Re: Getting to consensus on packet number encryption

Christian Huitema <huitema@huitema.net> Tue, 17 April 2018 05:06 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 73F6612EAB7 for <quic@ietfa.amsl.com>; Mon, 16 Apr 2018 22:06:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5p6bpw81Xndf for <quic@ietfa.amsl.com>; Mon, 16 Apr 2018 22:06:02 -0700 (PDT)
Received: from mx43-out1.antispamcloud.com (mx43-out1.antispamcloud.com [138.201.61.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8549D124205 for <quic@ietf.org>; Mon, 16 Apr 2018 22:06:01 -0700 (PDT)
Received: from xsmtp06.mail2web.com ([168.144.250.232]) by mx60.antispamcloud.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.89) (envelope-from <huitema@huitema.net>) id 1f8IoO-000Eeq-7G for quic@ietf.org; Tue, 17 Apr 2018 07:05:55 +0200
Received: from [10.5.2.49] (helo=xmail11.myhosting.com) by xsmtp06.mail2web.com with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <huitema@huitema.net>) id 1f8Int-0005i8-L2 for quic@ietf.org; Tue, 17 Apr 2018 01:05:22 -0400
Received: (qmail 9495 invoked from network); 17 Apr 2018 05:05:14 -0000
Received: from unknown (HELO [192.168.1.103]) (Authenticated-user:_huitema@huitema.net@[172.56.42.78]) (envelope-sender <huitema@huitema.net>) by xmail11.myhosting.com (qmail-ldap-1.03) with ESMTPA for <quic@ietf.org>; 17 Apr 2018 05:05:13 -0000
To: Roberto Peon <fenix@fb.com>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>
Cc: "quic@ietf.org" <quic@ietf.org>
References: <7fd34142-2e14-e383-1f65-bc3ca657576c@huitema.net> <d8e35569-e939-4064-9ec4-2cccfba2f341@huitema.net> <CACpbDccqKoF-Y1poHMN2cLOK9GOuvtMTPsF-QEen3b30kUo9bg@mail.gmail.com> <CAKcm_gNffwpraF-H2LQBF33vUhYFx0bi_UXJ3N14k4Xj4NmWUw@mail.gmail.com> <40C1F6FE-2B2C-469F-8F98-66329703ED50@mnot.net> <21C36B57-6AE2-40EF-9549-7196D7FA9B45@tik.ee.ethz.ch> <B176FC07-887D-4135-B01E-FE8B4986A5EE@mnot.net> <CAKcm_gOCeocLyrYpOS7Ud332xdz3xHSH0psPN8T6BGRjoL9ptQ@mail.gmail.com> <CY4PR21MB0630FA0EDD343396AD414641B6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <CAN1APde13JTzCvKFFvMd183Fka6QGD1kGBjsa9fcoLrYeA2hsA@mail.gmail.com> <CY4PR21MB0630C0FD4FBECBFEC3C863BBB6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <047d2ff0-ff8b-64c9-8983-0ecabeb9fea5@huitema.net> <B0F49097-F77A-4831-B68B-4266AA880A86@tik.ee.ethz.ch> <74E2F5C2-66AD-4902-8A4A-E481CC0A015C@fb.com> <75050158-3812-44F1-A01E-D70EED7FDFD6@tik.ee.ethz.ch> <BY2PR15MB0775B4ACF7DB9124E89016F0CDB00@BY2PR15MB0775.namprd15.prod.outlook.com>
From: Christian Huitema <huitema@huitema.net>
Openpgp: preference=signencrypt
Message-ID: <c8e60ba4-d6be-c4fc-5bac-d569a28fb4e8@huitema.net>
Date: Mon, 16 Apr 2018 22:05:04 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0
MIME-Version: 1.0
In-Reply-To: <BY2PR15MB0775B4ACF7DB9124E89016F0CDB00@BY2PR15MB0775.namprd15.prod.outlook.com>
Content-Type: multipart/alternative; boundary="------------4E7EB142F9BC0209D4AF845D"
Content-Language: en-US
Subject: Re: Getting to consensus on packet number encryption
X-Originating-IP: 168.144.250.232
X-AntiSpamCloud-Domain: xsmtpout.mail2web.com
X-AntiSpamCloud-Username: 168.144.250.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=168.144.250.0/24@xsmtpout.mail2web.com
X-AntiSpamCloud-Outgoing-Class: unsure
X-AntiSpamCloud-Outgoing-Evidence: Combined (0.11)
X-Recommended-Action: accept
X-Filter-ID: EX5BVjFpneJeBchSMxfU5i0MmRrb6ml6B1n7BThbRXd602E9L7XzfQH6nu9C/Fh9KJzpNe6xgvOx q3u0UDjvO37pNwwF1lRXh5rzvPzo9Jts1ujulqUFmMITHM77eiViWLaTxHvbm0E6QFpGGJDnSs7i TvJ2/ZGzVWB9scFAaCdIFaUvXN+CI+RGy3Me16pB6b6XZpNC1wnpsGpZepb/px/TBCf6oYXAWGet lavcAjD9ytQxIHf9lN5jjLJaPK8lRJSPf/SXbEnDSsal/zZzc4n9VZdr7RAFD5mRwooUYhwMPaBP aKeQW+/QlaOdv8isl/qMm08Zpim2AHUKEWvQ6G/bWfgucjnNmABpGhD9TTttrFCuZ0NkwnSz2Luu o1u9uevuNfM1HjkNEFwape+IgNezYqxGMqsKjARq8PBC4qjpVMhqNcdjhoIlgrKzBvjTmdySlZou 9qHIGOZDEEo7Oyc1nq0gsY582CWqKjiRB3ukywmZtiDkyd4mEBjJGGEJgawbllbHk+xyUKopM6rc KCaQX/lIXcRWtobViGg9fpX8nIu6prlMU9qLY4Lxa6TDZO4QNCMqLJSDylLzK7xkvvwKHH8RRuLX z1PhqHAL0sOO98fck6astPPFccqiLCixm7xl+RQ3vIZqfBpLwZArl3I1g+tBSv0B+cgW7VoPEiDI +8QkA7WZKXURE/tHtZ/u9H4DectLaqn7kLktZo9lq1hNqyux1yaQvYroLJ1yFFoLB6985QCOnb53 dgbGIuRzQZs4iXA/pTuddAL2KCGOjKaoYeoLX/yEBEWAApw66TomM5/SMi121Scyc6igqIaHZhUF HKbUZMv7c3cOU/0VEib1mfTPzunlam64tUNDvP/bMcctPzMPLiqwr8e+aie3zxvdN0leIxaNIjs7 cbPZdZnckpWaLvahyBjmQxBKOztcoEJy5JI/WnEUTEvEJGtKRioNM4YdAO5dQww9T9HjAWtJl6pO HngTL5HKgxzCo5M=
X-Report-Abuse-To: spam@quarantine6.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/urgZhSvgp_CqKuXAGFPL-nfPthQ>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Apr 2018 05:06:05 -0000

Since you all want to read more text, I wrote a summary of the various
proposals in the QUIC Wiki:
https://github.com/quicwg/base-drafts/wiki/Summary-of-the-PN-encryption-issues-and-alternatives.


Of course, that summary reflects my own modest understanding. But then
it's a wiki, so you can easily correct me.


-- Christian Huitema



On 4/16/2018 12:56 PM, Roberto Peon wrote:
>
> Paraphrasing:
>
> > PN insufficient to fix ossification, why is that difficult/expensive?
>
> As described in the other subthread, you'd have to emulate the same
> ordering of the previously-ossified PN while also doing whatever
> newness you want with the new PN.
> That sounds fabulously complex. You'd end up running two different
> implementations simultaneously.
>
> > Ossification/invariant without encryption:
> Encryption solves it, sounds like we agree on that 😊
>
>
> -=R
>
> ------------------------------------------------------------------------
> *From:* QUIC <quic-bounces@ietf.org> on behalf of Mirja Kühlewind
> <mirja.kuehlewind@tik.ee.ethz.ch>
> *Sent:* Friday, April 13, 2018 4:06:40 AM
> *To:* Roberto Peon
> *Cc:* quic@ietf.org; Christian Huitema
> *Subject:* Re: Getting to consensus on packet number encryption
>  
> Hi Roberto,
>
> see below.
>
> > Am 10.04.2018 um 03:04 schrieb Roberto Peon <fenix@fb.com>:
> >
> > Adding another PN would probably not be sufficient-- one would need
> to ensure that the ossified PN was presented with the right sequencing
> as well, which might be difficult, or expensive.
>
> Yes, that is easy. Why do you think that is difficult or expensive?
>
> > Ossification is surprisingly difficult to work around once it sets
> in, as even figuring out how it is impacting you can be substantial work.
>
> That is true for a protocol like TCP very the invariant is large and
> non of the bits are encrypted. For QUIC we have a completely different
> situation.
>
> Mirja
>
>
> >
> > -=R
> >
> > On 4/5/18, 2:27 AM, "QUIC on behalf of Mirja Kühlewind"
> <quic-bounces@ietf.org on behalf of mirja.kuehlewind@tik.ee.ethz.ch>
> wrote:
> >
> >    Let me repeat another position then as well:
> >
> >> Am 05.04.2018 um 02:44 schrieb Christian Huitema <huitema@huitema.net>:
> >>
> >> If we are in the business of repeating our positions, so be it. I
> am pretty much on the same line as Patrick and others:
> >>
> >> 1) Privacy is not optional. And yes, removing "linkability through
> PN" is important, because when the connection ID and the source
> address also change, the only other cue for linkability is timing.
> Timing can be addressed by having overlapping connections.
> >>
> >    Timing doesn’t help here either because you still have the same
> destination IP, both port numbers and the fact that a migrated
> connection does not have a handshake. If we want to address the
> linkability problem, we would need to do much more, probably baring
> more hits on performance.
> >
> >    I thought we discussed this already endlessly and concluded that
> PNE does not help linkability.
> >
> >    Then an argument for ossification was broad up. However, we
> really cannot compare the situation here with TCP. With TCP everything
> is in the clear incl. also the retransmissions. In case of MPTCP this
> was rather the problem the the seq# because if you’d use the same seq#
> number space on both connections it would like loss but without a
> retransmission. Further boxes that reorder, usually do that in
> situation where packets were transmitted for a known reason out-of
> order previously, e.g. when multiple paths are used in the network.
> The recommendation we still give in the IETF transport area is that in
> such a situation the scheduling should not be done on a per-packet
> level but per-flow. However, those scheme that do per-packet
> scheduling usually also apply mechanism to re-order afterwards. They
> can just use the TCP seq# for that but for non-TCP they would simply
> add their own encapsulation with a seq#…
> >
> >    Please keep in mind that even if an (unencrypted) PN gets
> ossified by the network,
> >    in case of QUIC that does not mean that we can’t change the
> transport machinery anymore. Currently the exposed PN is also used for
> congestion control and retransmission, however, we can still add
> another PN in the encrypted part and resolved the fact that the
> current PN is overloaded for different functions.
> >
> >    Currently, I really still don’t see the benefit of PNE but only
> additional complexity and known performance degradation.
> >
> >    Mirja
> >
> >
> >
> >
> >
>