Re: Packet number encryption

Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com> Wed, 07 February 2018 08:38 UTC

Return-Path: <mikkelfj@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64793126BF0 for <quic@ietfa.amsl.com>; Wed, 7 Feb 2018 00:38:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level:
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zva3fnYO1O4v for <quic@ietfa.amsl.com>; Wed, 7 Feb 2018 00:38:41 -0800 (PST)
Received: from mail-io0-x233.google.com (mail-io0-x233.google.com [IPv6:2607:f8b0:4001:c06::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 607381200C1 for <quic@ietf.org>; Wed, 7 Feb 2018 00:38:41 -0800 (PST)
Received: by mail-io0-x233.google.com with SMTP id f4so1145937ioh.8 for <quic@ietf.org>; Wed, 07 Feb 2018 00:38:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:in-reply-to:references:mime-version:date:message-id:subject:to :cc; bh=wC4QLOyZmxLyMirlX8JXoy/iklP9m67zjV9c5eq53AY=; b=gvV+0PRpHOghudUXqkVE8t2nlH2MGD/+KsXUxjUz2OOcKTf9f9RpC8pAvVay1yEjA+ oJRq/0JYCyg1xiaeE4ks+U/fii4z3YqIaS1BBdON1vyjJFT17o7ZEToOJ5iMtzwVANFs 7XB78210PMbNzEccyVfoQjIBDEue9v2+0YtU+fcCGcVTXDuefgrfNGIvUV8Yp5pV0Jfl mWzML8um5zLBdhcGwSzYeA0ma+ewA5cm3+iJocUrbGhOExqF3KgHxE3RCZK4BZ7HaaXL lwYNY8XK3/f4GPQoXk2u2c0tm2V20r+0KkIQLy9I+Q0J0cfIeswkfvCNo9W1qwiyIfmN r1lw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:in-reply-to:references:mime-version:date :message-id:subject:to:cc; bh=wC4QLOyZmxLyMirlX8JXoy/iklP9m67zjV9c5eq53AY=; b=LVwmHJXXhh+dXPP7jCS+3YockFhaNLI1BWhNe5kmtulM7+yjd0ps6VRxD/4gbm/2Nu DWy2jNnjH7aGkEXskUBBOhs3BHNCGx2UNK3E+9eVUZPuHD29jgHztTkaD7bMsJqDhQm5 AkEsF6BG6mz0zf0MPj47nEjFAOUcmmSPrzjA1CbqW6M/75Zbl4aGdODnBElFQzGhfi+R 2+iyMz3MO7RB+GLUtrXIco0sWvHC7rbFefH0UIoem9eFinZudKE23u998SojBBqllwo4 ro99Ze+NJ9ImtwKyZ55iNMYjSEGtSoFaX8Hpq3JZrokqnM2NR/8DURIsVltymQP3Leu5 Zn3g==
X-Gm-Message-State: APf1xPBOj2Hf12IVEZwGv3uyuxO14E3zn8VwCYBe6VVkU34Y4lbwqebU M+uEEju74/9quYlrlX5ooy+B1Rqcl/a7qpC6L90=
X-Google-Smtp-Source: AH8x224HhKRZpjQS8A3tPuo5uUNVhGRrX/IQJ5JtTofnA8FRtUahBYi5Mxowasjf9aO6E90CwFa0ZZMTptAK5K3yHLM=
X-Received: by 10.107.20.200 with SMTP id 191mr6648058iou.239.1517992720602; Wed, 07 Feb 2018 00:38:40 -0800 (PST)
Received: from 1058052472880 named unknown by gmailapi.google.com with HTTPREST; Wed, 7 Feb 2018 00:38:39 -0800
From: Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>
In-Reply-To: <CAOYVs2pi8-NVuS+crNMfjsP-n5upK3=5tPeQ8OSGpOvL6RTrjA@mail.gmail.com>
References: <CABkgnnVyo3MmWtVULiV=FJTnR528qfY8-OmKGWAs0bCvri-a_g@mail.gmail.com> <2102BDC2-62C0-4A76-8ADE-8167437E2D07@trammell.ch> <CAN1APde6o6=aCXuWajPFSU=jXv-ERdVHk=uyjM71uQ_uU-oMTg@mail.gmail.com> <8e833029-68b5-2787-3897-a0f7818a259f@tik.ee.ethz.ch> <1de39727-eeec-0e7a-1e8b-5ed50433c5bd@cs.tcd.ie> <MWHPR08MB2432D0216BC8FE1B0D9E3690DAFD0@MWHPR08MB2432.namprd08.prod.outlook.com> <CAGD1bZauKbucs_5n7RQbK8H2HiyfiqpGVEcKreGA6umhMBSFgg@mail.gmail.com> <CABcZeBPNrc-9vANSH02r++p53s6gN4pVB8DMd80nUxOhKTp3dA@mail.gmail.com> <CAKcm_gMvHSBhpUvsQCCkV2_o+d_wchF3R3L6H8mp6nKNaaRmSw@mail.gmail.com> <CY4PR21MB0133CCAA6807469BA983D00BB6FC0@CY4PR21MB0133.namprd21.prod.outlook.com> <CABkgnnW4xr_YzpsvCxaJJgcQdBTuX=Yv735_sdd4VoMfji8mbA@mail.gmail.com> <CY4PR21MB0133C759D4A08A4988B641B2B6FC0@CY4PR21MB0133.namprd21.prod.outlook.com> <bdf88936-8edc-d56e-ee59-c9d597058edd@huitema.net> <CY4PR21MB01337C8A700E58B49D90B712B6FC0@CY4PR21MB0133.namprd21.prod.outlook.com> <119b3276-5799-1cc3-8982-7479171bbf27@huitema.net> <CAOYVs2pi8-NVuS+crNMfjsP-n5upK3=5tPeQ8OSGpOvL6RTrjA@mail.gmail.com>
X-Mailer: Airmail (420)
MIME-Version: 1.0
Date: Wed, 07 Feb 2018 00:38:39 -0800
Message-ID: <CAN1APdcdL3Y-c+dxJRQL5-NZF9+fUadEZrDCRZJMqyhBzrD6Rg@mail.gmail.com>
Subject: Re: Packet number encryption
To: Christian Huitema <huitema@huitema.net>, Marten Seemann <martenseemann@gmail.com>
Cc: "quic@ietf.org" <quic@ietf.org>, Praveen Balasubramanian <pravb@microsoft.com>
Content-Type: multipart/alternative; boundary="001a114fd4c8e21c0705649b3823"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/nRSx1wDnsuE1fEWSQfIYrOhzfcc>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Feb 2018 08:38:43 -0000

> This is why I would rather see the exposed bits copied at a fixed
> location, while the PN itself cannot be located. That way, the exposed bits
> can ossify, but the actual PN does not.
>

We still need to be very careful here. If we decide to expose bits, we must
make sure that a middlebox can only extract coarse-grained information, if
we want to prevent middleboxes from buffering and delaying packets in order
to fix / reduce reordering.
At this point however, I'm not convinced that exposing any reordering
information to the network should be a requirement at all. There's a real
risk of misuse of this information, and of ossification of whatever bits we
expose.

I am fairly convinced that you can and should separate exposure to
middleware from packet numbers in whatever form precisely because we want
packet numbers to not rely on path and because packet numbers may expose
false loss if exposed directly in whatever form.

A path specific counter can be done be exposing a few bits of an internal
path specific counter that is entirely independent of packet numbering used
for AEAD IV and is also independent of any artificial packet number
skipping for ACK attack mitigation etc.. It could also be done be emitting
a known 1-bit signal whose pattern can be used to identify deviance from
that pattern, as discussed in separate thread, e.g. a square wave or a
public pseudo-random sequence.

The next, and separate question is then, do we want to expose anything even
if it only leaks information about loss and reordering on a single path? It
could lead to unwanted latency due to middleware packet sorting. It is a
very good point, but the concern might be based on a historical case that
does not apply to current UDP or future QUIC transports. However, if
ordering is exposed as a pseudo-random 1-bit signal such as the Pi
sequence, then middleware would have to work very harder than it would find
worthwhile to sort packets back in order.