Re: [tsvwg] UDP source ports for HTTP/3 and QUIC

Joseph Touch <touch@strayalpha.com> Sat, 24 July 2021 17:58 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 780463A0CFC for <tsvwg@ietfa.amsl.com>; Sat, 24 Jul 2021 10:58:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.318
X-Spam-Level:
X-Spam-Status: No, score=-1.318 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VDfye280JV4S for <tsvwg@ietfa.amsl.com>; Sat, 24 Jul 2021 10:58:10 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 113913A4462 for <tsvwg@ietf.org>; Sat, 24 Jul 2021 10:58:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=dPUq8IznpNkLA2K2zpQd4dH5RA7H4x5YSwT0COyJ5bE=; b=VwaVlyk8GZ3+U0fad7G5YZ1gCf cLk7twBWADD0JNkj1gLcOXoqBx0g6K3AfyMflwcogoiw3OVesLdx58eaUyi1xIT8upvnAp8L9kTdi i9Oe/nKkQMqfKBIzLkAb/06fdn0SNO7V2mEmaOyRVJ5kAPkyr82gJdN1SGvNmUtwuZyUQgeJa5Yta FuOH2xf6vRHbVUUErMQrD6WkAVvlcBvVinqKnZct9+ySn0M/UsI1AVLgPkkR4UZkWZdP+Uh+QAGtA 2plWW6hubYC7qLdtKa1jBo4NZ071gJf2nmpulQ2S0v+BihxTSHtU72ii9OMKRHhQZcJekapB5W4I3 aBP8Mnxw==;
Received: from cpe-172-114-237-88.socal.res.rr.com ([172.114.237.88]:50767 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <touch@strayalpha.com>) id 1m7LuW-0039kg-Hj; Sat, 24 Jul 2021 13:58:08 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_10C47BDD-A9EB-45C9-AC49-31AF990610F8"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
From: Joseph Touch <touch@strayalpha.com>
In-Reply-To: <DM6PR19MB404259513409648A5CF97A3383E59@DM6PR19MB4042.namprd19.prod.outlook.com>
Date: Sat, 24 Jul 2021 10:58:03 -0700
Cc: Mark Nottingham <mnot@mnot.net>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Message-Id: <2E46FC3A-95B1-4D7A-B070-B4F83FC4CAA5@strayalpha.com>
References: <3985895D-D420-4995-831E-332E33693B79@mnot.net> <CF409524-96F3-412A-A8DB-E4EFFDD9F4E7@mnot.net> <E62515E7-38FD-4197-8CF0-2D196FB6D6C4@strayalpha.com> <16CD883B-9561-41A5-97E0-43EF3618333C@mnot.net> <8235BE77-7849-49A3-A709-EB32EB039982@strayalpha.com> <AA5B1FC1-E0E8-488F-AE2E-F21696AD0A06@akamai.com> <MN2PR19MB4045E5063CE13DDE39D5BE8683E29@MN2PR19MB4045.namprd19.prod.outlook.com> <9263482C-2E0A-46F0-9351-B63C0E3B53E0@strayalpha.com> <MN2PR19MB40450ACCE13E4A335FF929A483E49@MN2PR19MB4045.namprd19.prod.outlook.com> <C28BAF21-2C9D-41FF-93A7-E73684E671CE@strayalpha.com> <DM6PR19MB404259513409648A5CF97A3383E59@DM6PR19MB4042.namprd19.prod.outlook.com>
To: "Black, David" <David.Black@dell.com>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/5qbej2YUFrMWPB9uwP5lrpPB9RE>
Subject: Re: [tsvwg] UDP source ports for HTTP/3 and QUIC
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Jul 2021 17:58:15 -0000

Hi, David,

> On Jul 23, 2021, at 9:05 AM, Black, David <David.Black@dell.com> wrote:
> 
> > This is the core Issue though. So we have a problem where people generate spoofed traffic.
> > 
> > And some patterns of that traffic can be identified by how they use source ports.
>  
> In the cases of interest for this discussion, the source ports are real not spoofed.

Correct me if I’m not tracking:

A- some people send spoofed packets as attacks
B- the packets have one thing in common - use of particular source ports
C- so others have started to filter based on those source ports
D- which means legitimate uses of those ports are now blocked

Assuming that tracks:

(C) has made the leap that “correlation” becomes “cause”, so now it’s not just being under attack, but merely looking at the port that is considered an attack to be blocked

This is no different than the RST attacks on TCP, as follows:

A- some people sent spoofed RSTs all over the sequence space as attacks
B- the packets have one thing in common - being RSTs
C- so there was a proposal to block RSTs not at a single correct location in the receive window
D- which means legitimate transmissions of RSTs are now blocked (and that everyone had to change their TCP, making it more complex).

This is a common IETF fallacy:

A. Some people do X
B. There is a correlation between X and Y (not cause and effect)
C. Others interpret X as bad, leaping from correlation to cause and effect
D. We all have to deal with it (complexity)

We need to stop this at step C and declare THAT the problem.

Joe