Re: [tcpinc] Review of draft-bittau-tcpinc-tcpeno-01

David Mazieres <dm-list-tcpcrypt@scs.stanford.edu> Thu, 27 August 2015 05:28 UTC

Return-Path: <dm-list-tcpcrypt@scs.stanford.edu>
X-Original-To: tcpinc@ietfa.amsl.com
Delivered-To: tcpinc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 133661A9063 for <tcpinc@ietfa.amsl.com>; Wed, 26 Aug 2015 22:28:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.39
X-Spam-Level: *
X-Spam-Status: No, score=1.39 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=1, MANGLED_BACK=2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id li_J6GAHo3f2 for <tcpinc@ietfa.amsl.com>; Wed, 26 Aug 2015 22:28:52 -0700 (PDT)
Received: from market.scs.stanford.edu (www.scs.stanford.edu [IPv6:2001:470:806d:1::9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8AE621A8A12 for <tcpinc@ietf.org>; Wed, 26 Aug 2015 22:28:52 -0700 (PDT)
Received: from market.scs.stanford.edu (localhost.scs.stanford.edu [127.0.0.1]) by market.scs.stanford.edu (8.14.7/8.14.7) with ESMTP id t7R5Spng031049; Wed, 26 Aug 2015 22:28:51 -0700 (PDT)
Received: (from dm@localhost) by market.scs.stanford.edu (8.14.7/8.14.7/Submit) id t7R5SpwP026442; Wed, 26 Aug 2015 22:28:51 -0700 (PDT)
X-Authentication-Warning: market.scs.stanford.edu: dm set sender to dm-list-tcpcrypt@scs.stanford.edu using -f
From: David Mazieres <dm-list-tcpcrypt@scs.stanford.edu>
To: Eric Rescorla <ekr@rtfm.com>
In-Reply-To: <CABcZeBPiUxByxUVJ3cb5LaeH5T1LX3iZFetP4cXM3O9avzBkCA@mail.gmail.com>
References: <CABcZeBNEFVkDi38y3G-C2nQF=dzW2mGDsj5DVK_OKVkPwK=G0g@mail.gmail.com> <878u92oadf.fsf@ta.scs.stanford.edu> <CABcZeBMfk5C4-LF0fDLKpJktV3hJyzRUNfe0gO8RYDnzcs3yMA@mail.gmail.com> <87zj1inf7n.fsf@ta.scs.stanford.edu> <CABcZeBMZCjrwpTH+CkZS_p8TYGEFsXwxGn=KfPe28hY5f=2oXw@mail.gmail.com> <87oahuta7j.fsf@ta.scs.stanford.edu> <CABcZeBPiUxByxUVJ3cb5LaeH5T1LX3iZFetP4cXM3O9avzBkCA@mail.gmail.com>
Date: Wed, 26 Aug 2015 22:28:51 -0700
Message-ID: <87si75jo4s.fsf@ta.scs.stanford.edu>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <http://mailarchive.ietf.org/arch/msg/tcpinc/VrFiPahsVZuX5hpjOYw3cIAD70E>
Cc: tcpinc <tcpinc@ietf.org>
Subject: Re: [tcpinc] Review of draft-bittau-tcpinc-tcpeno-01
X-BeenThere: tcpinc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: David Mazieres expires 2015-11-24 PST <mazieres-g6du8km82n4q6g98dpqkaiyuu6@temporary-address.scs.stanford.edu>
List-Id: "Discussion list for adding encryption to TCP." <tcpinc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpinc>, <mailto:tcpinc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpinc/>
List-Post: <mailto:tcpinc@ietf.org>
List-Help: <mailto:tcpinc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpinc>, <mailto:tcpinc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 05:28:54 -0000

Eric Rescorla <ekr@rtfm.com> writes:

> Note: you can't really build a reliable NAT traversal system where you
> use STUN to learn your public address and then register it because
> too many NATs have unstable bindings or require you to open pinholes.
> We tried that and it didn't work which is why ICE is the way it is.

Can you demonstrate simultaneous open without stable NAT bindings?  I
don't see how that could work.  But if it can, then a simplified packet
trace would be super helpful to this discussion.

>> If you remove the b bit from TCP-ENO, there will be pairs of hosts that
>> can communicate via simultaneously opened TCP connections that cannot
>> use TCP-level encryption.
>
> OK, I don't understand that. Can you please provide an example of a case
> where the "b" bit helps that the sides couldn't have already broken the
> tie via out-of-band signaling.

I'm not sure I understand your comment.  The "b" bit assumes the
applications have broken the tie via out-of-band signaling.  It is the
mechanism that permits you to have encryption when applications break
the tie.  So no "b" bit means no encryption on simultaneous open, ever.

> I haven't seen anyone argue that the b bit fails to achieve its goal.
>
> That's precisely what I am arguing with the example above.

So to be clear, the goal is that if applications can break the tie, the
"b" bit allows encryption with simultaneous open.  If you believe
there's a case where simultaneous open will still fail to encrypt, even
with the "b" bits correctly set, can you break it down on a
packet-by-packet basis (for the first 4 packets of the connection)?
Such a four-segment example with two SYNs and two ACKs would really
advance the debate.

> I agree with this as well and I agree that #2 is a viable position. The open
> issue for me is whether the "b" bit actually accomplishes that goal.

Well, it looks like this:

    A -> B:  SYN ENO<b=0>
    B -> A:  SYN ENO<b=1>
    A -> B:  ACK
    B -> A:  ACK

You might argue that applications won't break the tie properly, but I
don't see why you think the "b" bit wouldn't work if they do.

>> Since TCPINC has been around for over a year and neither of the two main
>> candidate drafts has yet attempted goal #4, perhaps we should say that
>> fully-transparent encryption with simultaneous open is not a high enough
>> priority to delay TCPINC progress.  If some subdelegation wants to
>> investigate the problem in parallel and report back with some data,
>> there's no reason the WG couldn't later move to accommodate the results.
>
> This seems like a good proposal. FWIW, the major applications that I know of
> that use TCP-SO for NAT traversal have their own COMSEC anyway and
> in fact often treat TCP as if it were UDP.

Ah... great.  Sounds like progress.  Also, do you mind sharing what
those major TCP-SO applications are?  It would add some badly needed
context to this discussion.

Thanks,
David