Re: [tsvwg] Review of draft-ietf-tsvwg-udp-options-32

Christian Huitema <huitema@huitema.net> Wed, 10 April 2024 02:12 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 933E1C14F6FA; Tue, 9 Apr 2024 19:12:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m4tldd9Lci-s; Tue, 9 Apr 2024 19:11:55 -0700 (PDT)
Received: from semf08.mfg.siteprotect.com (semf08.mfg.siteprotect.com [64.26.60.171]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4829FC14F5F4; Tue, 9 Apr 2024 19:11:55 -0700 (PDT)
Received: from smtpauth02.mfg.siteprotect.com ([64.26.60.151]) by se02.mfg.siteprotect.com with esmtp (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1ruNRG-006gGG-E4; Tue, 09 Apr 2024 22:11:52 -0400
Received: from [192.168.1.102] (unknown [172.56.169.185]) (Authenticated sender: huitema@huitema.net) by smtpauth02.mfg.siteprotect.com (Postfix) with ESMTPSA id 4VDmXs5DSFz2YRNH6; Tue, 9 Apr 2024 22:11:41 -0400 (EDT)
Message-ID: <9bff172e-1cf3-4403-8088-eb9a25ba4185@huitema.net>
Date: Tue, 09 Apr 2024 19:11:40 -0700
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: Joe Touch <touch@strayalpha.com>
Cc: "C. M. Heard" <heard@pobox.com>, Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com>, "Gorry (erg)" <gorry@erg.abdn.ac.uk>, Martin Duke <martin.h.duke@gmail.com>, tsvwg <tsvwg@ietf.org>, draft-ietf-tsvwg-udp-options.all@ietf.org
References: <f98c67c3-45e2-49bf-9b3e-6545239355a1@huitema.net> <0CCBFF2B-9397-4E86-85F0-FD109A426C45@strayalpha.com>
Content-Language: en-US
From: Christian Huitema <huitema@huitema.net>
Autocrypt: addr=huitema@huitema.net; keydata= xjMEXtavGxYJKwYBBAHaRw8BAQdA1ou9A5MHTP9N3jfsWzlDZ+jPnQkusmc7sfLmWVz1RmvN J0NocmlzdGlhbiBIdWl0ZW1hIDxodWl0ZW1hQGh1aXRlbWEubmV0PsKWBBMWCAA+FiEEw3G4 Nwi4QEpAAXUUELAmqKBYtJQFAl7WrxsCGwMFCQlmAYAFCwkIBwIGFQoJCAsCBBYCAwECHgEC F4AACgkQELAmqKBYtJQbMwD/ebj/qnSbthC/5kD5DxZ/Ip0CGJw5QBz/+fJp3R8iAlsBAMjK r2tmyWyJz0CUkVG24WaR5EAJDvgwDv8h22U6QVkAzjgEXtavGxIKKwYBBAGXVQEFAQEHQJoM 6MUAIqpoqdCIiACiEynZf7nlJg2Eu0pXIhbUGONdAwEIB8J+BBgWCAAmFiEEw3G4Nwi4QEpA AXUUELAmqKBYtJQFAl7WrxsCGwwFCQlmAYAACgkQELAmqKBYtJRm2wD7BzeK5gEXSmBcBf0j BYdSaJcXNzx4yPLbP4GnUMAyl2cBAJzcsR4RkwO4dCRqM9CHpVJCwHtbUDJaa55//E0kp+gH
In-Reply-To: <0CCBFF2B-9397-4E86-85F0-FD109A426C45@strayalpha.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Authentication-Results: mfg.siteprotect.com; auth=pass smtp.auth=huitema@huitema.net
X-Originating-IP: 64.26.60.151
X-SpamExperts-Domain: mfg.outbound
X-SpamExperts-Username: 64.26.60.150/31
Authentication-Results: mfg.siteprotect.com; auth=pass smtp.auth=64.26.60.150/31@mfg.outbound
X-SpamExperts-Outgoing-Class: ham
X-SpamExperts-Outgoing-Evidence: Combined (0.07)
X-Recommended-Action: accept
X-Filter-ID: Pt3MvcO5N4iKaDQ5O6lkdGlMVN6RH8bjRMzItlySaT+W79YqWcx0jFhsEi/pmUoBPUtbdvnXkggZ 3YnVId/Y5jcf0yeVQAvfjHznO7+bT5z5W83tr/6vNQtj+4/xevXo2Zybh0C7q2u3ACfXjTyoXiyb 5GIeP46iSHCD/hbqgmu1tKRQLPmP9InHnx1Brj2eX/LhG7FXTm6Tybw4nzs9RzpvjJMlRqtLYdVR m5o1UatFouhV/hTlnP3gizNJ4cCTbODl0npQ7QiJwO4ZFU5qPmw3eNeOhkLncll6ybXS3v37YzVM +DNLaG9EqC8HPWpqxk6kOo/7TGxij9bY5Qwqtu6nkZVi2P7Bp8O8NA43mjq3r3gYoJcB351fHz5h fLvEoHEe9Oby8DQvByFf01kpNugfhaeUJOXJsn8fPw2ryzfvMy2Ipk0vo8E3eSHq8FYkevfvxqJN Ivm0VUGF5/F+kQkADbdFvcBVlhYu7i+f3NyuE3PeZc3eJA1Mt94JUBuncJ0HUNBArK6nQr6g/AWx ik9EUDwTCfbSvjFHgHqV663DANVbGR9CQiX+Pv8WLss4qpTS8VU3+lDT7IqS9fkYzPSUPu8L0pve QHL++SL4zDBr/tUy98u1N5xkp01kCnH71/he4cfiGXwGT0XhDD5ccLv7Mh7jkfP346/qSUqdHbBw V76ywZSglUY43T240OB5+bhVEHbmEVcaDK9tNjnVMrjzEzINO9qPGWvsNqX7h/k93SsS4aMXJmiJ 2G0eb5ahhjwlhhEdRLqu3sf8Msp3c+duPwBIU4XP5nDPu5Ea150gr/U0flMcy2Vi/IcBgY4aTIX4 MqJ00EpJRE4KKHUqeqbm1l8NAy9hoSRG51DECq3Mi79jTQjmRNEUwxSuikXcL2gDlBuymrYjBKXa QI6csvuVn1a+A0rq6IB9pltu+HrvcPsUi0Y/oV4TSdTEWbayQvjuY9oOniHmEBpKNfFAEwsrPESN YRgNsmGCSbs/Kg8YxXadvsFCddeWLoWJyahtuhAVMuamgwaNowDkYe1GYO9n5xdrhI8wyy8i9DTm 2fyqnoQR0NwQrBXEvroI9km159lgJZ7MfYrqtad9xcg1mh+Sn1rvOC5BcDrVG86iupBm4zuNRcgR KiGg7nXFaZTxRqjgHyI5YcDX3yDgju4zEiXUYIjJ9YemBuXFWG9jmr2Qhd2T8kDU8ZiwNstUvw4l a3XtFZYvceJtYy490IyKxbMf8IVhOA8WdkEuNGvk/VqmrPzZuu+ILo3z/l0gnL9HfCuBILYLDdiI +quFItBwvsnnxaGW4j3UiT8Y7DP2CmuPLDXEDp1vnKyV6hnaA2z5ZeJdYg1CC5HxNVYaeQzXUA==
X-Report-Abuse-To: spam@se02.mfg.siteprotect.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/V4eEumAEFID6TYFz6Hp6ijt_hTc>
Subject: Re: [tsvwg] Review of draft-ietf-tsvwg-udp-options-32
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Apr 2024 02:12:00 -0000


On 4/9/2024 3:41 PM, Joe Touch wrote:
> 
>> On Apr 9, 2024, at 12:17 PM, Christian Huitema<huitema@huitema.net>  wrote:
>>the maximum segment size option.
>> Anything that adds clear text to an already encrypted packet should be considered an attack.
> That would make all TCP or IP options used with TLS an attack. Please let us know when those are addressed.

But there have indeed been attacks against clear text TCP headers, from 
SYN attacks to RST to data insertion. There are also lots of 
intermediaries that like to mess with the TCP headers, for example 
rewriting flow control parameters or the maximum segment size option.
These have been addressed over time in TCP.

These attacks are largely mitigated in encrypted transports like QUIC. 
Adding clear text options to encrypted transports will bring new attack 
scenarios, which will typically only be discovered over time and which 
will necessitate ad hoc mitigations.

-- Christian Huitema