Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG

Christian Grothoff <christian@grothoff.org> Tue, 19 August 2014 18:27 UTC

Return-Path: <christian@grothoff.org>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EECB41A06CB; Tue, 19 Aug 2014 11:27:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.25
X-Spam-Level:
X-Spam-Status: No, score=-3.25 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, J_CHICKENPOX_14=0.6, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wDs2RQ2ci36y; Tue, 19 Aug 2014 11:27:28 -0700 (PDT)
Received: from smtp1.informatik.tu-muenchen.de (mail-out1.informatik.tu-muenchen.de [131.159.0.8]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D19EB1A06C7; Tue, 19 Aug 2014 11:27:27 -0700 (PDT)
Received: from [192.168.178.20] (pd95c0f92.dip0.t-ipconnect.de [217.92.15.146]) by mail.net.in.tum.de (Postfix) with ESMTPSA id 9CE47191C878; Tue, 19 Aug 2014 20:27:24 +0200 (CEST)
Message-ID: <53F3970D.5080906@grothoff.org>
Date: Tue, 19 Aug 2014 20:27:25 +0200
From: Christian Grothoff <christian@grothoff.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Icedove/24.7.0
MIME-Version: 1.0
To: Hagen Paul Pfeifer <hagen@jauu.net>, Jacob Appelbaum <jacob@appelbaum.net>
References: <ecdbe694b6964c159f64b1d3311c8cc6@hioexcmbx02-prd.hq.netapp.com> <CAFggDF2jhQPz0Eez=AU9M-k862wD_=VSyVpXtRAjT4zC6H4tgA@mail.gmail.com> <1408397675.299896.154112109.6F69043F@webmail.messagingengine.com> <8c5f6a1e9f2340e48e25dd151406b7d3@hioexcmbx05-prd.hq.netapp.com> <1408401991.317123.154137701.0A30F30C@webmail.messagingengine.com> <CAPh34meB=EtgNu=_eBS6ekB20fRccAqXFWydkCWG+6VKSa98rg@mail.gmail.com> <CAFggDF39L+kLQLmiWJR3q6suPOtYmKJiJUqp0kBv7GjUtNVOjA@mail.gmail.com> <CAPh34mdPtKvVJ2FfshPFwrwRDOw9CxxHT4ZTFYZZEVSoKOEq0A@mail.gmail.com>
In-Reply-To: <CAPh34mdPtKvVJ2FfshPFwrwRDOw9CxxHT4ZTFYZZEVSoKOEq0A@mail.gmail.com>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpm/GhMfFCJ0mWdKA4S-prP848vw6Qc
X-Mailman-Approved-At: Wed, 20 Aug 2014 08:04:23 -0700
Cc: Joe Touch <touch@isi.edu>, "tcpinc@ietf.org" <tcpinc@ietf.org>, "tcpm (tcpm@ietf.org)" <tcpm@ietf.org>
Subject: Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Aug 2014 18:27:33 -0000

On 08/19/2014 08:07 PM, Hagen Paul Pfeifer wrote:
> On 19 August 2014 19:15, Jacob Appelbaum <jacob@appelbaum.net> wrote:
> 
>> No. I want to protect my TLS service from implementation exploitation.
>> You cannot probe my TLS service for the next heartbleed without a
>> shared secret.
> 
> C'mon Jacob, this smells fishy! Let's assume you protect *your*
> service from one potential TLS bugs, this is (partly) possible with
> the mechanism described in the ID. But what happens in the meantime
> with your https:// browsing, openvpn, ... communications? If you
> assume bugs in TLS you must stop all your communications! TLS and
> strong cryptography is the fundamental building block - when it is
> broken the whole communication system is b0rken.

Well, that pretty much sums up what I have been saying in the past to
the IETF: https://gnunet.org/strint2014gnunet

And yes, I do not like SSH, TLS, GPG or X.509.  But we cannot fix
everything at once, and sometimes a hot fix can be useful.  TCP Stealth
is just that: a small fix to a small problem, it does not try to solve
everything.

> The other way, if you trust TLS you can also trust the TLS client
> certificates mechanism as well.

You clearly also deliberately missunderstand the difference between
design / specification / mechanism, and the reality of an implementation.

> I understand your objection but the "fix" feels wrong. We should do
> everything we can to make TLS fast, clean and strong.

Then standardize TCPCurve.  In the meantime, this is about TCP, not
TLS.  And the service I would see this use with most is SSH, not HTTPS.

> But to repeat
> myself: I see advantages and benefits and _if_ there are no major
> disadvantages we can push things forward. Well, no need to answer
> here, I got your point in detail and I want to make sure we discuss
> all possibilities, using TLS client certificates is one alternative.
> 
>> It isn't abuse - we're even trying to make it a standard to ensure
>> that it is well documented non-abusive behavior - rather different
>> than most other port knocking, I'd add.
> 
> The ISN has 32 bits, reduce this space leads to problems in the past.

We do not propose a reduction of the space, only under some unfortunate
and clearly undesirable circumstances with several of the entropy
sources being unavailable this may happen, and even then I do not
believe the problem is quite as big as you make it out to be.

> We must do everything to not open any other attack vectors regarding
> TCP by mistake. If you *prove* that this will not lead to problems, I
> will never ever mention the word "abuse" in an email to you! ;-)

Prove is a strong word.  Now, I would not mind if the standard included
some strong wording on using a random TSval in combination with TCP
Stealth by default.  But, as was pointed out, due to some NATs messing
with TSvals, we decided to keep it optional, as opposed to mandatory.
But I think that is a point I would be open to discuss, as it is really
a trade-off.

Happy hacking!

Christian