Re: [Spud] Fwd: New Version Notification for draft-herbert-transports-over-udp-00.txt

Jana Iyengar <jri@google.com> Sun, 22 May 2016 03:03 UTC

Return-Path: <jri@google.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC49E12B068 for <spud@ietfa.amsl.com>; Sat, 21 May 2016 20:03:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.126
X-Spam-Level:
X-Spam-Status: No, score=-4.126 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-1.426, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jWUsOZTGnX7M for <spud@ietfa.amsl.com>; Sat, 21 May 2016 20:03:28 -0700 (PDT)
Received: from mail-yw0-x234.google.com (mail-yw0-x234.google.com [IPv6:2607:f8b0:4002:c05::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55CEA12B005 for <spud@ietf.org>; Sat, 21 May 2016 20:03:28 -0700 (PDT)
Received: by mail-yw0-x234.google.com with SMTP id x189so143050697ywe.3 for <spud@ietf.org>; Sat, 21 May 2016 20:03:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=SLr+yO2Eu7+q4Klrzuj5MABOKSKdbRHzKRPwDbD7VIc=; b=GocwNwhvLFn0QfNCMm9xPM/fP87jGe59uvKL8USiFmhWwQS0LN4wcWDYCNA5QORFhT ZeM2k9h4odvPB1KWuCwDbXtSj8EX3l9cA7fmIxFHrpAHzkz6AF1LLPqJ9h3MlXh6wA4m MPvmKZKRFHXhOLFrcoQLW7vlOuV5OTD3oxyZsNNxBjj91P1L/b1W6mpp5ns3i8RfRT0w lbEcEH6wWTyiXHET8yc7Dbe+zw4dGJamNBvrgKwkCZlPs3KiBLAFPqnDx+/QtzwQEkLw LjHk6MS/48tH9S5pwX0ePrXHJGz2ZeWr2NuLYsjJ8ZjipFErB3P++ChSjj/TojbWONh6 zh3g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=SLr+yO2Eu7+q4Klrzuj5MABOKSKdbRHzKRPwDbD7VIc=; b=eNjR0J8vZJgnPBbBn8EgZYlnFPDY0fjjqoZiwmB8QRyCheNjCItXZc8bZVjzYjpU1Y si/SQzmA7qfcjYE26gbebzjC2msSObuOFUR17qzwAUkY7ZPbBJq/OqkDwjQ0n9nGgvkh vGkPX1vENNEkkK7a4WBX+0nLl8zgGZVHdx2wQPSKCDe9auuvi3Tc0TviPzKMPvQE37LP mPKPEPn+ISsFqVM0Z53wyHThmykjr8nVKy+Nu3VLcNU2wOBmMW5O3ETjbqk40vz08pBh /dxCBnlQiVygaF/eYEbKzcFrEOXq/HDIjN1COIp9pTDEh9309XHa6UMOpEO+XKxYhmnU JX5Q==
X-Gm-Message-State: AOPr4FVSdSKBJlkAWwOPyFLNnSZBwVzAdpShj8me1ulj55UQjUxxbtf2Oi4FxisG0lIx6BFhN82StziCVPG7q8uf
MIME-Version: 1.0
X-Received: by 10.13.198.197 with SMTP id i188mr5711553ywd.207.1463886207316; Sat, 21 May 2016 20:03:27 -0700 (PDT)
Received: by 10.37.221.193 with HTTP; Sat, 21 May 2016 20:03:26 -0700 (PDT)
Received: by 10.37.221.193 with HTTP; Sat, 21 May 2016 20:03:26 -0700 (PDT)
In-Reply-To: <CALx6S35m9xCvzLqXyLgARdoep_WfZBoLsGFNUVUx8GfxXfiYNg@mail.gmail.com>
References: <CALx6S377qRfq7ufRVUx6Yn7ec4=EmK_=FL14PWT_qf4g840mbQ@mail.gmail.com> <20160519185943.GM12994@cisco.com> <CALx6S37qPpKpCT6ZpVQwRWf1XFKESYasOBcz26To9zw0GRyz5Q@mail.gmail.com> <573E31E1.807@isi.edu> <20160519221102.GS12994@cisco.com> <573E3C5E.2090300@isi.edu> <20160520001323.GC2511@cisco.com> <573E6303.8030701@isi.edu> <20160520012431.GF2511@cisco.com> <573F47C0.3010501@isi.edu> <20160520182115.GO2511@cisco.com> <CALx6S378X7bk5q-u7Kxu+s3w1ZZ5kZcyhCVEUyPG_=hVzNH2tA@mail.gmail.com> <655C07320163294895BBADA28372AF5D48860CBE@FR712WXCHMBA15.zeu.alcatel-lucent.com> <DM2PR0301MB06553A6249DB5BAD06D2A96BA84B0@DM2PR0301MB0655.namprd03.prod.outlook.com> <CALx6S35m9xCvzLqXyLgARdoep_WfZBoLsGFNUVUx8GfxXfiYNg@mail.gmail.com>
Date: Sat, 21 May 2016 20:03:26 -0700
Message-ID: <CAGD1bZZFkWNQ6dnETVoA0oat2h03JscCD6OcZPasFdKTYnkMQQ@mail.gmail.com>
From: Jana Iyengar <jri@google.com>
To: Tom Herbert <tom@herbertland.com>
Content-Type: multipart/alternative; boundary="001a114d6f746181ed05336591b2"
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/OvZPxsU_kR3b0YOB9IO_yMyuR7Q>
Cc: Christian Huitema <huitema@microsoft.com>, "Toerless Eckert (eckert)" <eckert@cisco.com>, Joe Touch <touch@isi.edu>, "Scharf, Michael (Nokia - DE)" <michael.scharf@nokia.com>, spud@ietf.org
Subject: Re: [Spud] Fwd: New Version Notification for draft-herbert-transports-over-udp-00.txt
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 May 2016 03:03:31 -0000

Possibly unsurprisingly, I like this draft. I'd like to argue some of the
choices made in the draft but I'll do that separately. For now, I just
wanted to articulate a few thoughts as I caught up on this thread:

- The ship has sailed on new native-IP transports. I worked on SCTP for 6
years and tried and watched it get nowhere in terms of deployment over
native-IP. It wasn't because it was in the kernel, it was primarily because
of NATs and various middleboxes. Yes this is definitely my opinion, but
arguing this point is silly. No new native IP transport has seen
significant deployment over the internet over the past 20 years, and it's
not for lack of trying.

- People reasonably consider timescales of a few years when thinking about
building and deploying a new transport. QUIC took a few years to build and
deploy over UDP, and the Adobe folks did RTMFP over UDP as well (a while
ago) in a reasonable time frame.

- Encryption is the *only* way to attempt avoiding ossification. Its
certainly reasonable to consider that it may not do the job, but without an
alternative, I'm afraid it will have to do for now.

- Michael raised a point about QUIC connection ID, which is incorrect: The
QUIC connection ID is NOT unique per user. It's a connection ID, and on a
single-path connection, it exposes exactly as much as TCP, DCCP, or SCTP do
(unique per 4-tuple). On a multipath connection, it exposes exactly as much
as MPTCP does. We can perhaps do better than MPTCP for multipath in terms
of privacy, I don't want to engage on this point on this thread since it's
not relevant to this thread.

- jana
On May 21, 2016 8:53 AM, "Tom Herbert" <tom@herbertland.com> wrote:

> On Fri, May 20, 2016 at 4:38 PM, Christian Huitema
> <huitema@microsoft.com> wrote:
> > On Friday, May 20, 2016 9:14 AM, Michael Scharf wrote:
> >> To: Tom Herbert <tom@herbertland.com>; Toerless Eckert
> >> <eckert@cisco.com>
> >> Cc: Joe Touch <touch@isi.edu>; spud <spud@ietf.org>
> >> Subject: Re: [Spud] Fwd: New Version Notification for draft-herbert-
> >> transports-over-udp-00.txt
> >>
> >> > NAT makes life complicated, especially if we want to have connections
> >> survive across UDP NAT address/port remapping. Most of the draft is
> about
> >> dealing with this. One nice feature (that I borrowed from > QUIC) is to
> >> negotiate a shared session identifier for the connection that is unique
> to both
> >> sides. With this a connection is identified (at the end
> >> > nodes) without using the addresses or UDP port numbers. So connection
> >> identification becomes location independent which solves the NAP
> >> remapping problem and also allows for mobility.
> >>
> >> Ahhh, Section 3.2 is really cool...
> >>
> >> I can clearly see the tremendous improvement for user privacy if the
> highly
> >> privacy-sensitive TCP header fields finally get all encrypted,
> including things
> >> like flags, sequence numbers etc., if there is now a new clear text
> identifier
> >> that just happens to be unique per subscriber. What a great improvement
> for
> >> privacy in the Internet! And even better that it seems compatible with
> QUIC...
> >>
> >> Sorry, I really could not resist.
> >
> > Actually, using a 64 bit QUIC-like identifier to support mobility or
> multi path is a terrible idea. The best way to describe it is, "clear text
> super cookie." It allows adversaries to link connections originating from
> different IP addresses. Providing such linkability is a boon for traffic
> analysis and user tracking, and of course a big loss for privacy. And yes,
> MP-TCP is doing something similar, but at least they acknowledge the
> problem and want to find a solution. If we want privacy, the identifiers
> used to link several connections together have to be placed inside the
> crypto envelope, not in a clear text header.
> >
> We assume that strong security must be applied, so unlike MP-TCP the
> transport headers are encrypted and the only information sent in plain
> text is the session identifier (serving as an SPI) and DTLS headers.
> In the case of a connection surviving across NAT remapping an attacker
> could observe that the connection has been remapped, but that reveals
> no new information about the connection than it had previously except
> that the it was remapped by an intermediate device. That does
> potentially reveal information about the NAT device, for instance it
> could probably ascertain the timeout, but I don't know how useful that
> would be in and it could probably be determined by other means.
>
> But even given that, yes, I would prefer that anything that identifies
> flows on the network (UDP tuples, session identifiers, flow labels) is
> periodically rotated to reduce the ability of intermediate nodes to
> track my flows over long periods of time. The protocol to negotiate a
> new session identifier can be implemented in the encrypted portion of
> the packet. To change the UDP tuple a client can pick a different
> ephemeral source port (in userspace sockets implementation this would
> close one socket and create a new and do a connect without explicit
> bind).
>
> Tom
>
>
>
>
>
>
> > -- Christian Huitema
> >
> >
>
> _______________________________________________
> Spud mailing list
> Spud@ietf.org
> https://www.ietf.org/mailman/listinfo/spud
>