Re: Roman Danyliw's No Objection on draft-ietf-quic-manageability-16: (with COMMENT)

Christian Huitema <huitema@huitema.net> Sat, 04 June 2022 21:27 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 31560C14F75F for <quic@ietfa.amsl.com>; Sat, 4 Jun 2022 14:27:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.785
X-Spam-Level:
X-Spam-Status: No, score=-3.785 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-1.876, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gx0X-FMbRm7U for <quic@ietfa.amsl.com>; Sat, 4 Jun 2022 14:26:55 -0700 (PDT)
Received: from mx36-out10.antispamcloud.com (mx36-out10.antispamcloud.com [209.126.121.30]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B09C8C14CF02 for <quic@ietf.org>; Sat, 4 Jun 2022 14:26:55 -0700 (PDT)
Received: from xse230.mail2web.com ([66.113.196.230] helo=xse.mail2web.com) by mx258.antispamcloud.com with esmtp (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1nxbIJ-000987-Kj for quic@ietf.org; Sat, 04 Jun 2022 23:26:54 +0200
Received: from xsmtp21.mail2web.com (unknown [10.100.68.60]) by xse.mail2web.com (Postfix) with ESMTPS id 4LFt9j6JMQz9fL for <quic@ietf.org>; Sat, 4 Jun 2022 14:26:49 -0700 (PDT)
Received: from [10.5.2.14] (helo=xmail04.myhosting.com) by xsmtp21.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1nxbIH-0003yu-OW for quic@ietf.org; Sat, 04 Jun 2022 14:26:49 -0700
Received: (qmail 23912 invoked from network); 4 Jun 2022 21:26:48 -0000
Received: from unknown (HELO [192.168.1.106]) (Authenticated-user:_huitema@huitema.net@[172.58.43.86]) (envelope-sender <huitema@huitema.net>) by xmail04.myhosting.com (qmail-ldap-1.03) with ESMTPA for <mirja.kuehlewind=40ericsson.com@dmarc.ietf.org>; 4 Jun 2022 21:26:47 -0000
Message-ID: <9c96e922-41d3-efa8-d433-c400387c9dc1@huitema.net>
Date: Sat, 04 Jun 2022 14:26:46 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.10.0
Content-Language: en-US
To: Mirja Kuehlewind <mirja.kuehlewind=40ericsson.com@dmarc.ietf.org>, Roman Danyliw <rdd@cert.org>, The IESG <iesg@ietf.org>
Cc: "draft-ietf-quic-manageability@ietf.org" <draft-ietf-quic-manageability@ietf.org>, "quic-chairs@ietf.org" <quic-chairs@ietf.org>, "quic@ietf.org" <quic@ietf.org>, "matt.joras@gmail.com" <matt.joras@gmail.com>
References: <165033833728.2600.15767815172481167436@ietfa.amsl.com> <62B1FC14-9094-45F5-B4EA-60FC29D1BB27@ericsson.com>
From: Christian Huitema <huitema@huitema.net>
Subject: Re: Roman Danyliw's No Objection on draft-ietf-quic-manageability-16: (with COMMENT)
In-Reply-To: <62B1FC14-9094-45F5-B4EA-60FC29D1BB27@ericsson.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Originating-IP: 66.113.196.230
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 66.113.196.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=66.113.196.0/24@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.15)
X-Recommended-Action: accept
X-Filter-ID: Pt3MvcO5N4iKaDQ5O6lkdGlMVN6RH8bjRMzItlySaT9WLQux0N3HQm8ltz8rnu+BPUtbdvnXkggZ 3YnVId/Y5jcf0yeVQAvfjHznO7+bT5x6h2yQpzTslcOqazQkKtAFKj/EwzSHE5FGYwwjsNRPCAXq Xx0fOHMTTO+eXQ1K3djmD6wdmZPcItWbGe10hXJtXL4FsauCVkDjmcYJdU3yWp7KuHNaaKdg7iBE ZefdsNUFWKwa/wzJUjmazeC7ImcaVuryn8NvFeUmdU/QoloewBQ6V51u76v35b1wNe/MvdJPWWqi c9eoDWW+hxVOsiYx2+J9PgaoF8SQHto3le4zsHTaeQtlKubP6iUTjj6yPARK6buALVaA782LKxg6 vRmng8N1aLhXqdc+jC1RcnVud53D5caUhbVtvqItBqoizkEt9O20UjkwI0v+LOlw05G4BS+iyyNq bT8dUMXMJ4tUCMj6G37ZfAMLceP5aNHPt26RBupu5v1nytoNnc138GfEJRQ2qC7jjynPIHPNqSn4 QTXUjLjYWQt1/5xnQymMoPsgr/U0flMcy2Vi/IcBgY4arPaiJ1W6hAyiRC61jekdwIcXNugoOEbH RyFULpSjm7hMIABpqqRGKyDs8xujM3cq7Rvkiy9CGpqIMbF0Ys3gbVtOCWY4a+PQP8MdPPJ9+e1H Rg2kjgIE147MaByQN9ZKEnFzsC48bTEFY06/YbB87aZA2T1TDpm1DkXX6Es5zXntCB3G1CwpaI3Z 4ESkMWDVJEenxBoIht3V0nekAoxXAnWhKUWGizjc6KugCCaRY/CyuLfHqAnAj7rgKH7+eCmmE6dQ suNow90OZe0a/9VYyFShcA6Xvva2QAVEjpqzANbJ1UfXmet2cbFKoyT/OdZL93jnGBwOkNtZilKf cucUJ20AuXq0T17woJo3avKeADIsy647Mn0zwmGzAi3Zn+YdthRNgs7Ig4l/XErpYn3glZTKFuaT l19W3ISq9+1KiLsESGU+y+fjdgjudZxiTPi+MG1QP35nsYfP84c+RFK3KiZuZ5OAUoGBziSYFLZu u6zX3xxsmqT8l9ARlsTalAaf
X-Report-Abuse-To: spam@quarantine11.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/kCqtayKzP9qUKcPPGrsstcsV4iA>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jun 2022 21:27:01 -0000

On 6/1/2022 5:51 AM, Mirja Kuehlewind wrote:
>      ----------------------------------------------------------------------
>      COMMENT:
>      ----------------------------------------------------------------------
>
>      Thank you to Barry Leiba for the SECDIR review.
>
>      Thank you for this companion document considering the operational view of the
>      wire image.  It is a model to pattern for other protocols.
>
>      ** Section 2.8
>         Using a particular version number to recognize valid QUIC
>         traffic is likely to persistently miss a fraction of QUIC flows, and
>         completely fail in the near future.  Reliance on the version number
>         field for the purposes of admission control is similarly likely to
>         rapidly lead to unintended failure modes.  Admission of QUIC traffic
>         regardless of version avoids these failure modes, avoids unnecessary
>         deployment delays, and supports continuous version-based evolution.
>
>      -- True, but this guidance seems a bit too strong.  Operators may choose to
>      explicitly exclude traffic from particular “experimental versions" and should
>      likely be curating their ACLs/admission control practices.
>
> [MK] This was discussed quite heavily and last revised during IETF LC based on the opsdir review, see here:
> https://github.com/quicwg/ops-drafts/pull/467/files
>
> [MK] The comment from the opsdir review was basically say that this document should not try "tell operators what to do". (Sorry if I paraphrasing this to strongly). So we tried to rather explain than givng concrete guidance. However, the whole point is that using version is a problem and we have a strong that is should not be done. Yes, we understand that operator have a desire to distinguish "valid" QUIC traffic (whatever) that means, but QUIC has been designed to reveal as little information as possible and trying to (mis-)use any of the existing exposed information for that purpose has problems. Given this was just revised and discussed extensively, I rather not change the text again. Please let me know if you feel strong that some more adaption is required here.
>
>      -- Consider if the text "... likely to rapidly lead to unintended failure
>      modes” will age well.
>
> [MK] I don't think this is specific tot eh current version but rather the general design principle that version are expected to change quickly.
>
>      -- Would there be an opportunity to fingerprint a unique application using a
>      specific experimental version number (in an ecosystem of continuous evolution
>      and experimentation suggested above)?
>
> [MK] I guess that is the whole point here and I think the answer is no. You might see new experimental version that come and go quickly and are deployed only by one vendor but I don't think that will give you necessarily much insights about the application within the encrypted payload. Also experimental version are expected to be around for short times only and change quickly, thus you would be very busy to adapt your fingerprinting continuously. That's why the recommendation is to not do it.

Application developers will try to evolve the version number. If that 
cause the packets to be somehow discarded, this will have a very 
predictable result: all QUIC implementations will set the version number 
to 1 in the clear text header, while the "real" version number will be 
negotiated as part of the encrypted payload. If we follow that path, the 
network managers will not have any usable signal about the QUIC version, 
and the application developers will have to use more complex software 
and carry four useless bytes in the initial packets. Truth is, this is 
most likely what will happen, given natural trends. I don't know whether 
the text in the applicability statement will be enough to avoid that fate.

-- Christian Huitema