Re: Increasing QUIC connection ID size

Christian Huitema <huitema@huitema.net> Fri, 12 January 2018 02:47 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E56F12D72F for <quic@ietfa.amsl.com>; Thu, 11 Jan 2018 18:47:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0DCRDgVWNyrV for <quic@ietfa.amsl.com>; Thu, 11 Jan 2018 18:47:55 -0800 (PST)
Received: from mx43-out1.antispamcloud.com (mx43-out1.antispamcloud.com [138.201.61.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E87DD126D45 for <quic@ietf.org>; Thu, 11 Jan 2018 18:47:53 -0800 (PST)
Received: from xsmtp12.mail2web.com ([168.144.250.177]) by mx15.antispamcloud.com with esmtps (TLSv1.2:AES128-SHA:128) (Exim 4.89) (envelope-from <huitema@huitema.net>) id 1eZpNb-0007Vq-02 for quic@ietf.org; Fri, 12 Jan 2018 03:47:40 +0100
Received: from [10.5.2.52] (helo=xmail12.myhosting.com) by xsmtp12.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from <huitema@huitema.net>) id 1eZpNR-00032Z-3V for quic@ietf.org; Thu, 11 Jan 2018 21:47:32 -0500
Received: (qmail 29201 invoked from network); 12 Jan 2018 02:47:20 -0000
Received: from unknown (HELO [192.168.200.68]) (Authenticated-user:_huitema@huitema.net@[72.235.171.77]) (envelope-sender <huitema@huitema.net>) by xmail12.myhosting.com (qmail-ldap-1.03) with ESMTPA for <quic@ietf.org>; 12 Jan 2018 02:47:19 -0000
To: quic@ietf.org
References: <CAAZdMad=YnTyXG-q0ACpT=tyCSX1GgRLvb=8HT3Au=e9_XT5Ag@mail.gmail.com> <d2a6136f93654eb1a5c7970cfb41f7ad@usma1ex-dag1mb5.msg.corp.akamai.com> <CAN1APdf7MqhdQ-+VMOwsNgz_F+OZK-8CzndwWTQq4FPM52ro9Q@mail.gmail.com>
From: Christian Huitema <huitema@huitema.net>
Message-ID: <1142e1ee-ae7b-b0be-625a-4136c6085c08@huitema.net>
Date: Thu, 11 Jan 2018 16:47:19 -1000
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <CAN1APdf7MqhdQ-+VMOwsNgz_F+OZK-8CzndwWTQq4FPM52ro9Q@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------0FAA3E03FF542E5934698F17"
Subject: Re: Increasing QUIC connection ID size
X-Originating-IP: 168.144.250.177
X-AntiSpamCloud-Domain: xsmtpout.mail2web.com
X-AntiSpamCloud-Username: 168.144.250.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=168.144.250.0/24@xsmtpout.mail2web.com
X-AntiSpamCloud-Outgoing-Class: unsure
X-AntiSpamCloud-Outgoing-Evidence: Combined (0.17)
X-Recommended-Action: accept
X-Filter-ID: EX5BVjFpneJeBchSMxfU5tOaXUxIwwGx8QDPCy6+3lMXv9krsgRhBn0ayn6qsUc7A2kcKDr1fzRm ksYYe0sWHrgNzB/4Jkrw1eDLcif59ftfrEty55E/y6tQNxmuYB7fB98yDTitFWvbHwz9vKZpm4b3 Kv7PcFSfRyFbnU/eNYdTPSw+CekCTYoDa8nAx3W5ZsQEbaxxISMHgJxrdMdSS4B6hVJPXxgisa+g wkHvC+PVG1YjIrFRKhESMT/tU1Dx+IHaAZrg1ulFniksjLYqZxdG5bOwa1rOgT+89+/XFrGt2tce crpXRY6fm8RXptyzavERpop5LF7RavHozgbn9XzprFRbpFQTOcEGeQOY3IcDlgJpEbxunV7tCPNi PQvHQpVRoYcix47lJTuKsG8TgnDHFRDF834rtLc6Wv9Yj+vBPX9bzGJi0ycLbiOUDEySIK/1NH5T HMtlYvyHAYGOGheVSH7cGoIH3Vd41lbD31XIx4AXarfh1O38bAuuIRigptEjxjSIdK/OrMoYfnrE KP3aXbDVPW3nVdYVd9gzfcPGvVLPSj+Hlyh2mculO/W8NktFVcl6hrIDm43UklXgo0rGkb5OztVl OoF8rUUHwR1JLObs/ksVBOHvEAgSr8kATvFVVOfJAYdBTniKgyyo60ONoJfh+XjGSeeT90H/uIEu fDSTg6PfMsskW99EgQeafmirzrF513SzC18rTLvbNWbjO41FyBEqIaDudcVplPEfgkCmu0AbpCDt lYGBUhlWi2LEHF33nMCnEPdDBPtPg/fFcHV2tQAVqGdj/zM7G/G3L31QGIB1LDs8uX49JL/W5ft9 Iz0WDtXlRni5HCCJM9Qvlo9UV7vdWttsewtXKowaEO652uo+6xHVEn43gl09gN9PtOEBx/RKpFEr HkJ0VfjEzm1SsR8v3aJbN/NZfa/pGyl0Yc/hSh4fhbFqiL7w
X-Report-Abuse-To: spam@quarantine5.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/oArRe3cHtZGdhjWnDZ7gYkY-iCU>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jan 2018 02:47:58 -0000

We have a prototype implementation in Picoquic in which the connection
ID can be split so some bits are random and some bits are used for
routing to a specific server -- thanks Igor for that. It makes for nice
experiments, but it is a denial of service waiting to happen. For
example, attackers could set the bits in such a way as to target a
specific server in a pool, or they could learn which connections are on
the same server and use that later for some kind of same server attack.
It would be better if that information was not in clear text. In fact,
the picoquic implementation use a callback to ask for the new value --
presumably from the router. That callback could return anything,
including an encrypted value.

On the other hand, it is not clear to me that we need full encryption.
For example, assume that the server that needs a connection ID can ask
it from the router. The router could pick one at random, make sure that
it is properly documented in the routing tables and that there is no
collision, and then pass it back to the server. No encryption needed,
but of course lots of state.

If the router does not want to keep the state, it can indeed create a
connection ID by encrypting a <nonce, server-ID> tuple. But it does not
follow that the encryption needs to be 128 bits. For example, it could
use a 64 bit algorithm like Blowfish.

So I am not sure that we actually need to change the length. And I am a
bit concerned by the incremental overhead if the connection ID suddenly
becomes very large.


On 1/11/2018 2:25 PM, Mikkel Fahnøe Jørgensen wrote:
> Actually, on encryption of connection ID, this is not so simple.
>
> We must assume there is only a single key for many connections because
> the router is not part of a key exchange. This unique value or counter
> used for encrypting a single block cannot be the same for two
> different connections ID’s, but it can be public. This means that it
> must be stored in the packet header. And, as it turns out, random
> connection ID chosen by a trusted source, can be used for such a
> unique value. But then it must be used to encrypt and/or authenticate
> something else carrying the actual routing information. So now you
> start to really need some extra payload.
>
> Alternatively the routing information is entirely random such as
> content hashed routing. Then you only need to authenticate the routing
> data. You can do that with a HMAC, and CMAC could probably also work.
> The additional benefit is that you can probably get away with 64-bits
> for all routing information possibly including the auth tag. Say 48
> bits of routing data and 16 bits of auth tag.
>
> Kind Regards,
> Mikkel Fahnøe Jørgensen
>
>
> On 12 January 2018 at 00.57.21, Lubashev, Igor (ilubashe@akamai.com
> <mailto:ilubashe@akamai.com>) wrote:
>
>> I am interested in exploring this proposal, since it allows for more
>> flexible schemes of encoding routing metadata and a checksum.  I
>> would also like to be explicit about the connection ID size in a
>> packet header, though, since it greatly simplifies the implementation.
>>
>>  
>>
>>   * Igor
>>
>> *From:* Victor Vasiliev [mailto:vasilvv@google.com
>> <mailto:vasilvv@google.com>]
>> *Sent:* Thursday, January 11, 2018 6:16 PM
>> *To:* IETF QUIC WG <quic@ietf.org <mailto:quic@ietf.org>>
>> *Subject:* Increasing QUIC connection ID size
>>
>>  
>>
>> Hi everyone,
>>
>>  
>>
>> In the current version of QUIC, the connection ID size is fixed to be
>> a 64-bit opaque blob, and that is set as an invariant in the protocol.
>>
>>  
>>
>> I’ve looked into possibility of using a connection ID to encode the
>> specific server details into it (to provide stability of the
>> connection in case of load balancing changes, especially BGP flaps
>> for anycast IPs), and have chatted about this with other people I
>> knew were interested in this.  It seems like 64 bits might be too
>> small for this purpose, and we might want to leave an opportunity to
>> extend the connection ID size.
>>
>>  
>>
>> The basic idea is that you want to be able to:
>>
>>  1. Store some routing metadata in the connection ID.
>>  2. Have some entropy that allows distinguish users with identical
>>     routing metadata.
>>  3. Have a checksum to ensure the validity of routing information
>>  4. Encrypt the information above to prevent disclosing the route
>>     information and allow generating uncorrelatable connection IDs.
>>
>> There are two underlying issues here.  The first problem is that all
>> of this does not fit well into 64 bits, and you have to seriously
>> compromise on the strength of the checksum (which is bad especially
>> if you want it to be a MAC rather than a checksum).  The second
>> problem is that encrypting 64-bit values fast is actually fairly hard
>> since the block ciphers easily available in hardware have 128-bit
>> block size, and the performance requirements on load balancers are
>> tighter than on servers.  
>>
>>  
>>
>> In other words, having a 128-bit connection ID provides for an easy
>> secure way to generate unlinkable connection IDs on migration.
>>
>>  
>>
>> So, the problem we’re trying to solve is that the connection ID is
>> too small.  There are two questions I believe the working group
>> should answer at this point:
>>
>>  1. Do we want to address this problem at this point in
>>     standardization process?
>>  2. If we don’t address this problem right now, how do we structure
>>     the standard in a way that we can extend the connection ID in the
>>     future?
>>
>> There are multiple ways to solve the problem of making connection ID
>> larger.  One is to just add extra bit to the “omit connection ID”
>> field to allow 128-bit connection IDs.  Another approach is to allow
>> connection ID size to be explicitly specified by the server, and then
>> assume that the load balancer knows that size and no one else on the
>> path needs to read it.
>>
>>  
>>
>> There’s also a question of how much of connection IDs do middleboxes
>> (excluding load balancers and other boxes owned by the same entity as
>> either client or server) need to know.  We could go for both
>> “middleboxes should be always able to read the entire ID” and
>> “middleboxes should not read connection IDs at all options”, but I
>> think there’s also a room for more flexible formulations like
>> “middleboxes always get first 64 bits and they have useful entropy to
>> distinguish connections”.
>>
>>  
>>
>>   -- Victor.
>>