Re: [Spud] [Privsec-program] Detecting and Defeating TCP/IP Hypercookie Attacks

Christian Huitema <huitema@microsoft.com> Mon, 01 August 2016 20:16 UTC

Return-Path: <huitema@microsoft.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DAFE112D603 for <spud@ietfa.amsl.com>; Mon, 1 Aug 2016 13:16:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.003
X-Spam-Level:
X-Spam-Status: No, score=-2.003 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hc3lcaUrnVbG for <spud@ietfa.amsl.com>; Mon, 1 Aug 2016 13:16:01 -0700 (PDT)
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0126.outbound.protection.outlook.com [104.47.32.126]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F041612B062 for <spud@ietf.org>; Mon, 1 Aug 2016 13:16:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=rNjV0m7PBIHc9VMbwAUpAf8w5U1dLqhq/igMPr+52yo=; b=nD9I0a6D6FeioK4A6XPUBg2Ln3pj7Kxfyt69SfqmnywgmTu4F+p32jnYxhfAIZLoqox6k6ElnEon1tR5+RskFTmbemmlg7Lk3C/VyXLPCy+1MjIRmu8Pcjx/pZKe39/lVd/B8qiFY0PBODkiibklO9QuBBpQDnLBSc3Vsb83nWI=
Received: from BN6PR03MB2675.namprd03.prod.outlook.com (10.173.143.150) by BN6PR03MB2674.namprd03.prod.outlook.com (10.173.143.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.549.15; Mon, 1 Aug 2016 20:15:57 +0000
Received: from BN6PR03MB2675.namprd03.prod.outlook.com ([10.173.143.150]) by BN6PR03MB2675.namprd03.prod.outlook.com ([10.173.143.150]) with mapi id 15.01.0549.022; Mon, 1 Aug 2016 20:15:57 +0000
From: Christian Huitema <huitema@microsoft.com>
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>, Tom Herbert <tom@herbertland.com>
Thread-Topic: [Spud] [Privsec-program] Detecting and Defeating TCP/IP Hypercookie Attacks
Thread-Index: AQHR6o+XeijpweZ3K0OXgZM+Fyi9e6AxZMEAgAJDfwCAAI01AIAAAquAgAANJ4CAAENGAIAAAs2AgAABAgCAAABuYA==
Date: Mon, 01 Aug 2016 20:15:57 +0000
Message-ID: <BN6PR03MB26752FBA8655DA802A769450A8040@BN6PR03MB2675.namprd03.prod.outlook.com>
References: <409B6F52-B637-4333-915B-A8127C80C98B@trammell.ch> <d27266cf-87f6-17b1-3038-e0f614c6c773@cs.tcd.ie> <84F6AEC6-7DE3-4D1F-9014-201279F70E56@tik.ee.ethz.ch> <5194f988-0e25-7f5a-75cf-6ed3646e012d@cs.tcd.ie> <402A30BB-1A20-4D54-95CA-7C50D8C0F26B@tik.ee.ethz.ch> <dc29fa73-88fd-3dc4-7497-f1bd2fa60422@cs.tcd.ie> <8722FE8E-1026-43D5-BE17-1D6B4031C0D8@tik.ee.ethz.ch> <1b261e1e-a543-53df-8a2a-7dddae415a14@cs.tcd.ie> <D2CEDF13-E508-4732-B8F6-98FBBDDC7EE6@tik.ee.ethz.ch> <CALx6S34gVFDJ6mV=GVrfK5doTK2BbRRWXvxeqFUtidfPp5XGKg@mail.gmail.com> <5717b856-eaf9-4142-72fa-7e58b4cd61a5@artdecode.de> <CALx6S36zv4=S8tgRNqwee0j973Y_gJ7RBnnnV+0vBq_4kn7PVw@mail.gmail.com> <aa2afa2c-23d0-bf50-a82e-654fd08f373a@cisco.com> <CALx6S375si8km=8NhMfgWAtqE09Xju3CH1k3ktuae6gi8XT5ww@mail.gmail.com> <a2426583-22d7-85a1-e7a5-791c755f9209@cisco.com> <CALx6S37Ni=qA-BcnNQepRwe3ZC48RNmirRVjCe1fv2bT3gQnWw@mail.gmail.com> <CAKKJt-d02CmE7cW59s=A68SL=EQVTEVYOBzP74bnVXsEmfsY=A@mail.gmail.com> <CALx6S36paAxPP317aDGybkrPWtJ9L+ZuTYOHTQ11ejwUgJ7vFg@mail.gmail.com> <CAKKJt-efM3k5jL6EJmMP-t69SGNUyDxPu_xurvnGNtLSFZ87VQ@mail.gmail.com>
In-Reply-To: <CAKKJt-efM3k5jL6EJmMP-t69SGNUyDxPu_xurvnGNtLSFZ87VQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=huitema@microsoft.com;
x-originating-ip: [2001:4898:80e8:8::593]
x-ms-office365-filtering-correlation-id: 9c1e65cd-71d9-4da5-0358-08d3ba48a638
x-microsoft-exchange-diagnostics: 1; BN6PR03MB2674; 6:JIDYNWS1GEofDgGsHqEcEkJUhU+tW8FesKLUEE4no2GiEVgowKnaKKldSjmcFpTdiKkVIBIyHl/xqR2zuygLbst7O/EXVJkGCKlTjPFdtF1zsfm9aLRMSY2/O4/GXB+b8Efg8d8WKMgoR3LTJYZR5mLDG3grAF6ANXkUrOiH7nWUs3ymWnrqPeqPW3fIm4fEkfJsL8fMX9sgZnyHmZGMK5GaySoqsOMGiMZTNdD/x/rhvWpFIgaciDaPDOqezKTYlphEzyykTiUa2bTzEC4rcn55vks2nmsv0C5sVxqTyUDLDj8/1ULiHe6ktQDuuIpeDDozDMi9DP+czQ3IQczE7Q==; 5:p2zAnjlOoTIk1S7ckg3UJ75NvvUFqB4NMQOYLaEPP4+Hviqulm99Ir1XyLF8h8OPd1+/LSbfaLQuboaNQsEIsvBNTx3VR0vcK9080Zmii+kYmrEHVvfMnv4enmPMNMLN0w7Ev5pE6ZkQk21HHkJFAA4MsunuBMhAbr/LYISYyvE=; 24:urzj1bxVI7O3y+4CqH5i0o4ExvTvQfyTd+DUZincCG7jhPtuJIWUBMTJg3vWRLIH3+fHJhoMCzzhriOUXzK1lVchK/LQ0hg9L7Fw46ui6Hs=; 7:FlXSDwnSvPI7Roxo4S+uXJbbzf8zKW/ktCT1V+nMyTVbOnJN83luGgQ0eSZLTBwH6rGBVsqoT/y26VjTYiRYjEhznrfvoyXQ9bLPB7owc05ZaXKRj/Q32hwNcPCq9reKdpmNp33X3GEAMj+O+02ekpEjX2l7VGMiMIednDZiYT0eD5ZewxqhqNbwH3jiqRatCsvKomWkMzj4Af48pZ0s1YrFNKf+ZBUGcsEXteAxrXdZAgY2qW0KwRbEVvJDNThx
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BN6PR03MB2674;
x-microsoft-antispam-prvs: <BN6PR03MB26746D19830A61DE434E4D16A8040@BN6PR03MB2674.namprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(61425038)(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6055026)(61426038)(61427038); SRVR:BN6PR03MB2674; BCL:0; PCL:0; RULEID:(304825044); SRVR:BN6PR03MB2674;
x-forefront-prvs: 0021920B5A
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(7916002)(377454003)(199003)(24454002)(189002)(106356001)(54356999)(101416001)(33656002)(50986999)(77096005)(122556002)(8936002)(93886004)(6116002)(5002640100001)(2906002)(76176999)(8990500004)(81166006)(81156014)(586003)(4326007)(8676002)(106116001)(74316002)(9686002)(76576001)(7696003)(189998001)(11100500001)(2900100001)(102836003)(10400500002)(86612001)(561944003)(7846002)(3280700002)(7736002)(2950100001)(3660700001)(10290500002)(92566002)(87936001)(305945005)(99286002)(105586002)(10090500001)(68736007)(97736004)(5001770100001)(5005710100001)(86362001)(3826002); DIR:OUT; SFP:1102; SCL:1; SRVR:BN6PR03MB2674; H:BN6PR03MB2675.namprd03.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Aug 2016 20:15:57.5870 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2674
Archived-At: <https://mailarchive.ietf.org/arch/msg/spud/sS5C_HaeLRdgyFmk1eYyLg5pXBY>
Cc: Eliot Lear <lear@cisco.com>, spud <spud@ietf.org>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>, Brian Trammell <ietf@trammell.ch>, Stephan Neuhaus <sten@artdecode.de>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [Spud] [Privsec-program] Detecting and Defeating TCP/IP Hypercookie Attacks
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 20:16:03 -0000

On Monday, August 1, 2016 1:10 PM, Spencer Dawkins wrote:
>
> AH - I didn't realize you were talking about your proposal. I've read that. I lost any
> reference to it in the post I replied to - hence my confusion.

The question was whether it is a good idea to have special marks for packets that "start a connection," and specifically for packets sent over UDP by encrypted transports. Tom's point is that this will create breakage in many conditions, such as multi-homed nodes. I can see at least two scenarios in which we could see breakage with QUIC:

1) Client is sitting behind a nonplussed NAT. The QUIC session with the server becomes silent for a short period, and the client's NAT releases the UDP mapping. The client then sends more data. The NAT will assign a different port mapping. The server will use the connection-ID field in the QUIC header to route the packets to the right server, and automatically repair the connection. Suppose now that somewhere on path, maybe at the ISP router, some piece of software traces the connections and relies on "start of connection" marks. The "repair" packet comes from a different UDP port, and does not carry any "start" mark. Will it be dropped?

2) Client is sitting on a multi-homed network, managed by outgoing NAT. At some point, NAT management causes the packets to the server to be routed through the "fall back" ISP. The packets reach the server, the connection-ID filed does its magic, and the connection is automatically repaired. But of course, the routers on the new path don't see any "start of connection" mark.

There are probably more cases, but these two can happen today, with shipping code and existing hardware. The NAT mapping refresh, in particular, is quite common. This is why I much prefer "implicit start" processes to "explicit marks."

-- Christian Huitema