Re: [Spud] Bare-minimum PLUS (was Re: Thoughts on the privacy concerns expressed at the BoF)

Tom Herbert <tom@herbertland.com> Thu, 28 July 2016 16:23 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7747F12D8D5 for <spud@ietfa.amsl.com>; Thu, 28 Jul 2016 09:23:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PUhGZKK6U2f0 for <spud@ietfa.amsl.com>; Thu, 28 Jul 2016 09:23:00 -0700 (PDT)
Received: from mail-io0-x22a.google.com (mail-io0-x22a.google.com [IPv6:2607:f8b0:4001:c06::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 571F712D7E9 for <spud@ietf.org>; Thu, 28 Jul 2016 09:22:57 -0700 (PDT)
Received: by mail-io0-x22a.google.com with SMTP id 38so104410880iol.0 for <spud@ietf.org>; Thu, 28 Jul 2016 09:22:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=Cw3i/ejMK1wtm1/+iaEaeBJ8XYV4KpSdOy34wv7AEiE=; b=NVuH/N06FupYXVdvRSuzBKi4SQwhrjQNFxOn2X0kDghN0fA3+Yi1Y189fs4xnsKUc3 M33SC29E63JUb59UMojjpCIZblN4XzeLSzWV0qe6m/Mgc716PeqAj8fiOTL2iaUScXdi 9pKh5Oliko82yTU8x80tgk1NrLHFkcN4BT/6PvgBl16LZc4Kdqx1NVpjqjEgdsU+cVCp iU45xQvz1aSUhRwTW5j6SL0XtKszJJ1JYw1Y/nzXvNNFYqNXxTdk13kjBPkCMceAO2K8 993e1qYxANNLm0uSXt0W+HCg+pmW6YpWLhmoaLABovkcQyyr1hE1vnVjFFGwubu6hISQ oN9w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=Cw3i/ejMK1wtm1/+iaEaeBJ8XYV4KpSdOy34wv7AEiE=; b=SPM3glhgtFXeYkHKbwJ7BsK7FALykgx40hO/HOHXH3NHmyK+XeTQaE0J4ddN43KP9m Kx+vu1owbr9Cm/ycOmCFxPSd3iUQ1xUX5zqGgoZB1DFXZyqU/IMNXJgETunGm+CQf4t2 MyAbqUyXbBwBWtkR1fQ/pRTbDX7vYTM/wCSY0w1K6P+egKnl1BCsgLx30Vhguw1XFHW+ aCsLLoNsaa04KHekvqs/x63bE0WTuEleDCAplXuYyLxix8vBpcG9Dn+ncGqUL6ESm6AD a1SontgniK1iiKfbhGtGXbGO/3U72t121CjTFl3LDaETF9XpXepXs/ztlhwYPpKJfAnG JMdA==
X-Gm-Message-State: AEkoousNcuGK8E09p+/4IqSv4ZpQk2/lWx4lSv8HFQ7Muh1Mq082tc/XyNkpeeL8tFH3umGnbS0nSW84bB1Icg==
X-Received: by 10.107.25.75 with SMTP id 72mr39636128ioz.50.1469722976524; Thu, 28 Jul 2016 09:22:56 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.107.21.130 with HTTP; Thu, 28 Jul 2016 09:22:55 -0700 (PDT)
In-Reply-To: <CAKC-DJjVF_mQb49BJmHNpt-VkJSX6JHXH8hTbYMm2bEYg3rgwA@mail.gmail.com>
References: <CAKC-DJjVF_mQb49BJmHNpt-VkJSX6JHXH8hTbYMm2bEYg3rgwA@mail.gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Thu, 28 Jul 2016 09:22:55 -0700
Message-ID: <CALx6S3636tzxpqjr5b+31sU5vg+8UyekhhR=R-3SUYeQhYvjug@mail.gmail.com>
To: Erik Nygren <erik+ietf@nygren.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/spud/TVfwHv_S2R677I2Ft2IDXexfLoM>
Cc: Kyle Rose <krose@krose.org>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>, spud <spud@ietf.org>
Subject: Re: [Spud] Bare-minimum PLUS (was Re: Thoughts on the privacy concerns expressed at the BoF)
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jul 2016 16:23:02 -0000

On Thu, Jul 28, 2016 at 8:02 AM, Erik Nygren <erik+ietf@nygren.org> wrote:
> On Mon, Jul 25, 2016 at 4:20 PM, Mirja Kühlewind
> <mirja.kuehlewind@tik.ee.ethz.ch> wrote:
>>
>> As mentioned by Ted, this is actually not what we propose. The mechanism
>> we propose is exposing information under endpoint control which is a very
>> important point here. The endpoint has to add an option to send (or request)
>> a specific bit of information (which also must be registered by IANA with
>> IESG approval). This is just the same as TCP options or IP option headers.
>> The only difference is that PLUS has a MAC which allows detection of
>> middlebox manipulation (which is not the case for other existing protocols
>> such as TCP options). This is another a very big and important aspect of
>> what we propose with PLUS as our goal is to encrypt everything above PLUS
>> including the TCP header and TCP options in future. Especially encrypting
>> TCP option is important because TCP options provide much less control than
>> what we propose with PLUS today which is a problem (especially as currently
>> still unto 90% of the traffic is TCP). So I actually though we are on the
>> same page here and have a common goal.
>
>
> I'm not sure that we get enough value out of extensibility or being overly
> generic here, at least for practical non-research purposes.  If there is a
> tightly defined set of things allowed, we'll quickly ossify on these
> anyways.  As firewall vendors will just bake in those registered by IANA
> when they ship their product and then we'll be right back where we are today
> with IPv6 extension headers.
>
> I'd propose that it may make more sense to define a fixed header prefix
> format that contains the right set of features needed to solve the problems
> of QUIC and WebRTC (and other future UDP protocols).  Along with this, also
> define a common set of requirements for protocols using this header prefix
> (eg, around DDoS reflection prevention).
>
> Having a toolkit for things like handling connection ids in a way that
> support multipath mobility, stateless load-balancers, DDoS resiliance, and
> which minimize linkability would also be a nice-to-have to prevent each UDP
> protocol from having to come up with subtly different ways to solve this set
> of problems.
>
> For example, a bare minimum set of features might include:
>
> * Opportunistic signalling to middle-boxes (NATs and Firewalls) for when
> they can discard connection state.  Unless we want to declare that new UDP
> protocols only work with IPv6 (worth seriously considering, but perhaps not
> realistic yet), there just aren't enough {IPv4,port} tuples available for
> NATs to support large numbers of users with large numbers of UDP connections
> without having crazy-short keep-alive lifetimes.  Middle-boxes will always
> need to be aware that this is best-effort (the FINs can be dropped or lost
> or not sent by malicious clients, especially during multipath transitions)
> but this could make life much better for well-behaved clients and things
> like the existing NATs which use port ranges per client might encourage
> clients to be well-behaved here on average.
>
>From an application provider point of view, I am still very dubious of
purposely exposing connection state so that anonymous middleboxes can
track my connections. As pointed out at the mic during the PLUS BOF,
firewalls currently assume that all packets go through their device--
if packets are routed to some random middlebox then my transport layer
connection can be dropped by the device just because the middlebox
doesn't have state. This breaks the E2E model of the Internet and
kills our ability to use multipath and multihoming. Any device that
assumes a singular path for a connection is therefore the problem;
this is not a model that we want to perpetuate in PLUS.

Tom