Re: [tsvwg] Network feedback and security (was: New Version Notification for draft-huang-tsvwg-transport-challenges-00.txt)

Tom Herbert <tom@herbertland.com> Thu, 19 October 2023 23:13 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F702C15154D for <tsvwg@ietfa.amsl.com>; Thu, 19 Oct 2023 16:13:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lv4BMuAyQCdp for <tsvwg@ietfa.amsl.com>; Thu, 19 Oct 2023 16:13:33 -0700 (PDT)
Received: from mail-oa1-x34.google.com (mail-oa1-x34.google.com [IPv6:2001:4860:4864:20::34]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92884C151543 for <tsvwg@ietf.org>; Thu, 19 Oct 2023 16:13:33 -0700 (PDT)
Received: by mail-oa1-x34.google.com with SMTP id 586e51a60fabf-1ea45b07c59so191980fac.0 for <tsvwg@ietf.org>; Thu, 19 Oct 2023 16:13:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland.com; s=google; t=1697757212; x=1698362012; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=u2TCn25Aj8OWZbo1AEn6xb0rNJ1LRjoP5nZ7dB95B/U=; b=Yz0K32oy7+fGiuGqmfLW6XMamOXIk5YbgO7ES1p+dyE7ex6VIcJuzRYsDFM8F86/Up kVlwD3LRSnX22qKMY5M+cYIjHCA7ngaIYlmt8G9qr+5Wy90CokeN+LX6Szfd/BqnbAlM DKecrJQUwS8kVf3DA2QocExWZqV8sTh2Orlnga6LlYYZv6hDTozn76OSN4P8b3mN05hw WmdD2JDSz+EjC4sUvDy+2ZWH34zg0UN+g0CwetwX0EVjL2PI70mmv/M/MIQIk/5ckWV3 7P0jfSj1lPNoF3t9oOgYjfDg+7iG8YRY5148PxbqB95y0482sGt6Fds+dUMsDT20zhsv myUQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697757212; x=1698362012; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=u2TCn25Aj8OWZbo1AEn6xb0rNJ1LRjoP5nZ7dB95B/U=; b=Golq7fSbY4MJau+x2fE/AtyjYHjN3acTvl2nP4Q03HGoqsrScoCOcraSTTSb9cbpKy giLaYfVIqocvGEI/4wb69LlwHmmERlWnaGvcgzSA2nfLKsjav2253Mw5Uez9zfqWFs2H iuVSU1dCLs2DlDwsziPARaHMRXI3d38JIsLDozirv+9eLlbUQNkcPbJHRCPRbCRMk2Zm owHw1nol6goEcbG0Z8SjQm/KnsBsbLIHkqDaQjD0lQXau8rophes+FSbC8XOD4IZ0HFq M+cGgKTYEjXJGscTF50JaiI4wsf+EibRA93F/Fhdn06jfrB2QqpVQqCyo6BrY7zNtGct rqvg==
X-Gm-Message-State: AOJu0YxTZoUT72xeqN1OdaHB/4dbrNkq6RaHZ8LeBhYleYPLooFKBr7/ uqjKOG1Fk0Kma6ED0KmLscuV4iw1pzVCdrElAUyXDA==
X-Google-Smtp-Source: AGHT+IH7aVZ1mSdftqtQ8bwDp09pXwIzHE10JEEN7rwp4b2Nn7+co9p/S5siyFWxrwkTxS9vK8IR51bIFC5ZF1TxQ8M=
X-Received: by 2002:a05:6870:7b4d:b0:1e9:9b34:2297 with SMTP id ji13-20020a0568707b4d00b001e99b342297mr336229oab.24.1697757212463; Thu, 19 Oct 2023 16:13:32 -0700 (PDT)
MIME-Version: 1.0
References: <8c04c73ed6424da7a8c0a560ba673f63@huawei.com> <AM8PR07MB8137064565A08222EF49D6FFC2D6A@AM8PR07MB8137.eurprd07.prod.outlook.com> <FR2P281MB152725788020368B2BB483A39CD6A@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <2A095262-F757-4995-9A30-38E915E92021@gmx.de> <FR2P281MB15270FF6D523A75427CDE6419CD6A@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <7B7D6B62-F78E-4400-81EB-31DFB8445E17@gmx.de> <2c4d3b5f-8b4d-e427-8095-6de26f91f543@huitema.net> <AM8PR07MB81375DF357842B489143C12DC2D4A@AM8PR07MB8137.eurprd07.prod.outlook.com> <3D78AEBB-9475-4C5C-9E33-B639C50BEAE5@gmx.de> <CALx6S34-Pawq+4Eng=5hmk9gPTz=DVxowb52gZi+_8tY1Gw+Lg@mail.gmail.com> <978FCA81-FCE9-48CA-B4C5-86631DC03106@gmx.de>
In-Reply-To: <978FCA81-FCE9-48CA-B4C5-86631DC03106@gmx.de>
From: Tom Herbert <tom@herbertland.com>
Date: Thu, 19 Oct 2023 16:13:20 -0700
Message-ID: <CALx6S377dbng6+zPofALiYwf5NKR_WkowhDXmqfAGMy=qGT0vA@mail.gmail.com>
To: Sebastian Moeller <moeller0@gmx.de>
Cc: Christian Huitema <huitema@huitema.net>, tsvwg <tsvwg@ietf.org>, Ingemar Johansson S <ingemar.s.johansson@ericsson.com>, Ruediger.Geib@telekom.de
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/hxbgGNEUVml4M2goGajB9hw_L3I>
Subject: Re: [tsvwg] Network feedback and security (was: New Version Notification for draft-huang-tsvwg-transport-challenges-00.txt)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Oct 2023 23:13:37 -0000

On Thu, Oct 19, 2023, 7:56 AM Sebastian Moeller <moeller0@gmx.de> wrote:
>
> Hi Tom,
>
>
> > On Oct 19, 2023, at 16:41, Tom Herbert <tom@herbertland.com> wrote:
> >
> > On Thu, Oct 19, 2023 at 12:28 AM Sebastian Moeller <moeller0@gmx.de> wrote:
> >>
> >> Hi Ingemar,
> >>
> >> On 19 October 2023 07:19:40 CEST, Ingemar Johansson S <ingemar.s.johansson@ericsson.com> wrote:
> >>> Hi
> >>>
> >>> I have followed this discussi a bit. I focus only on the congestion indication and the discussion around the multi-bit congestion signaling.
> >>>
> >>> L4S is just recently standardized and we have just starated to get the community onboard to implement and evaluate it on a larger scale.
> >>> We should give it some time and get more data before we jump on the next big thing.
> >>>
> >>> It is of course possible for IETF to start working on the next big thing with multi-bit congestion indication. But as I see it, we currently have more than enough tasks on the table with L4S.
> >>
> >> [SM] Respectfully, that task is clearly on the proponents of L4S and IMHO should have been done before granting RFC status. L4S already hindered one higher resolution ECN approach (SCE) without actual evidence of superiority, let's leave it at that one victim please.
> >> In my opinion L4S is too little too late, as we already know multi-bit per packet information is superior, so we arguably should focus on that.
> >
> > Sebastian,
> >
> > There's a fundamental problem with mulit-bit per packet information:
> > there's no place in packets to put the data that will work across the
> > Internet! (other than the eight bit TOS/Priority field).
>
>         [SM2] Yes, I agree. The most fitting place would be in the IP header, but there we are out of (re-)usable bits...
>
>
> > The correct
> > mechanism for network to hosts signaling is Hop-by-Hop options but
> > those currently see a 99% drop rate.
>
>         [SM] Again I agree, for IPv6 any of the extension headers would seems the next best place. It should be one that exists along the full path, and is visible by the end points, if Hop-byHop fits that bill, great. Or not so great, 1% passage is sobering even for a glass half full kind of person.
>
>
> > There are proposed alternatives
> > like putting information in transport payload, TCP and now UDP
> > options, overloading flow label or IPv6 addresses; but all of these
> > have drawbacks that will preclude widescale deployment (these are
> > discussed in section 5 of draft-herbert-host2netsig).
>
>         [SM] Yes deployment of any of these including IP6 extension headers is going to be an uphill battle, as the network will only gain little by this, so deployment likely will start in environments where "little" already is worth it, and that I agree is likely not the wider internet. But darn it, it would be great if having to access a service over a congested link that would result in lowish throughput but with acceptable latency, as compared t today's low throughput and high latency and jitter. That might be a way of pitching this, if this allows more graceful operation at/close to saturation this might be interesting for infrastructure folks ()
>
> > Since network to
> > host signaling modifies data in flight limits the solution space even
> > more, for instance it might be okay for a switch to read a transport
> > payload like QUIC spin bit, but writing data in the transport payload
> > risks systematic data corruption.
>
>         [SM] Well, all handling of packets involved reading and writing memory already, and also changes in header fields is performed routinely, TTL/Hop limit come to mind, as does NATP... so there is ample precedence even if we exclude ECN, no?
>
>
> > I agree that multi-bit data should facilitate more precise congestion
> > control with faster reaction time, but I also think we need that more
> > in the data center than over the Internet and the problem of defining
> > a multi-bit packet field for the data is solvable in a limited domain.
>
>         [SM] I respectfully disagree, I do not run a data center, but I do run a home network and use the internet, I think this is a case where all domains would profit. Realistically though I expect this to come to fruition in limited domains/data centers first. Would be sad if it would stay there however.


Sebastian,

There may be another option. Fortunately, the definition of a limited
domain is rather loose. For instance, a provider network could deploy
switches that support multi-bit congestion signals in HBH options
could be considered a limited domain. So if a host connects to a
server in the provider's domain, like a hosted YT server for instance,
 then the signal is viable end-to-end. The provider network could be
quite large and it could partner with connected networks to extend the
limited domain. Conceivably, over time the "limited domain" could
encompass a significant portion of the Internet. This is part of the
plan to extend the reach FAST.

There's a problem with this though: the signal is only viable in the
limited domain. For instance, if a packet with HBH options leaves the
limited domain then there's a high probability the packet will be
dropped. There's no easy means for a host to determine if it's sending
within a limited domain, so the sending hosts can't decide on using
EH. The solution we're proposing is to remove the bits when packets
leave the limited domain at an egress router. as described in
draft-herbert-eh-inflight-removal. This also has some nice security
properties and coincides with existing network firewalls.

Tom

>
>
>
> >
> > Tom
> >
> >>
> >> Regards
> >>         Sebastian
> >>
> >>
> >>>
> >>> /Ingemar
> >>>
> >>>
> >>>> -----Original Message-----
> >>>> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Christian Huitema
> >>>> Sent: Tuesday, 17 October 2023 17:28
> >>>> To: Sebastian Moeller <moeller0@gmx.de>; Ruediger.Geib@telekom.de
> >>>> Cc: tsvwg@ietf.org
> >>>> Subject: [tsvwg] Network feedback and security (was: New Version
> >>>> Notification for draft-huang-tsvwg-transport-challenges-00.txt)
> >>>>
> >>>>
> >>>> On 10/17/2023 3:17 AM, Sebastian Moeller wrote:
> >>>>> Personally, ever since I read Arslan, Serhat, and Nick McKeown.
> >>>> ‘Switches Know the Exact Amount of Congestion’. In Proceedings of the
> >>>> 2019 Workshop on Buffer Sizing, 1–6, 2019. I came to the prediction that
> >>>> something like max(bufferoccupancy) over a network path in either
> >>>> predicted sojourntime or percentual buffer filling could really improve
> >>>> congestion control if included in all packets. That paper and follow ups
> >>>> on that idea are to my quite convincing. I see no real security concern
> >>>> as the network node adding this information might as well have dropped
> >>>> the packet if it wanted to harm that flow, so little increase in attack
> >>>> surface in that direction. What I hope something like this might allow
> >>>> is a gentler exist from slow start (assuming one can measure and compare
> >>>> the dynamics of the congestion indicator with those of the slow-starting
> >>>> flow to predict when to exist slow start without first having to dump ~2
> >>>> too much data into the network in one RTT). The network could indirectly
> >>>> profit if end-points use this information to better reign in congestion
> >>>> pro-actively, but that clearly is not guaranteed, especially over the
> >>>> open internet.
> >>>>
> >>>> Yes, network feedback is useful. You mention "max(bufferoccupancy) over
> >>>> a network path" as a signal, but I would argue that ECN is pretty much a
> >>>> 1 bit version of exactly that. So your argument is really for "more ECN
> >>>> bits". That's plausible, but the whole "L4S/Prague" effort seems to
> >>>> indicate that 1 bit is enough, because you can observe that bit on many
> >>>> consecutive packets. The conservative side of me would say we should
> >>>> first deploy the 1 bit version, and then study whether we really need
> >>>> many more bits.
> >>>>
> >>>> The "gentler exit from slow start" issue is largely addressed by
> >>>> Hystart, which uses the variations of the RTT as a signal. And yes,
> >>>> Hystart can be improved by also monitoring the ECN bits, not just the
> >>>> RTT.
> >>>>
> >>>> But there are in fact security concerns. We already know about ICMP
> >>>> attacks in which attackers spoof the network feedback and inject fake
> >>>> ICMP packets, for example to disrupt PMTU discovery. "Man on the side"
> >>>> attackers can easily send a second copy of a packet with modified header
> >>>> bits and race it to the destination. If transports accept that copy as
> >>>> genuine, they will heed the faked congestion signals and the attacker
> >>>> will succeed in disrupting the connection.
> >>>>
> >>>> -- Christian Huitema
> >>
> >> --
> >> Sent from my Android device with K-9 Mail. Please excuse my brevity.
> >>
>