Re: Getting to consensus on packet number encryption

Martin Thomson <martin.thomson@gmail.com> Thu, 05 April 2018 04:35 UTC

Return-Path: <martin.thomson@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD593126CD8 for <quic@ietfa.amsl.com>; Wed, 4 Apr 2018 21:35:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0N2M-yG0fzR9 for <quic@ietfa.amsl.com>; Wed, 4 Apr 2018 21:35:39 -0700 (PDT)
Received: from mail-ot0-x22e.google.com (mail-ot0-x22e.google.com [IPv6:2607:f8b0:4003:c0f::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 60C37126C89 for <quic@ietf.org>; Wed, 4 Apr 2018 21:35:35 -0700 (PDT)
Received: by mail-ot0-x22e.google.com with SMTP id h26-v6so25806823otj.12 for <quic@ietf.org>; Wed, 04 Apr 2018 21:35:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=GxoQDw6WCjVziBdJXchk5sjfmW4yVKiYkN1oeJjRujw=; b=Lj9UXdf1Q5BIQjb41IWQO3T4VQwGCXrWEl88RS2dHbOIOcmUG2m+1Rq4OywdFhGfh8 u84K5KFcFwbmUYy+5CiHIR9gsDYgCO3HlrPM+xE05UqX7Gfc1nVIY+jhDpToA7KP5u1w 2HjJTNUOgBLrJRNoiJYx2w8d+rOaQd29h36XGn7o2pE18NX7SvEtdxQrTKyR3MLXMjPq R73LBwEB3z+TmbPjuVsyXlAfzN3yDsMRZfBilJ7SOo9ybp69N92tKWIzWWdnx2Nslzyg ez6YU6rw1Oe5P+ImUjvP4/bIVjt1xifZWBL8ceRpQdwCiGBXOmcp6bpDtfvpjPb5tmmO tu0g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=GxoQDw6WCjVziBdJXchk5sjfmW4yVKiYkN1oeJjRujw=; b=tA4TbccI0RyUhZRR6JYD4xxe8IvvdhdI7UoI5GzXzNJm5jUBIcnhZMcl9vO7fA8wtz EQIxcFiKersUHTGLkz0QwmUdP+jFqB/uSRyC3cgXYHdA89St78jViZjcO8SzCKjt/Ot8 Vu7MonFssKcnqHD2Sjz6kImSp/X457dTDRYmh9h8lxWBjlP+VrmbwTNrCxzTHPbcRyoc gkTumUd1nUJEkBS0O34uSIwuFoDwsSZeqOuuE/FzNaIvRf1gG0kgsVLvacuWlhEr/fCC vudMcCMZF3rDDFb5+dcTYRO2nGNmfFQiha5PO3qXydf5ewCwbM9QKYMMZI6in00qSRer dl1Q==
X-Gm-Message-State: ALQs6tA3bEvs7Tk0U5QRV2+RSPdt8U507SYKmnqqQLruqje2i7jNgHQO FpQiexy06wjV5+3OY3ZGCoQ+9wqxc1BtnoWhJY8=
X-Google-Smtp-Source: AIpwx4/qdjUA+B1h3OpYsWKendXWeF3OOLTbOG5IRMul2WnwhcP/0ctywnhWJxhviGQEvRcjjt0N0X/wR98Qx4At3dY=
X-Received: by 2002:a9d:4c81:: with SMTP id m1-v6mr7487964otf.396.1522902934643; Wed, 04 Apr 2018 21:35:34 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a9d:ac7:0:0:0:0:0 with HTTP; Wed, 4 Apr 2018 21:35:34 -0700 (PDT)
In-Reply-To: <CANatvzyo6xz7Kwh=EJ4GExBM35Dpw_=pLsAYiFA==vVBJwhCXw@mail.gmail.com>
References: <7fd34142-2e14-e383-1f65-bc3ca657576c@huitema.net> <F9FCC213-62B9-437C-ADF9-1277E6090317@gmail.com> <CABcZeBM3PfPkqVxPMcWM-Noyk=M2eCFWZw2Eq-XytbHM=0T9Uw@mail.gmail.com> <CAN1APdfjuvd1eBWCYedsbpi1mx9_+Xa6VvZ3aq_Bhhc+HN67ug@mail.gmail.com> <CABcZeBMtQBwsAF85i=xHmWN3PuGRkJEci+_PjS3LDXi7NgHyYg@mail.gmail.com> <1F436ED13A22A246A59CA374CBC543998B5CCEFD@ORSMSX111.amr.corp.intel.com> <CABcZeBNfPsJtLErBn1=iGKuLjJMo=jEB5OLxDuU7FxjJv=+b=A@mail.gmail.com> <1F436ED13A22A246A59CA374CBC543998B5CDAD4@ORSMSX111.amr.corp.intel.com> <BBB8D1DE-25F8-4F3D-B274-C317848DE872@akamai.com> <CAN1APdd=47b2eXkvMg+Q_+P254xo4vo-Tu-YQu6XoUGMByO_eQ@mail.gmail.com> <CAKcm_gMpz4MpdmrHLtC8MvTf5uO9LjD915jM-i2LfpKY384O2w@mail.gmail.com> <HE1PR0702MB3611A67E764EE1C7D1644FAD84AD0@HE1PR0702MB3611.eurprd07.prod.outlook.com> <d8e35569-e939-4064-9ec4-2cccfba2f341@huitema.net> <CACpbDccqKoF-Y1poHMN2cLOK9GOuvtMTPsF-QEen3b30kUo9bg@mail.gmail.com> <CAKcm_gNffwpraF-H2LQBF33vUhYFx0bi_UXJ3N14k4Xj4NmWUw@mail.gmail.com> <40C1F6FE-2B2C-469F-8F98-66329703ED50@mnot.net> <CAOdDvNo9QS=CX5YUWK8Lxs_SYX4nEM7OWv2+zB=VGhOX6J-BEw@mail.gmail.com> <CANatvzyo6xz7Kwh=EJ4GExBM35Dpw_=pLsAYiFA==vVBJwhCXw@mail.gmail.com>
From: Martin Thomson <martin.thomson@gmail.com>
Date: Thu, 05 Apr 2018 14:35:34 +1000
Message-ID: <CABkgnnV8ya_YdhU1VE+BuiMvuuZOO1-j-2=YHAGbmdE3OMk7Gg@mail.gmail.com>
Subject: Re: Getting to consensus on packet number encryption
To: Kazuho Oku <kazuhooku@gmail.com>
Cc: Patrick McManus <pmcmanus@mozilla.com>, Lars Eggert <lars@eggert.org>, Mark Nottingham <mnot@mnot.net>, IETF QUIC WG <quic@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/jUa5NP-fjekdKeeYYeoJTHGKXWI>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Apr 2018 04:35:41 -0000

On Thu, Apr 5, 2018 at 10:57 AM, Kazuho Oku <kazuhooku@gmail.com> wrote:
> It is true that #1079 has issues with hardware crypto offload. I am
> happy to support switching to a better encryption scheme (if we find
> one) at any moment; e.g., during the standardization of QUICv1, or as
> an extension to v1, or part of vX.

Until this came up, I hadn't considered the use of an
extension/transport parameter to negotiate a new scheme, but it's
obvious.  This fits best with my view of things.

If that means that we get the DC-QUIC option that turns the packet
number encryption function into identity or some cheaper function,
then I think that's an OK outcome.  We should stop pretending that one
size fits all is achievable; it's not been the case for years already.

FWIW, what I got from the info that Praveen and Ian have shared is
that there are enough problems to solve with UDP that worrying about
the performance hit from encryption is premature.