Re: Packet number encryption

Martin Thomson <martin.thomson@gmail.com> Thu, 01 February 2018 00:00 UTC

Return-Path: <martin.thomson@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B873F12EB05 for <quic@ietfa.amsl.com>; Wed, 31 Jan 2018 16:00:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EelJTgUWVgb0 for <quic@ietfa.amsl.com>; Wed, 31 Jan 2018 16:00:16 -0800 (PST)
Received: from mail-oi0-x22d.google.com (mail-oi0-x22d.google.com [IPv6:2607:f8b0:4003:c06::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 537A412EC7F for <quic@ietf.org>; Wed, 31 Jan 2018 16:00:16 -0800 (PST)
Received: by mail-oi0-x22d.google.com with SMTP id e15so1891665oiy.2 for <quic@ietf.org>; Wed, 31 Jan 2018 16:00:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=RxgN15OKkrUrfti7FFrYvJM5SmFp8w8u19oATId6Vho=; b=jzhP/jazY8M78SeCl2WKQjmbctMEIrKn/h5mfPhot1OPK5TQK+vURlAq6Aq0YVLkN/ oBsBqvGpE3zkpJxQsB3p/AgHYMzGFX9w7zNbbvsr19o9ej8KGXZXY7qBSBHtQL0UZSxt gS3dFxbBQKyWRCd+v21mta9/ksQr4+nTlbTlJMJPI+R0HL+DFWS7tYxaZixUOTzkeVnI 3yyYm37SgvQGUmGV/gd8jb8iLDD4s7XrQZWDoUrw4ZutY6BrGiUvBgK0pMTPjDJ4acnI g92AbthEOOcpXFzhYj0ADQKSbQ06lnd/au+evU9dPuvZtN/F17WkyksA8xh4RHgpx1C3 2fIw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=RxgN15OKkrUrfti7FFrYvJM5SmFp8w8u19oATId6Vho=; b=eR5vi0f2M0UFGg2GIe0nKIne/Y9L0ctjf5UXywp/LeW17Ct0E7218h0SxDu+obrN3g S/Cl3ghWyH9Q89rzFI2Xdv6cQ9c5K5ah2Xwq+kKnoiPxTD37sEXXZs/o4oRbiidV8wV1 dmq+prIOFjjYn+4TXT9IpL4M+hK3VUrEq6aMq9tvj4rSqqMxpyGPwQZ8PvFvp7vMtzek lCEg1iRHCLjsOWfVxFv8o4hYxzloxDxj1yM2mkzXAt1q+LOC4rzuesSR26mqwN7qih2x gvg53uZ8PqtJe80jgZ7hOD1ejdF9Q5Mfw8YziQGliJjXhP/7C1B86f6jEWDR17/qWZ2m v74Q==
X-Gm-Message-State: AKwxytesQdfmA2na0wmTsFWGDoGQ1JkMi8FsAZ3JhhG1xHc/cIvGjV1E EjCRdS4zrQyocr6flYvWp4Xr8jVXHTdHBUS3L/I=
X-Google-Smtp-Source: AH8x224RHMyRM9Cd+bHV6RbAqbVhN0qkPUX9NKaG109i7c5mdtuR6bMgGeCgcuMjLgDjkSW6H6Baf8drGZknvdvAooU=
X-Received: by 10.202.1.86 with SMTP id 83mr14093495oib.84.1517443215514; Wed, 31 Jan 2018 16:00:15 -0800 (PST)
MIME-Version: 1.0
Received: by 10.157.52.249 with HTTP; Wed, 31 Jan 2018 16:00:15 -0800 (PST)
In-Reply-To: <827BA6F8-5CA8-420A-B18B-60D8BC134A46@fb.com>
References: <CABkgnnVyo3MmWtVULiV=FJTnR528qfY8-OmKGWAs0bCvri-a_g@mail.gmail.com> <1F7FB3B8-A94C-4354-9944-FB09FB8DB68B@trammell.ch> <CABcZeBMbwdwyC9TxxHBLYaZKfNB-FG2wCGjqUZ_mNR-A1R47FA@mail.gmail.com> <9096e5ec-581e-875a-b1dd-bff0b05206fd@huitema.net> <CABkgnnWRQSAufwPss+qf=xAzCwRYeNNH8XLPm3yFaHxOb+ba4g@mail.gmail.com> <BF80500A-6277-45DC-8525-9C3FE138B76D@tik.ee.ethz.ch> <827BA6F8-5CA8-420A-B18B-60D8BC134A46@fb.com>
From: Martin Thomson <martin.thomson@gmail.com>
Date: Thu, 01 Feb 2018 11:00:15 +1100
Message-ID: <CABkgnnUD5CfhNiRhB897pjbi2MQMbcar89SKEgEJepgOsuUc2A@mail.gmail.com>
Subject: Re: Packet number encryption
To: Roberto Peon <fenix@fb.com>
Cc: Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>, Brian Trammell <ietf@trammell.ch>, Eric Rescorla <ekr@rtfm.com>, QUIC WG <quic@ietf.org>, Christian Huitema <huitema@huitema.net>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/ikE7OqH29ch421Wpoe-ljeom5gQ>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Feb 2018 00:00:18 -0000

Roberto makes a point I keep forgetting.  This would allow clients to
alternate between connection IDs in a way that the protocol currently
cannot support.

And that reminds me of another thing: Jana/Eric's connection migration
design depends on something like this.  Simpler designs that use a gap
or randomized offset for each connection ID make linkability trivial
if you are alternating between paths in the same way that alternating
between connection IDs might.

On Thu, Feb 1, 2018 at 10:25 AM, Roberto Peon <fenix@fb.com> wrote:
> There are two obvious goals/benefits:
> 1) Slow/prevent ossification.
> 2) Raise the barrier higher for tracking/flow correlating.
>
> If we have multiple CIDs (which are valid on more than one 5-tuple) and “multipath” (one could imagine switching between a bunch of IPv6 addresses which go to the same hosts) we can require a higher storage baseline before traffic can be correlated. This is where I believe #2 really comes into play.
>
> #1 is nothing to sneeze at: experience with TCP has shown very real harm from having things which allow sequencing of packets in the clear (unable to roll out changes which should have been compatible). To me, this is the primary use-case: maintaining future flexibility.
>
> -=R
>
> On 1/30/18, 11:45 PM, "QUIC on behalf of Mirja Kühlewind" <quic-bounces@ietf.org on behalf of mirja.kuehlewind@tik.ee.ethz.ch> wrote:
>
>
>
>     > Am 31.01.2018 um 04:08 schrieb Martin Thomson <martin.thomson@gmail.com>:
>     >
>     > On Wed, Jan 31, 2018 at 8:00 AM, Christian Huitema <huitema@huitema.net> wrote:
>     >>> (1) An unprivileged on-path device that sees a packet from a flow that is
>     >>> migrated on purpose by an endpoint (i.e., due to connection migration or
>     >>> multipath) should not be able to associate that packet to the prior flow.
>     >>
>     >> Yes.
>     >
>     > Agreed.  This remains the primary target.  I don't think that there
>     > are any negatives with this design with respect to this use case (or
>     > at least I found nothing in Brian's email on this point).
>
>     If that is the goal, I think the complexity of the proposed solution is not justified. Just select a new random offset when you migrate but increase the packet number monotonously otherwise to support manageability.
>
>     I’m really concerned about complexity here. Even though this scheme is not very complex, any complexity is a potential source for future implementation errors which can also led to restrictions in what changes can be deploy with future versions. Making a protocol as simple as possible and thereby the spec as easy understandable as possible is also key for deployment. If we add complexity here without making it clear what the goal or additional benefit is of the complexity, I think that is just wrong.
>
>     My 2c.
>     Mirja
>
>
>