb5.msg.corp.akamai.com> <BY2PR15MB07754D83A1721F2BD742359BCDFE0@BY2PR15MB0775.namprd15.prod.outlook.com> <2CD9DC43-D69B-43F0-8474-DFE798850A52@akamai.com> <CAGD1bZaUuNxqpDkn62B0wWcFD8=mCUWrAwWGG-rAOxH7Mf1=cQ@mail.gmail.com> <CY4PR21MB01334E30C7AF6AE75F58EEFDB6FE0@CY4PR21MB0133.namprd21.prod.outlook.com> <CAGD1bZaxrqzdkk0wxRaULwOTgg6wnrSrXNBK31s4uxdozaACBA@mail.gmail.com> <CAGD1bZbOAaSBcQw4nVtGuwRunaAW8MYHq9yPxNN6DdKHzt5HtQ@mail.gmail.com> <2102BDC2-62C0-4A76-8ADE-8167437E2D07@trammell.ch> <CAN1APde6o6=aCXuWajPFSU=jXv-ERdVHk=uyjM71uQ_uU-oMTg@mail.gmail.com> <8e833029-68b5-2787-3897-a0f7818a259f@tik.ee.ethz.ch> <1de39727-eeec-0e7a-1e8b-5ed50433c5bd@cs.tcd.ie> <MWHPR08MB2432D0216BC8FE1B0D9E3690DAFD0@MWHPR08MB2432.namprd08.prod.outlook.com> <CAGD1bZauKbucs_5n7RQbK8H2HiyfiqpGVEcKreGA6umhMBSFgg@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Tue, 06 Feb 2018 16:13:32 -0800
Message-ID: <CABcZeBPNrc-9vANSH02r++p53s6gN4pVB8DMd80nUxOhKTp3dA@mail.gmail.com>
Subject: Re: Packet number encryption
To: Jana Iyengar <jri@google.com>
Cc: Mike Bishop <mbishop@evequefou.be>, Praveen Balasubramanian <pravb@microsoft.com>, "Lubashev, Igor" <ilubashe@akamai.com>, Roberto Peon <fenix@fb.com>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>, "Salz, Rich" <rsalz@akamai.com>, "Brian Trammell (IETF)" <ietf@trammell.ch>, Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>, QUIC WG <quic@ietf.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Content-Type: multipart/alternative; boundary="089e0828a13ccd4c330564942cbb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/iSOH9xXIaaEUEP1h1m4x5G5hYfs>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Feb 2018 00:14:17 -0000

On Tue, Feb 6, 2018 at 3:00 PM, Jana Iyengar <jri@google.com> wrote:

> I'm going to try a different attempt at moving towards
> convergence. Thinking about this some more, and picking up something that
> Mirja said way earlier in this thread, I think the following decomposition
> is useful.
>
> 1. In the transport, all packet numbers start at 0, increasing
> monotonically. ACK frames carry these packet numbers, and therefore do not
> have to span large gaps and do not have to deal with increases in the size
> of the largest acked. Basically, no gaps are visible within the transport
> processing engine.
> 2. Before sending a packet on the wire, and before processing the packet,
> QUIC transforms the packet number with some function, replacing the visible
> packet number with the transformed value.
>
> I think we can all agree that (1) is goodness. A sender is also free to
> use packet numbers from non-contiguous spaces here FWIW, but that's
> entirely independent of what's visible on the wire. This helps me separate
> transport processing complexity from the rest of it, which I think is
> helpful.
>
> I think we are disagreeing on the precise properties we want from the
> transformation in (2). If we can agree on these properties, we can then
> figure out whether it's possible and how to construct such a transform.
> Here's a union of what folks are concerned about:
> 1. Packet number must be unlinkable across connection ID change (for
> migration.)
> 2. Packet number must start at an arbitrary value, to avoid ossification
> of the first packet number.
>
3. Some sequencing information -- a few bits of the packet number perhaps
> -- should be revealed (for monitoring. Number of bits TBD.)
>

I'm not sure I am persuaded of this point

-Ekr


> 4. Any packet number transformation should not be compute intensive.
>
> I'm not looking for a construction, but I'd like to agree on the problem
> first. Does this sound like the set of properties we want? Or is there a
> contradiction among these properties that I'm not seeing?
>
> On Tue, Feb 6, 2018 at 9:56 AM, Mike Bishop <mbishop@evequefou.be> wrote:
>
>> Packet number encryption *does* improve linkability equivalently to
>> random jumps, but without the fragmentation of the ACK packet which those
>> jumps otherwise cause.  So I'm with Stephen, we don't yet have agreement on
>> that assertion.
>>
>> -----Original Message-----
>> From: QUIC [mailto:quic-bounces@ietf.org] On Behalf Of Stephen Farrell
>> Sent: Tuesday, February 6, 2018 7:35 AM
>> To: Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>; Mikkel Fahnøe
>> Jørgensen <mikkelfj@gmail.com>; Brian Trammell (IETF) <ietf@trammell.ch>;
>> Jana Iyengar <jri@google.com>
>> Cc: Praveen Balasubramanian <pravb@microsoft.com>; QUIC WG <quic@ietf.org>;
>> Roberto Peon <fenix@fb.com>; Lubashev, Igor <ilubashe@akamai.com>; Salz,
>> Rich <rsalz@akamai.com>
>> Subject: Re: Packet number encryption
>>
>>
>>
>> On 06/02/18 15:23, Mirja Kühlewind wrote:
>> >
>> > It's also my understanding that we do agree that packet number
>> > encryption does not help likability (and thereby privacy) a lot, or at
>> > least that the benefits we might get (or not) do not justify the
>> > additional complexity.
>>
>> FWIW, which isn't much, I don't (yet) agree to the above.
>> I reckon it'll be a while before we know how linkability pans out. I do
>> agree that packet number encryption is not a panacea for unlinkability, but
>> it may help, or may even end up being required, to do a good job wrt
>> linkability.
>>
>> I also heard people say it was less complex for them so "additional
>> complexity" may also not be quite right. (I guess "differently complex" is
>> correct though.)
>>
>> S.
>>
>> --
>> PGP key change time for me.
>> New-ID 7B172BEA; old-ID 805F8DA2 expires Jan 24 2018.
>> NewWithOld sigs in keyservers.
>> Sorry if that mucks something up;-)
>>
>
>