Re: Packet number encryption

Jana Iyengar <jri@google.com> Tue, 06 February 2018 23:00 UTC

Return-Path: <jri@google.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7937512DA3F for <quic@ietfa.amsl.com>; Tue, 6 Feb 2018 15:00:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.709
X-Spam-Level:
X-Spam-Status: No, score=-2.709 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sOviqQryD3Vx for <quic@ietfa.amsl.com>; Tue, 6 Feb 2018 15:00:34 -0800 (PST)
Received: from mail-yw0-x22e.google.com (mail-yw0-x22e.google.com [IPv6:2607:f8b0:4002:c05::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9B15712DA4C for <quic@ietf.org>; Tue, 6 Feb 2018 15:00:34 -0800 (PST)
Received: by mail-yw0-x22e.google.com with SMTP id m84so2582582ywd.5 for <quic@ietf.org>; Tue, 06 Feb 2018 15:00:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=/ggAHmHIBfeYljleYXXruvDHM9OkA0rKp488tUuBhTs=; b=idvqal8PurKrWuqIqJXcAPmmNbm5lAHwYEd/wRh36m0/cZkMVPqe2CAy3Vhx/Q53Lk 6XW2ZDtNmqLiHQ6oYXhbuWQ9n9Kp15FrJJFVLGoZ0rDhqy5qpL2o/jsyCKPSHPVPWuhf hyqEZWjEoUcwKsupQUpFTqjmF34EhbMp6Q1XFS4oiMXeVTjebn4U0l+yrzPMzdPbNNAB OYJWwIeYWagF+r75jCdrLywgNUJKFPIGL/7+SVMb6F7olbhKh7/qOyUPTGKVUqDnS2Eu gtQuEa/mN4hJP24b3HymJwewgB+2B3tnWbZOL05bkIEpFAovpXXLsPdTFM3cYODUP1gs aQqQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=/ggAHmHIBfeYljleYXXruvDHM9OkA0rKp488tUuBhTs=; b=jL222zkc8bYuXafBlezNSS4KX3RVJIj88ZUwIjNj8zAzjg8dl7Sgz6Anz7q1AvhWwJ 7h/3v5TBCryaAFb1ToqkIAO6nmLTuyj7SjJa1Ex4RhL9rEtEWNBri6HyQAVIA2Hw8Ox1 037sIFoZ6Du+k5YhVpxJIats5ta8M2RtRerbWMH94kgRQLPJP0x3llPopQSiY3zcSTgx TPy2FV+VtOmhsSH5vEG5+VrIl94G6ZX3GGpndvUGBDcLcVG/p4A+4LD1vbkt+9Rzfs7y FBu3lzrDo9Livhsfuy7BUy8hPsvI59uznpRdenGKrvFLiU9Y3sAiJk8F3Bnfbdx69b6/ H6tw==
X-Gm-Message-State: APf1xPDq+nSmV11d6WbzQK0/iwH5NiH4zyLdPQDuqknrIZlNX2VB65Gf 51sD14CXImogn/vBNHALI82OqCTsyIXEFEKOSjkyrA==
X-Google-Smtp-Source: AH8x225gfHFXHg8MY0m47a6qIbY19d6KHAnrWO0M+WxGybRSyABwyGrUWsf0OGRv9JgjvzyOm//j38Kt1QMsc55nIik=
X-Received: by 10.37.125.131 with SMTP id y125mr2671199ybc.186.1517958033252; Tue, 06 Feb 2018 15:00:33 -0800 (PST)
MIME-Version: 1.0
Received: by 10.37.135.77 with HTTP; Tue, 6 Feb 2018 15:00:32 -0800 (PST)
In-Reply-To: <MWHPR08MB2432D0216BC8FE1B0D9E3690DAFD0@MWHPR08MB2432.namprd08.prod.outlook.com>
References: <CABkgnnVyo3MmWtVULiV=FJTnR528qfY8-OmKGWAs0bCvri-a_g@mail.gmail.com> <2C515BE8694C6F4B9B6A578BCAC32E2F83BA1443@MBX021-W3-CA-2.exch021.domain.local> <BY2PR15MB07757473DB9788558B902EB5CDF80@BY2PR15MB0775.namprd15.prod.outlook.com> <6E58094ECC8D8344914996DAD28F1CCD861B7F@DGGEMM506-MBX.china.huawei.com> <e529144067624fcba636fc8c24ee3ff4@usma1ex-dag1mb5.msg.corp.akamai.com> <BY2PR15MB07754D83A1721F2BD742359BCDFE0@BY2PR15MB0775.namprd15.prod.outlook.com> <2CD9DC43-D69B-43F0-8474-DFE798850A52@akamai.com> <CAGD1bZaUuNxqpDkn62B0wWcFD8=mCUWrAwWGG-rAOxH7Mf1=cQ@mail.gmail.com> <CY4PR21MB01334E30C7AF6AE75F58EEFDB6FE0@CY4PR21MB0133.namprd21.prod.outlook.com> <CAGD1bZaxrqzdkk0wxRaULwOTgg6wnrSrXNBK31s4uxdozaACBA@mail.gmail.com> <CAGD1bZbOAaSBcQw4nVtGuwRunaAW8MYHq9yPxNN6DdKHzt5HtQ@mail.gmail.com> <2102BDC2-62C0-4A76-8ADE-8167437E2D07@trammell.ch> <CAN1APde6o6=aCXuWajPFSU=jXv-ERdVHk=uyjM71uQ_uU-oMTg@mail.gmail.com> <8e833029-68b5-2787-3897-a0f7818a259f@tik.ee.ethz.ch> <1de39727-eeec-0e7a-1e8b-5ed50433c5bd@cs.tcd.ie> <MWHPR08MB2432D0216BC8FE1B0D9E3690DAFD0@MWHPR08MB2432.namprd08.prod.outlook.com>
From: Jana Iyengar <jri@google.com>
Date: Tue, 06 Feb 2018 15:00:32 -0800
Message-ID: <CAGD1bZauKbucs_5n7RQbK8H2HiyfiqpGVEcKreGA6umhMBSFgg@mail.gmail.com>
Subject: Re: Packet number encryption
To: Mike Bishop <mbishop@evequefou.be>
Cc: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>, Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>, "Brian Trammell (IETF)" <ietf@trammell.ch>, Praveen Balasubramanian <pravb@microsoft.com>, QUIC WG <quic@ietf.org>, Roberto Peon <fenix@fb.com>, "Lubashev, Igor" <ilubashe@akamai.com>, "Salz, Rich" <rsalz@akamai.com>
Content-Type: multipart/alternative; boundary="001a114e326e5c023005649325d2"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/zhJs95jmhiF2b4n4lMixNrajc-Y>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Feb 2018 23:00:37 -0000

I'm going to try a different attempt at moving towards
convergence. Thinking about this some more, and picking up something that
Mirja said way earlier in this thread, I think the following decomposition
is useful.

1. In the transport, all packet numbers start at 0, increasing
monotonically. ACK frames carry these packet numbers, and therefore do not
have to span large gaps and do not have to deal with increases in the size
of the largest acked. Basically, no gaps are visible within the transport
processing engine.
2. Before sending a packet on the wire, and before processing the packet,
QUIC transforms the packet number with some function, replacing the visible
packet number with the transformed value.

I think we can all agree that (1) is goodness. A sender is also free to use
packet numbers from non-contiguous spaces here FWIW, but that's entirely
independent of what's visible on the wire. This helps me separate transport
processing complexity from the rest of it, which I think is helpful.

I think we are disagreeing on the precise properties we want from the
transformation in (2). If we can agree on these properties, we can then
figure out whether it's possible and how to construct such a transform.
Here's a union of what folks are concerned about:
1. Packet number must be unlinkable across connection ID change (for
migration.)
2. Packet number must start at an arbitrary value, to avoid ossification of
the first packet number.
3. Some sequencing information -- a few bits of the packet number perhaps
-- should be revealed (for monitoring. Number of bits TBD.)
4. Any packet number transformation should not be compute intensive.

I'm not looking for a construction, but I'd like to agree on the problem
first. Does this sound like the set of properties we want? Or is there a
contradiction among these properties that I'm not seeing?

On Tue, Feb 6, 2018 at 9:56 AM, Mike Bishop <mbishop@evequefou.be> wrote:

> Packet number encryption *does* improve linkability equivalently to random
> jumps, but without the fragmentation of the ACK packet which those jumps
> otherwise cause.  So I'm with Stephen, we don't yet have agreement on that
> assertion.
>
> -----Original Message-----
> From: QUIC [mailto:quic-bounces@ietf.org] On Behalf Of Stephen Farrell
> Sent: Tuesday, February 6, 2018 7:35 AM
> To: Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>; Mikkel Fahnøe
> Jørgensen <mikkelfj@gmail.com>; Brian Trammell (IETF) <ietf@trammell.ch>;
> Jana Iyengar <jri@google.com>
> Cc: Praveen Balasubramanian <pravb@microsoft.com>; QUIC WG <quic@ietf.org>;
> Roberto Peon <fenix@fb.com>; Lubashev, Igor <ilubashe@akamai.com>; Salz,
> Rich <rsalz@akamai.com>
> Subject: Re: Packet number encryption
>
>
>
> On 06/02/18 15:23, Mirja Kühlewind wrote:
> >
> > It's also my understanding that we do agree that packet number
> > encryption does not help likability (and thereby privacy) a lot, or at
> > least that the benefits we might get (or not) do not justify the
> > additional complexity.
>
> FWIW, which isn't much, I don't (yet) agree to the above.
> I reckon it'll be a while before we know how linkability pans out. I do
> agree that packet number encryption is not a panacea for unlinkability, but
> it may help, or may even end up being required, to do a good job wrt
> linkability.
>
> I also heard people say it was less complex for them so "additional
> complexity" may also not be quite right. (I guess "differently complex" is
> correct though.)
>
> S.
>
> --
> PGP key change time for me.
> New-ID 7B172BEA; old-ID 805F8DA2 expires Jan 24 2018.
> NewWithOld sigs in keyservers.
> Sorry if that mucks something up;-)
>