Re: [Tcpcrypt] v3 of the charter

David Mazieres <dm-list-tcpcrypt@scs.stanford.edu> Fri, 02 May 2014 15:34 UTC

Return-Path: <dm-list-tcpcrypt@scs.stanford.edu>
X-Original-To: tcpcrypt@ietfa.amsl.com
Delivered-To: tcpcrypt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AD861A6F1E for <tcpcrypt@ietfa.amsl.com>; Fri, 2 May 2014 08:34:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.551
X-Spam-Level:
X-Spam-Status: No, score=-1.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=1, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q1PY8WKTpRnv for <tcpcrypt@ietfa.amsl.com>; Fri, 2 May 2014 08:34:47 -0700 (PDT)
Received: from market.scs.stanford.edu (www.scs.stanford.edu [IPv6:2001:470:806d:1::9]) by ietfa.amsl.com (Postfix) with ESMTP id D173E1A0A0D for <tcpcrypt@ietf.org>; Fri, 2 May 2014 08:34:47 -0700 (PDT)
Received: from market.scs.stanford.edu (localhost.scs.stanford.edu [127.0.0.1]) by market.scs.stanford.edu (8.14.7/8.14.7) with ESMTP id s42FYhR9003822; Fri, 2 May 2014 08:34:43 -0700 (PDT)
Received: (from dm@localhost) by market.scs.stanford.edu (8.14.7/8.14.7/Submit) id s42FYh3i001849; Fri, 2 May 2014 08:34:43 -0700 (PDT)
X-Authentication-Warning: market.scs.stanford.edu: dm set sender to dm-list-tcpcrypt@scs.stanford.edu using -f
From: David Mazieres <dm-list-tcpcrypt@scs.stanford.edu>
To: Daniel Kahn Gillmor <dkg@fifthhorseman.net>, tcpcrypt@ietf.org
In-Reply-To: <53631F36.4050700@fifthhorseman.net>
References: <536099A0.30900@it.uc3m.es> <23862F2E-9D56-4651-9202-FC676D15720B@netapp.com> <07C2D017-9342-4742-990C-7D3BC795049F@netapp.com> <536157E1.2060202@fifthhorseman.net> <53615A40.9050903@isi.edu> <536165C6.20909@fifthhorseman.net> <536167CC.8010703@isi.edu> <536168FA.2010800@fifthhorseman.net> <53616AD4.6010309@isi.edu> <53616D52.3090504@fifthhorseman.net> <5361824F.8080506@iang.org> <536187C1.3060009@isi.edu> <5361FCBD.6010509@it.uc3m.es> <87ha59zgjo.fsf@ta.scs.stanford.edu> <5362ABDA.9040608@isi.edu> <53631F36.4050700@fifthhorseman.net>
Date: Fri, 02 May 2014 08:34:43 -0700
Message-ID: <8738gsyz1o.fsf@ta.scs.stanford.edu>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpcrypt/AewUbMbYS6ZLJZFOfzTGF4JK_jk
Subject: Re: [Tcpcrypt] v3 of the charter
X-BeenThere: tcpcrypt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: David Mazieres expires 2014-07-31 PDT <mazieres-nxwadp7wgvwdzqskd6gnqvkeas@temporary-address.scs.stanford.edu>
List-Id: "Discussion list for adding encryption to TCP." <tcpcrypt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpcrypt/>
List-Post: <mailto:tcpcrypt@ietf.org>
List-Help: <mailto:tcpcrypt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 May 2014 15:34:48 -0000

Daniel Kahn Gillmor <dkg@fifthhorseman.net> writes:

> I know i raised the fingerprinting concern earlier here, but i'm
> concerned that this statement actually goes too far.  "must not increase
> information available for fingerprinting" implies that peers basically
> cannot cache state between subsequent connections, which seems like an
> obvious opportunity for performance improvements.

Exactly.  I'm worried that we are over-specifying stuff before we
understand the design space or know the trade-offs.  In particular, it
turns out that TCP is pretty fingerprintable anyway (e.g.,
Kohno/Broido/Claffy) and adding a new option is only going to make that
worse.  (Hey, there's a reason my mail server, mail avenger, puts an
abstract of the SMTP connection's SYN segment in a mail header.)  So
really the charter is too early a place to decide to resolve these
trade-offs in favor of privacy.

To my mind, the only thing that's really in scope for the charter is to
say drafts should discuss their effects on fingerprinting.  If different
proposals facilitate fingerprinting to different extents, then this is
one thing to take into account when weighing one proposal against
another.

My personal opinion is that we want to optimize for speed in the common
case and ensure sufficient APIs are available that if people defeat all
the other fingerprinting techniques (from TCP to HTTP-level stuff) TCP
Inc. isn't the one thing left by which you can't avoid fingerprinting.
But remember, the API document is only going to be informational anyway.

So for all these reasons, putting language in the charter to the effect
that TCP Inc. must not exacerbate fingerprinting is likely to gunk up
the standardization process without necessarily yielding any improvement
in privacy.


By the way, this principal applies to most other aspects of the
protocol.  E.g., I see Erik Nygren brought up the issue of DoS
resilience.  That's a great point.  I suspect we will find that DoS
resilience is part of a complex four-way trade-off also involving
normal-case fingerprint-resistance, minimizing use of option space in
SYN segments, and minimizing connection latency.  Do we really want the
charter to prioritize fingerprint-resistance and option space over DoS
resilience and latency?  I'd rather line up a bunch of proposals and
then decide the trade-offs.

That means we should pick the minimum set of requirements.  If it were
up to me, I'd summarize the requirements in a mere three sentences:

    - In the absence of an active attacker, must provide forward secrecy
      between any two hosts that use it, with no configuration required.

    - For TCP-Inc.-aware applications, must provide endpoint
      authentication hooks that can guarantee forward secrecy and
      integrity of the TCP data stream against active attackers.

    - Must gracefully support incremental deployment over today's
      Internet.

Beyond that, I'd say there are a bunch of desirable properties, and
there are issues (like fingerprinting) that each draft must discuss.
But we shouldn't place any further *requirements* on the design.

David