RE: draft-tiesel-quic-unreliable-streams-01 - comments

Roni Even <roni.even@huawei.com> Tue, 07 November 2017 11:50 UTC

Return-Path: <roni.even@huawei.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D8D513FE32 for <quic@ietfa.amsl.com>; Tue, 7 Nov 2017 03:50:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.219
X-Spam-Level:
X-Spam-Status: No, score=-4.219 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DJx3ieyIHRsE for <quic@ietfa.amsl.com>; Tue, 7 Nov 2017 03:50:47 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCB6E13FE31 for <quic@ietf.org>; Tue, 7 Nov 2017 03:50:45 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml702-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DZI67776; Tue, 07 Nov 2017 11:50:42 +0000 (GMT)
Received: from DGGEMM403-HUB.china.huawei.com (10.3.20.211) by lhreml702-cah.china.huawei.com (10.201.108.43) with Microsoft SMTP Server (TLS) id 14.3.361.1; Tue, 7 Nov 2017 11:50:20 +0000
Received: from DGGEMM506-MBX.china.huawei.com ([169.254.3.14]) by DGGEMM403-HUB.china.huawei.com ([10.3.20.211]) with mapi id 14.03.0361.001; Tue, 7 Nov 2017 19:50:13 +0800
From: Roni Even <roni.even@huawei.com>
To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>, "Philipp S. Tiesel" <phils@in-panik.de>
CC: QUIC WG <quic@ietf.org>
Subject: RE: draft-tiesel-quic-unreliable-streams-01 - comments
Thread-Topic: draft-tiesel-quic-unreliable-streams-01 - comments
Thread-Index: AQHTVBwwoDixcEmLIk67t+44J7ng4KMIg0wwgABPrWA=
Date: Tue, 07 Nov 2017 11:50:12 +0000
Message-ID: <6E58094ECC8D8344914996DAD28F1CCD8351F8@DGGEMM506-MBX.china.huawei.com>
References: <6E58094ECC8D8344914996DAD28F1CCD82A735@DGGEMM506-MBS.china.huawei.com> <FBF9665E-15CE-437B-A575-25AEA7C88073@in-panik.de> <6E58094ECC8D8344914996DAD28F1CCD832288@DGGEMM506-MBX.china.huawei.com> <B814D19D-2FD6-42B6-867E-8A26C7475E0F@in-panik.de> <DB4PR07MB34899FCFC336AE2F0B72A6CC2510@DB4PR07MB348.eurprd07.prod.outlook.com>
In-Reply-To: <DB4PR07MB34899FCFC336AE2F0B72A6CC2510@DB4PR07MB348.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.200.202.65]
Content-Type: multipart/alternative; boundary="_000_6E58094ECC8D8344914996DAD28F1CCD8351F8DGGEMM506MBXchina_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020202.5A019E13.0072, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=169.254.3.14, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 9de01acb088ed5dccf12085c36a29c56
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/ljUIYnPmY4PdFYoGB2yy9xen-Cw>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Nov 2017 11:50:49 -0000

Hi Ingemar,
It is not CCM the attacker just does heuristics to understand that this is not media but report (RTCP or ACK frames) and drops it, BTW: audio packets may also be small.
This is an example. The claim is that you can use heuristics to drop “selected” frames even though you do not know what is in the packet.
Roni



From: Ingemar Johansson S [mailto:ingemar.s.johansson@ericsson.com]
Sent: יום ג 07 נובמבר 2017 09:41
To: Philipp S. Tiesel; Roni Even
Cc: QUIC WG
Subject: RE: draft-tiesel-quic-unreliable-streams-01 - comments

Hi Philip and Roni

I assume that by reception reports is meant the RTCP CCM messages such as TMMBR or ?

So.. unless I misunderstood it completely.
I am not at all convinced that media rate/congestion control in QUIC should rely on TMMBR.
SCReAM for instance, specified in the RMCAT WG for instance does not depend on TMMBR as it is ACK clocked, the media transmission is reduced to a very low rate if the ACKs are discarded by an attacker.

I would say that it is more straightforward to use a multipurpose congestion control in QUIC, this is perhaps based on BBR, but SCReAM style is not excluded. In any case this means that it is not possible to prevent rate adaptation.

/Ingemar


From: Philipp S. Tiesel [mailto:phils@in-panik.de]
Sent: den 6 november 2017 10:15
To: Roni Even <roni.even@huawei.com<mailto:roni.even@huawei.com>>
Cc: QUIC WG <quic@ietf.org<mailto:quic@ietf.org>>
Subject: Re: draft-tiesel-quic-unreliable-streams-01 - comments



On 5. Nov 2017, at 08:32, Roni Even <roni.even@huawei.com<mailto:roni.even@huawei.com>> wrote:
From: Philipp S. Tiesel [mailto:phils@in-panik.de]
On 1. Nov 2017, at 14:03, Roni Even <roni.even@huawei.com<mailto:roni.even@huawei.com>> wrote:
In the security section “ An active, on path attacker can drop selected
frames “ . What does it mean selected frames, the whole payload is
encrypted.
This is a little complicated:
- Assume having “stream-as-a-message” streams with two different kins of
messages sized A,B
- Assume each message fits into one packet, but two messages will not fit
- Assume one doesn't want to split packets to fill packets to MTU due to
latency constrains  => If an attacker know the inside protocol, the attacker
can distinguish from the packet length wether it is an A or B kind message

To avoid this, one has to pad all packets… I should clarify this.
[Roni Even] I understand this case but what does selected frames mean, I assume that the attacker does not know what is in each stream in order to select a specific one, so why will he just drop one and not the other or why not both?

Assuming the attacker _knows the protocol_, the attacker would also know the sizes of all kinds of messages and may use this knowledge to recover protocol state or selectively drop messages.

For a protocol like HTTP, the attack vector is rather small.
If one uses this against video conferencing applications, an attacker could prevent rate adaption  by dropping reception reports (larger than a pure QUIC ACK, smaller than a video frame).
If one uses this on IoT control stuff, an attacker might be able to learn a lot about the system state by observing sizes and timings.

This is nothing we can fix within QUIC without massive scarifies, but application developers must keep in mind.


AVE!
  Philipp S. Tiesel / phils…
--
   {phils}--->---(phils@in-panik.de<mailto:phils@in-panik.de>)--->---(http://phils.in-panik.de)----,
      wenn w eine   aube ist dn      man au dran dre en                   |
           o     Schr        an muss     hc         h   (Kurt Schwitters) |
:wq!  <----(phone: +49-179-6737439)---<---(jabber: phils@in-panik.de<mailto:phils@in-panik.de>)----'