Re: New Version Notification for draft-huitema-quic-mpath-req-00.txt

Christian Huitema <huitema@huitema.net> Tue, 02 January 2018 04:57 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D32841205D3 for <quic@ietfa.amsl.com>; Mon, 1 Jan 2018 20:57:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level:
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A-ZG6C06mvoO for <quic@ietfa.amsl.com>; Mon, 1 Jan 2018 20:57:06 -0800 (PST)
Received: from mx43-out1.antispamcloud.com (mx43-out1.antispamcloud.com [138.201.61.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E521912025C for <quic@ietf.org>; Mon, 1 Jan 2018 20:57:05 -0800 (PST)
Received: from xsmtp05.mail2web.com ([168.144.250.245]) by mx16.antispamcloud.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.89) (envelope-from <huitema@huitema.net>) id 1eWEdK-0002Pm-95 for quic@ietf.org; Tue, 02 Jan 2018 05:57:03 +0100
Received: from [10.5.2.49] (helo=xmail11.myhosting.com) by xsmtp05.mail2web.com with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <huitema@huitema.net>) id 1eWEdF-00076f-I7 for quic@ietf.org; Mon, 01 Jan 2018 23:57:01 -0500
Received: (qmail 9174 invoked from network); 2 Jan 2018 04:56:56 -0000
Received: from unknown (HELO [192.168.1.105]) (Authenticated-user:_huitema@huitema.net@[172.56.42.40]) (envelope-sender <huitema@huitema.net>) by xmail11.myhosting.com (qmail-ldap-1.03) with ESMTPA for <martin.thomson@gmail.com>; 2 Jan 2018 04:56:56 -0000
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (1.0)
From: Christian Huitema <huitema@huitema.net>
X-Mailer: iPhone Mail (15C153)
In-Reply-To: <CABkgnnU3mNguz=9d5LRWYCy_c5xD9DT0ebU_D68Z0NOvTW-6EA@mail.gmail.com>
Date: Mon, 01 Jan 2018 20:56:54 -0800
Cc: "quic@ietf.org" <quic@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <7F550E54-3899-484F-8478-ED99DF81700F@huitema.net>
References: <151440883747.29897.3176327891691875461.idtracker@ietfa.amsl.com> <1728cfeb-e2ce-61cd-9a4e-770d76816fff@huitema.net> <CABkgnnXRfNG25U-wF4L16t7pfxsxoJknPa9zjKv03hNv7YLcdA@mail.gmail.com> <5BC82026-2A30-4A31-87F1-6FBB694C9FAE@huitema.net> <CABkgnnU3mNguz=9d5LRWYCy_c5xD9DT0ebU_D68Z0NOvTW-6EA@mail.gmail.com>
To: Martin Thomson <martin.thomson@gmail.com>
Subject: Re: New Version Notification for draft-huitema-quic-mpath-req-00.txt
X-Originating-IP: 168.144.250.245
X-AntiSpamCloud-Domain: xsmtpout.mail2web.com
X-AntiSpamCloud-Username: 168.144.250.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=168.144.250.0/24@xsmtpout.mail2web.com
X-AntiSpamCloud-Outgoing-Class: unsure
X-AntiSpamCloud-Outgoing-Evidence: Combined (0.17)
X-Recommended-Action: accept
X-Filter-ID: EX5BVjFpneJeBchSMxfU5j7LQZ4hpjmYRQimH7Fen9AXv9krsgRhBn0ayn6qsUc7A2kcKDr1fzRm ksYYe0sWHrgNzB/4Jkrw1eDLcif59ftJcOG9tU10QZjh1NnJPeJ9B98yDTitFWvbHwz9vKZpm4b3 Kv7PcFSfRyFbnU/eNYdfZdf1siwYNJirk4ABKayRZsQEbaxxISMHgJxrdMdSS4B6hVJPXxgisa+g wkHvC+PVG1YjIrFRKhESMT/tU1Dx+IHaAZrg1ulFniksjLYqZxdG5bOwa1rOgT+89+/XFrGt2tce crpXRY6fm8RXptyzavERpop5LF7RavHozgbn9XzprFRbpFQTOcEGeQOY3IcDlgJpEbxunV7tCPNi PQvHQpVRoYcix47lJTuKsG8TgnDHFRDF834rtLc6Wv9Yj+vBPX9bzGJi0ycLbiOUDEySIK/1NH5T HMtlYvyHAYGOGheVSH7cGoIH3Vd41lbD31XIKcwsOsYjBjCZN249H7KzSqpR+WsWEoFdiO1WLSqm BLjP/AMVb6/YbYeoS4ph6P3GvVLPSj+Hlyh2mculO/W8NktFVcl6hrIDm43UklXgo0rGkb5OztVl OoF8rUUHwR1JLObs/ksVBOHvEAgSr8kA1kWiicstEyxcSXS3gzmQ6EONoJfh+XjGSeeT90H/uIET XgycjncURQxgzXxu7/P7fNiHhQn9lhVQeKzH/YK4nGbjO41FyBEqIaDudcVplPEfgkCmu0AbpCDt lYGBUhlW7i647gVHMYTji4wyoFXFDffFcHV2tQAVqGdj/zM7G/F/kBR/WQICwWa5uPAEZIkV5ft9 Iz0WDtXlRni5HCCJM9Qvlo9UV7vdWttsewtXKowaEO652uo+6xHVEn43gl09gN9PtOEBx/RKpFEr HkJ0VfjEzm1SsR8v3aJbN/NZfa/pGyl0Yc/hSh4fhbFqiL7w
X-Report-Abuse-To: spam@quarantine5.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/sqgMPxVg_1JXKkmxpPGb2Ex8WWw>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jan 2018 04:57:08 -0000

> On Jan 1, 2018, at 8:44 PM, Martin Thomson <martin.thomson@gmail.com> wrote:
> 
> With the notice here that we're probably getting ahead of things a little...
> 
>> On Tue, Jan 2, 2018 at 3:32 PM, Christian Huitema <huitema@huitema.net> wrote:
>> Actually, flow control in TCP is used both as an application layer tool, e.g. don't send faster than the printer can print, and as a transport level tool to limit the speed at which the peer can send. If we just look at the application level, then of course this is purely a stream layer issue. But if we consider the transport function, then it makes sense to tie it to a path.
> 
> I'm not sure that I see the logical connection here.  If the intent is
> to govern send rate on a given path, then we probably want a different
> mechanism, but it's not really flow control any more.  I think that
> our TCP heritage might be more of a liability in this case and we
> should be clear what properties we're seeking - plus some new names
> for these functions.

Yes. Probably something to develop a bit in the next iteration of my draft.

> 
>>> I'm going to have to think on it some more, but your suggestion in 4.7 might be a good idea.  We don't have to do that now, though we might choose to do so if we can work through the design and implications.
>> 
>> Either separate encryption keys for separate connection ID, or mix IV with connection ID and sequence number for the nonce. The latter might work better, because it does not require keeping the master secret around. But it leaks one bit for correlation if the phase bit changes at the same time on all paths after a key rotation.
> 
> A simpler design has a key rotation for every connection ID change and
> no key phase bit.  There are a few downsides of course, but those can
> be managed.

One downside is that rotations have to be performed in order, probably using a connection ID sequence like the current packet gap spec. Hashing the connection ID in the key gets rid of that, and that's nice. Plus it allows starting using several connection ID in parallel, which is needed for multi path.

But yes, we are getting a bit ahead, and I expect the chairs to try rein in that discussion at any moment now.

-- Christian Huitema