Re: [tsvwg] Review of draft-ietf-tsvwg-udp-options-32

Sebastian Moeller <moeller0@gmx.de> Wed, 10 April 2024 07:20 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 287DFC14F60B; Wed, 10 Apr 2024 00:20:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.846
X-Spam-Level:
X-Spam-Status: No, score=-1.846 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmx.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tV3tOGtbNR8u; Wed, 10 Apr 2024 00:20:15 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.15]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48603C14F6AB; Wed, 10 Apr 2024 00:20:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmx.de; s=s31663417; t=1712733602; x=1713338402; i=moeller0@gmx.de; bh=q5SEza8Y1K5HH7zQ7fMreVdUYjQM7J2TsiB+c+FhV6U=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References: To; b=izwxa7Fd0cPiivgAIK0JXX+OeKSShRtpyIZ5DnoJbDgDmNY/mo0UlcVGr2hqDRRL kWzxxexNCyV/bV14CKJfTlcD6Ud1qsQknQjVG0bRN/+rJTtIw5dlK6/Dq9GYMl/HI Re05+VRGKVOrKLl2IH56OHmFoJiCYEOOdRDyAea4ElJeROKMknOb4uuB5LiFPZGki vZRhTDMJ8aTdBUP1NUeSYgMYdEYJBt/3FtbrRG48IufiUlMkaQy1oSc8a2U3FhtRu y+9wlyHD1qKN4y277hMI8otqjj5sSLpSDWI/mJ0IYCMih/TGlbp2aKDUSk32da1NX VMwOK3nej3Y1gDIUhw==
X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a
Received: from smtpclient.apple ([134.76.241.253]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MzyuS-1sfO8i0HR8-00x0R7; Wed, 10 Apr 2024 09:20:02 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.500.171.1.1\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <9bff172e-1cf3-4403-8088-eb9a25ba4185@huitema.net>
Date: Wed, 10 Apr 2024 09:19:51 +0200
Cc: Joe Touch <touch@strayalpha.com>, "Gorry (erg)" <gorry@erg.abdn.ac.uk>, tsvwg <tsvwg@ietf.org>, draft-ietf-tsvwg-udp-options.all@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <DB977AF4-A46D-4633-A54F-9B35748ACE8F@gmx.de>
References: <f98c67c3-45e2-49bf-9b3e-6545239355a1@huitema.net> <0CCBFF2B-9397-4E86-85F0-FD109A426C45@strayalpha.com> <9bff172e-1cf3-4403-8088-eb9a25ba4185@huitema.net>
To: Christian Huitema <huitema@huitema.net>
X-Mailer: Apple Mail (2.3774.500.171.1.1)
X-Provags-ID: V03:K1:KZAB3PLT60SQVifCyoDMlG29oyytkO4qQ/5g4BCWWKpcfWD0hdI jtrYzmKmKuANinEs+35doqNu5VrkvQUksnLq6tG2gSM0hvYVDCtIBZDbEw9W4K2/kkS9/y1 MfqHg+6G/w4h3d8jJP0Ag/BNWuh7IZLMxPZmdFnqj7l1MRlCUJ7iqMRBJvyEeG0MjiG/R0R OYl3D1+EEUUGXBtkN8AYQ==
UI-OutboundReport: notjunk:1;M01:P0:ySlFqN96s1k=;2XE/QU9nPNJzz0XUW77Wh1cXbFd qGPsFVeKeiM7iFH7/1FPImzwFFxVmsD3eeVE9+SUGFY0wLP57AxYIRVvrfLBlCLSas0vKWKah doLaV+Q7ZEGVMbUGn4lqEfjvZd+1qqCpmmfcBTHwnWhEMsYtPJjh6RfG5k4gJC5DBPEz79rN6 hh4NzlBKEttLDaQ2lYlBTRM5tXVUnNxVJ1tGOYA/Y2LE/3HYKJ+SLl9cuSbDiZWgyBCm6/pT/ GOe/AByhqhlpa9Y0af/VZmkifBiG0TfzQCBMFqylr1nIUq5cRft9GkAfMYalSdIED22p+TECm 3ZonfZlCcKwoAcB0dhJWTTcz9QwQ96n/q4d9w2KyBC02JwQ5i6x1lNkMXXeOmkWMEULtjFh77 P3/K80F5BjYUi4GJgVqk/CaFDJXbKcMgi5tVjryV+akJZvxImwzmU1AXxl+XbfiRcJqSlV7iz YG8A+AsnGHLbQ3QKGRZjzXulxqZHPENzk08S9GpMQx5FdEuJog15nhNGMjcL9wQMPEYsDp6+d j5thGAqvQmtVeLL+O9FP3X/Dl5BXm886fal0J1/87tiZ/ityQ7eQVoXPNYPbhKwzAY5XD0tt0 gaO5EJ/xVKk1X1htvCUf5Rm5Jw7yakajgwokwkN8csscCFbJqNulYYbW93TEHdpY6MRfJ2RVG 7mLJa1+miUiovGXpc4xdumzcCK8xVkUmVoZUu0fUm0P3OVUzhQMbzLPP2KTYY0Pne6OWyKLAt EA760cIHyMPDsVZ0kCk7CDWpudjy3Uw+SlneRWV3nG9wQUl+xB5V65ZVNkUhl73iQLeZv2CaK uG893GYDLcePNH5WTCk1ieyhEVg/8VWr1i07CHvX3oXcw=
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/uSYRvV-C-LS2VFm3mkE-7ogWbck>
Subject: Re: [tsvwg] Review of draft-ietf-tsvwg-udp-options-32
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Apr 2024 07:20:20 -0000

Hi Christian,

> On 10. Apr 2024, at 04:11, Christian Huitema <huitema@huitema.net> wrote:
> 
> 
> 
> On 4/9/2024 3:41 PM, Joe Touch wrote:
>>> On Apr 9, 2024, at 12:17 PM, Christian Huitema<huitema@huitema.net>  wrote:
>>> the maximum segment size option.
>>> Anything that adds clear text to an already encrypted packet should be considered an attack.
>> That would make all TCP or IP options used with TLS an attack. Please let us know when those are addressed.
> 
> But there have indeed been attacks against clear text TCP headers, from SYN attacks to RST to data insertion. There are also lots of intermediaries that like to mess with the TCP headers, for example rewriting flow control parameters or the maximum segment size option.

[SM] This on path modification of the MSS option can be quite positive, e.g. if used to avoid fragmentation... Sure it can be abused, but so can be almost everything... it is not that changing a single bit in a QUIC packet will have no consequences (yes, QUICK will notice and drop the packet, but that in itself is a consequence).

> These have been addressed over time in TCP.
> 
> These attacks are largely mitigated in encrypted transports like QUIC. Adding clear text options to encrypted transports will bring new attack scenarios, which will typically only be discovered over time and which will necessitate ad hoc mitigations.

[SM] While I am not opposed to having options that can be read and modified by the network, I guess I agree that not all options fall into that cartegory. But as mentioned here we have a decent conceptual solution for those fields that should stay private and for those that should be read-only.

Most of this seems moot anyway, without a real user for UDP options none of these issues are likely to crop up in real life. And honestly, seeing these options developed without real users to actually implement und confirm their utility makes me believe they will not be a perfect fit anyway. So in the end UDP options might serve as an example set of potential generic components a real-life UDP-based protocol might be inspired from and less of a toolkit to use directly.

> 
> -- Christian Huitema
>