RE: Expected Client Response to SERVER_BUSY

Nick Banks <nibanks@microsoft.com> Wed, 20 February 2019 18:58 UTC

Return-Path: <nibanks@microsoft.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F8E0130DBE for <quic@ietfa.amsl.com>; Wed, 20 Feb 2019 10:58:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pGllxWVzv1p7 for <quic@ietfa.amsl.com>; Wed, 20 Feb 2019 10:58:29 -0800 (PST)
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-eopbgr790119.outbound.protection.outlook.com [40.107.79.119]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B67FD130E6D for <quic@ietf.org>; Wed, 20 Feb 2019 10:58:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OPto63+xQ6XKXIeoSpivu5+8dIqgfOF9/pXBjhJyqRI=; b=nXv+4YoneEoJ1SAQp8DhNRRyWN4CeRk4UO1xpLMZsbyTuxzseP/LMYGBSs2wh7XFuYSeqvmIYrp/0GKY1LuVs96cKu9sdKRDg45CgrsPBj+IAd62VbjuFt+p0F02TQ6i9HD4R3PX8DTMXe2A/oLql3auSkfP1EBNTpzYVLvzDLE=
Received: from CY4PR21MB0854.namprd21.prod.outlook.com (10.173.192.143) by CY4PR21MB0856.namprd21.prod.outlook.com (10.173.192.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1665.3; Wed, 20 Feb 2019 18:58:27 +0000
Received: from CY4PR21MB0854.namprd21.prod.outlook.com ([fe80::ccd2:aa1d:e646:fa46]) by CY4PR21MB0854.namprd21.prod.outlook.com ([fe80::ccd2:aa1d:e646:fa46%3]) with mapi id 15.20.1665.002; Wed, 20 Feb 2019 18:58:27 +0000
From: Nick Banks <nibanks@microsoft.com>
To: Ian Swett <ianswett@google.com>, Christian Huitema <huitema@huitema.net>
CC: Töma Gavrichenkov <ximaera@gmail.com>, "Brian Trammell (IETF)" <ietf@trammell.ch>, IETF QUIC WG <quic@ietf.org>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>
Subject: RE: Expected Client Response to SERVER_BUSY
Thread-Topic: Expected Client Response to SERVER_BUSY
Thread-Index: AdTInrfRZAbJSsLZSlWCCrlUkiWX7AAgkIeAAACdzgAAAbynAAAAN6coAACOYoAAAIKXwAAAszQAAAatwwAAABbyAAAALguQ
Date: Wed, 20 Feb 2019 18:58:27 +0000
Message-ID: <CY4PR21MB0854ECFAAB302C7C8B488C97B37D0@CY4PR21MB0854.namprd21.prod.outlook.com>
References: <CY4PR21MB0854341128C64E450E7C2DA2B37C0@CY4PR21MB0854.namprd21.prod.outlook.com> <CAKcm_gPmQiMhzfXnkEB4u+X+84bCbL8FE3Lj3ZdPPQBBu+4uPg@mail.gmail.com> <1AF7E952-4542-4C40-8652-BFFBFA61784A@trammell.ch> <CAKcm_gN11=DcV2v-JrX+Ym88D7P1Ey3rDvYomTf1seemsWDSwA@mail.gmail.com> <CY4PR21MB0854D8F7383CDF72EEDAE9FBB37D0@CY4PR21MB0854.namprd21.prod.outlook.com> <CALZ3u+Zmau+167msd9+OGcU+V00+__yLK83ByNEqvWhm7yFORg@mail.gmail.com> <CY4PR21MB0854E1E9AAF564CD8B12305CB37D0@CY4PR21MB0854.namprd21.prod.outlook.com> <CALZ3u+b_NqyrSAkqiuXnnVVL+T0XiExPDUP5JyuzvZVaXqHtCA@mail.gmail.com> <a861dc7b-c1a4-fa72-649a-4f98050aa6f5@huitema.net> <CAKcm_gP5Oh5COQhybaAJXaPEtQQbkdAd6_yrPALbZ9ZGxwHz7A@mail.gmail.com>
In-Reply-To: <CAKcm_gP5Oh5COQhybaAJXaPEtQQbkdAd6_yrPALbZ9ZGxwHz7A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=nibanks@microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2019-02-20T18:58:25.5356596Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=e866ef22-7d9f-421b-9bbe-1003a88a1fdd; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic
x-originating-ip: [2001:4898:80e8:3:682d:1a0f:7fc0:ca5c]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: db2ffb22-f183-461c-0abd-08d6976565a1
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600110)(711020)(4605104)(4618075)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:CY4PR21MB0856;
x-ms-traffictypediagnostic: CY4PR21MB0856:
x-microsoft-exchange-diagnostics: 1;CY4PR21MB0856;23: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
x-microsoft-antispam-prvs: <CY4PR21MB08563B246B5BFFF6F5A13AD1B37D0@CY4PR21MB0856.namprd21.prod.outlook.com>
x-forefront-prvs: 0954EE4910
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(346002)(396003)(366004)(136003)(39860400002)(189003)(199004)(13464003)(53936002)(476003)(102836004)(236005)(2906002)(71200400001)(71190400001)(66574012)(4326008)(790700001)(53546011)(6506007)(229853002)(186003)(46003)(6116002)(5660300002)(486006)(446003)(11346002)(9686003)(6436002)(33656002)(6306002)(55016002)(54896002)(25786009)(6346003)(81156014)(22452003)(478600001)(86362001)(316002)(54906003)(14454004)(74316002)(110136005)(93886005)(105586002)(8676002)(106356001)(10290500003)(86612001)(76176011)(14444005)(256004)(7696005)(6246003)(97736004)(10090500001)(8990500004)(99286004)(7736002)(8936002)(68736007)(81166006); DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR21MB0856; H:CY4PR21MB0854.namprd21.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=nibanks@microsoft.com;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: lEUs1eVCXg//VylrjqshqirOHXtbl9xQYnFu6oZTMHa3xpFHUGpT5NEyR2W43NHiLJ4tEOmRGadQW1RKJvDo7PuzLeu3r0THsbeNMuoJX05GJRCkkHWvcsjm1BCbr7Cbb7QHL7a/0+9EkP9zdorUo9y/FKuHCa4q+v7J4ZIsZAVXbxgeJZvkdx7By8CpLjlaRsWxIQJD1na5GVUy10yRegUnOvtN84eN0BoHCIeHs4Wufbtqr7jS8UBJ7588/pKB0rKiVnwMbyUnqyX9GLnTalDCN3Rl9IFOOLcswm09k2wMWudwc5G1h6Dj5114teq2+6/nQSxgF3BDJUxPOp96vY0jojQR8jbS+yOXdYs/YqnHIE3YuVNcV4+v3CHqK96gVLZmUfouKJ5FTpm5A22iNDAaY3lZcS9JBxvECrC1tjI=
Content-Type: multipart/alternative; boundary="_000_CY4PR21MB0854ECFAAB302C7C8B488C97B37D0CY4PR21MB0854namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: db2ffb22-f183-461c-0abd-08d6976565a1
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Feb 2019 18:58:27.1317 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR21MB0856
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/fqrj71GD75DKej6Mc0VIhs-o8U4>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2019 18:58:32 -0000

The best thing I could think of is some client side logic that has a timer to wait for a possible valid server response for some short time after it receives the conn close frame. If it comes, ignore the close.

- Nick

From: Ian Swett <ianswett@google.com>
Sent: Wednesday, February 20, 2019 10:52 AM
To: Christian Huitema <huitema@huitema.net>
Cc: Töma Gavrichenkov <ximaera@gmail.com>; Nick Banks <nibanks@microsoft.com>; Brian Trammell (IETF) <ietf@trammell.ch>; IETF QUIC WG <quic@ietf.org>; Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>
Subject: Re: Expected Client Response to SERVER_BUSY

Agreed it's not amazing, but stateless reset isn't available until the handshake completes.  Did you have any suggestions?

On Wed, Feb 20, 2019 at 1:49 PM Christian Huitema <huitema@huitema.net<mailto:huitema@huitema.net>> wrote:
Can we do better than an unauthenticated signal to "drop QUIC
immediately and use something else"?

I understand the desire of protecting servers against DOS attacks, but
the proposition here allows a middle-box or a man-on-the-side to send an
unencrypted signal and have the client immediately immediately drop the
connection. That does not feel right.

-- Christian Huitema


On 2/20/2019 7:38 AM, Töma Gavrichenkov wrote:
> I mean, yes, handling such a case explicitly totally makes sense. I
> just wanted to point out that there's an additional use case when UDP
> transmission just suddenly stops under an attack.
>
> Note that a DDoS attack towards a QUIC server isn't the only possible
> scenario, the other one being a DDoS towards a client. In the latter
> scenario, given the not-so-likely-but-completely-possible case when a
> newly discovered DDoS amplifying protocol would be using port 443/udp,
> even selective blackholing won't help to preserve QUIC connectivity.
> As a matter of fact, there's no way to handle it
> transport-protocol-wise, but maybe adding a timeout-related suggestion
> of a SHOULD CONSIDER style to the spec would be a good idea.
>
> | Töma Gavrichenkov
> | gpg: 2deb 97b1 0a3c 151d b67f 1ee5 00e7 94bc 4d08 9191
> | mailto: ximaera@gmail.com<mailto:ximaera@gmail.com>
> | fb: ximaera
> | telegram: xima_era
> | skype: xima_era
> | tel. no: +7 916 515 49 58
>
> On Wed, Feb 20, 2019 at 7:19 AM Nick Banks <nibanks@microsoft.com<mailto:nibanks@microsoft.com>> wrote:
>> I want to support something a bit more efficient than simple rate limiting and packet drops. The client might have relatively large timeout in that case before falling back to TCP. If possible, I want to be able to give an immediate indication that it should try to fallback.
>>
>> - Nick
>>
>> -----Original Message-----
>> From: Töma Gavrichenkov <ximaera@gmail.com<mailto:ximaera@gmail.com>>
>> Sent: Wednesday, February 20, 2019 7:04 AM
>> To: Nick Banks <nibanks@microsoft.com<mailto:nibanks@microsoft.com>>
>> Cc: Ian Swett <ianswett@google.com<mailto:ianswett@google.com>>; Brian Trammell (IETF) <ietf@trammell..ch<mailto:ietf@trammell..ch>>; IETF QUIC WG <quic@ietf.org<mailto:quic@ietf.org>>; Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch<mailto:mirja.kuehlewind@tik.ee.ethz.ch>>
>> Subject: Re: Expected Client Response to SERVER_BUSY
>>
>> On Wed, Feb 20, 2019 at 6:50 AM Nick Banks <nibanks=40microsoft.com@dmarc.ietf.org<mailto:40microsoft.com@dmarc.ietf.org>> wrote:
>>> It would be nice to have a way for the server to say “QUIC is
>>> temporarily unavailable right now, please go use TCP instead.”
>> One issue here is that under a DDoS attack an ISP would just apply selective blackholing or flow specification which would simply drop all the incoming UDP traffic to protect the last mile. Depends on the attack pattern somewhat, sometimes blackholing might be more granular, but all in all you should expect that.
>>
>> The only hope here is that a client would interpret response timeout in the same way as SERVER_BUSY.
>>
>> --
>> Töma