Re: [tsvwg] Network feedback and security (was: New Version Notification for draft-huang-tsvwg-transport-challenges-00.txt)

Tom Herbert <tom@herbertland.com> Fri, 20 October 2023 18:17 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74EA8C14CF1C for <tsvwg@ietfa.amsl.com>; Fri, 20 Oct 2023 11:17:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.106
X-Spam-Level:
X-Spam-Status: No, score=-7.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QPbCmFmBZNHu for <tsvwg@ietfa.amsl.com>; Fri, 20 Oct 2023 11:16:56 -0700 (PDT)
Received: from mail-pf1-x42b.google.com (mail-pf1-x42b.google.com [IPv6:2607:f8b0:4864:20::42b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF396C14CF17 for <tsvwg@ietf.org>; Fri, 20 Oct 2023 11:16:56 -0700 (PDT)
Received: by mail-pf1-x42b.google.com with SMTP id d2e1a72fcca58-6934202b8bdso1061120b3a.1 for <tsvwg@ietf.org>; Fri, 20 Oct 2023 11:16:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland.com; s=google; t=1697825816; x=1698430616; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=BNtb22Qhn0oW0TLoIrQLCmKq58RxdQuTzRM11z/yipk=; b=KYhNsMMBBO/yY040AxgcAiXatXT7iXLMa6sZUH3JV4ByYm+CHgzKAnAPdKOLIyhw1m Wzms3/tJYoJPb65imxVVh7g/XBoCSFeQJf4Xns1pk4LirJpyIT9tymZzmEHnqOjf/xIL 1ZTF5nRy2Z2rWUWg/Ys0AZ33ALwVkgaoiYwb5mOTJSYJ9+A2yOq4s2R4LlqPH7IJNTGb 6qxhXuUSKcQP4EZ8kRDuMn1q9dbX5hbur0t0vqNPkWFGprjfc63ui8Xw6moTAvqQVIb+ 4TnbpMSf/225yTULcitvfvCAy/YuzUBkKVV15+Zo4rxYtgANJuedOrDdNir5+uvYjP06 HhBw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697825816; x=1698430616; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=BNtb22Qhn0oW0TLoIrQLCmKq58RxdQuTzRM11z/yipk=; b=lwYmIn2JX9wLUCi0BEnSOOgyyZmQzj56P1W1vS2sX/xcF+54Nm+h8Hcv6OR0CFGBjW sFrTnm2ExWwkTGiubMfG75UbrcqerSuYUKTgBomTVIktXEZbhBnFfuWhdWhztkt4zrIr 9FGFLTJ8rCfi2wtH3zgjquzwo2z/JF7tlyZ9nm2Xv6RJykAFqsoPsujFKlcWNpw0wqAD TcZ/ilr/P+J6eBHWtz4p34du3O4GFrzoTBDP49Mm24Ct4ZOvM2qmAgH51Vs/0OPCo7R8 bXpmuv76b/iBDkFoT47ftKCIsMRlkQrx6vEho8h0w+lCOI4HhCRPBYLSoZ0s6DCKI74E HyHw==
X-Gm-Message-State: AOJu0YzsB7uCTmaPcnecYWSZIRQf+nxAlpDxsdj3TPtuK9SvOIYdNtBy x7DqPoDSabiWIbhWfi3TYHAlMMI1u8vAJaBhv2VxWg==
X-Google-Smtp-Source: AGHT+IFVnWqIbN+byqtpsl5L8MMNxO5MZWsksMY/S/iiC6LEPX6Ad4rsbIKDuhag4gsG90fnMT8EqC1n8HSFZjG/W2U=
X-Received: by 2002:a05:6a20:394a:b0:17b:2c56:70b8 with SMTP id r10-20020a056a20394a00b0017b2c5670b8mr2820051pzg.22.1697825815950; Fri, 20 Oct 2023 11:16:55 -0700 (PDT)
MIME-Version: 1.0
References: <8c04c73ed6424da7a8c0a560ba673f63@huawei.com> <AM8PR07MB8137064565A08222EF49D6FFC2D6A@AM8PR07MB8137.eurprd07.prod.outlook.com> <FR2P281MB152725788020368B2BB483A39CD6A@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <2A095262-F757-4995-9A30-38E915E92021@gmx.de> <FR2P281MB15270FF6D523A75427CDE6419CD6A@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <7B7D6B62-F78E-4400-81EB-31DFB8445E17@gmx.de> <2c4d3b5f-8b4d-e427-8095-6de26f91f543@huitema.net> <AM8PR07MB81375DF357842B489143C12DC2D4A@AM8PR07MB8137.eurprd07.prod.outlook.com> <3D78AEBB-9475-4C5C-9E33-B639C50BEAE5@gmx.de> <CALx6S34-Pawq+4Eng=5hmk9gPTz=DVxowb52gZi+_8tY1Gw+Lg@mail.gmail.com> <978FCA81-FCE9-48CA-B4C5-86631DC03106@gmx.de> <CALx6S377dbng6+zPofALiYwf5NKR_WkowhDXmqfAGMy=qGT0vA@mail.gmail.com> <EF9AEE37-7667-43FE-8421-05660D44565E@gmx.de> <CALx6S36Bz2nvw=hViWY16ROnx4suHmFU_6-on5=h13Lzpw6VnA@mail.gmail.com> <d5e9f274-f931-d801-2a43-b39ae28290d2@erg.abdn.ac.uk>
In-Reply-To: <d5e9f274-f931-d801-2a43-b39ae28290d2@erg.abdn.ac.uk>
From: Tom Herbert <tom@herbertland.com>
Date: Fri, 20 Oct 2023 11:16:44 -0700
Message-ID: <CALx6S35E75CxnHpXD6V0cJc3ZaxVFkJrfeEN4LN0iObxrmq9sg@mail.gmail.com>
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Cc: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>, Sebastian Moeller <moeller0@gmx.de>, tsvwg <tsvwg@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/yEnMBNFzGVD0P0K7emIrf8-b3mg>
Subject: Re: [tsvwg] Network feedback and security (was: New Version Notification for draft-huang-tsvwg-transport-challenges-00.txt)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Oct 2023 18:17:01 -0000

On Fri, Oct 20, 2023 at 8:44 AM Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>
> See later,
>
> On 20/10/2023 16:12, Tom Herbert wrote:
> > On Fri, Oct 20, 2023 at 1:11 AM Sebastian Moeller <moeller0@gmx.de> wrote:
> >> Hi Tom,
> >>
> >>
> >>> On Oct 20, 2023, at 01:13, Tom Herbert <tom@herbertland.com> wrote:
> >>>
> >>> On Thu, Oct 19, 2023, 7:56 AM Sebastian Moeller <moeller0@gmx.de> wrote:
> >>>> Hi Tom,
> >>>>
> >>>>
> >>>>> On Oct 19, 2023, at 16:41, Tom Herbert <tom@herbertland.com> wrote:
> >>>>>
> >>>>> On Thu, Oct 19, 2023 at 12:28 AM Sebastian Moeller <moeller0@gmx.de> wrote:
> >>>>>> Hi Ingemar,
> >>>>>>
> >>>>>> On 19 October 2023 07:19:40 CEST, Ingemar Johansson S <ingemar.s.johansson@ericsson.com> wrote:
> >>>>>>> Hi
> >>>>>>>
> >>>>>>> I have followed this discussi a bit. I focus only on the congestion indication and the discussion around the multi-bit congestion signaling.
> >>>>>>>
> >>>>>>> L4S is just recently standardized and we have just starated to get the community onboard to implement and evaluate it on a larger scale.
> >>>>>>> We should give it some time and get more data before we jump on the next big thing.
> >>>>>>>
> >>>>>>> It is of course possible for IETF to start working on the next big thing with multi-bit congestion indication. But as I see it, we currently have more than enough tasks on the table with L4S.
> >>>>>> [SM] Respectfully, that task is clearly on the proponents of L4S and IMHO should have been done before granting RFC status. L4S already hindered one higher resolution ECN approach (SCE) without actual evidence of superiority, let's leave it at that one victim please.
> >>>>>> In my opinion L4S is too little too late, as we already know multi-bit per packet information is superior, so we arguably should focus on that.
> >>>>> Sebastian,
> >>>>>
> >>>>> There's a fundamental problem with mulit-bit per packet information:
> >>>>> there's no place in packets to put the data that will work across the
> >>>>> Internet! (other than the eight bit TOS/Priority field).
> >>>>         [SM2] Yes, I agree. The most fitting place would be in the IP header, but there we are out of (re-)usable bits...
> >>>>
> >>>>
> >>>>> The correct
> >>>>> mechanism for network to hosts signaling is Hop-by-Hop options but
> >>>>> those currently see a 99% drop rate.
> >>>>         [SM] Again I agree, for IPv6 any of the extension headers would seems the next best place. It should be one that exists along the full path, and is visible by the end points, if Hop-byHop fits that bill, great. Or not so great, 1% passage is sobering even for a glass half full kind of person.
> >>>>
> >>>>
> >>>>> There are proposed alternatives
> >>>>> like putting information in transport payload, TCP and now UDP
> >>>>> options, overloading flow label or IPv6 addresses; but all of these
> >>>>> have drawbacks that will preclude widescale deployment (these are
> >>>>> discussed in section 5 of draft-herbert-host2netsig).
> >>>>         [SM] Yes deployment of any of these including IP6 extension headers is going to be an uphill battle, as the network will only gain little by this, so deployment likely will start in environments where "little" already is worth it, and that I agree is likely not the wider internet. But darn it, it would be great if having to access a service over a congested link that would result in lowish throughput but with acceptable latency, as compared t today's low throughput and high latency and jitter. That might be a way of pitching this, if this allows more graceful operation at/close to saturation this might be interesting for infrastructure folks ()
> >>>>
> >>>>> Since network to
> >>>>> host signaling modifies data in flight limits the solution space even
> >>>>> more, for instance it might be okay for a switch to read a transport
> >>>>> payload like QUIC spin bit, but writing data in the transport payload
> >>>>> risks systematic data corruption.
> >>>>         [SM] Well, all handling of packets involved reading and writing memory already, and also changes in header fields is performed routinely, TTL/Hop limit come to mind, as does NATP... so there is ample precedence even if we exclude ECN, no?
> >>>>
> >>>>
> >>>>> I agree that multi-bit data should facilitate more precise congestion
> >>>>> control with faster reaction time, but I also think we need that more
> >>>>> in the data center than over the Internet and the problem of defining
> >>>>> a multi-bit packet field for the data is solvable in a limited domain.
> >>>>         [SM] I respectfully disagree, I do not run a data center, but I do run a home network and use the internet, I think this is a case where all domains would profit. Realistically though I expect this to come to fruition in limited domains/data centers first. Would be sad if it would stay there however.
> >>>
> >>> Sebastian,
> >>>
> >>> There may be another option. Fortunately, the definition of a limited
> >>> domain is rather loose. For instance, a provider network could deploy
> >>> switches that support multi-bit congestion signals in HBH options
> >>> could be considered a limited domain. So if a host connects to a
> >>> server in the provider's domain, like a hosted YT server for instance,
> >>> then the signal is viable end-to-end. The provider network could be
> >>> quite large and it could partner with connected networks to extend the
> >>> limited domain. Conceivably, over time the "limited domain" could
> >>> encompass a significant portion of the Internet. This is part of the
> >>> plan to extend the reach FAST.
> >>          [SM2] OK, "starting from a limited domain" seems viable then.
> >>
> >>
> >>> There's a problem with this though: the signal is only viable in the
> >>> limited domain. For instance, if a packet with HBH options leaves the
> >>> limited domain then there's a high probability the packet will be
> >>> dropped. There's no easy means for a host to determine if it's sending
> >>> within a limited domain, so the sending hosts can't decide on using
> >>> EH.
> >>          [SM2] I respectfully disagree, the signal clearly should be end2end and be part of the negotiation then, so endpoints check whether the signal passes between the endpoints and disale its usage if they do not.
> > Sebastian,
> >
> > That was my first intuition as well-- to have hosts do some sort of
> > "Happy Eyeballs" like probing of path capabilities, and maybe even
> > creating a mash-up map of the capabilities of paths across the
> > Internet so that hosts can get a priori information on the path
> > capabilities to destinations. But thinking it through, I've come to
> > believe that this is an inordinate amount of complexity and logic we'd
> > have to add to host stacks just to use a protocol that is defined in
> > an Internet standard.
> >
> > Note that this may coincide with negotiation, but the process itself
> > is probing the capabilities of the path to each destination.
> > Presumably, the host could start by sending initial packets with EH
> > and wait for a response.If packets come back then it knows the path is
> > viable, if it doesn't get a reply then it knows is that a packet was
> > dropped somewhere but not why it was dropped (RFC8883 which would
> > allows routers to send an ICMP error when packets with EH are dropped,
> > but we know ICMP is a lost cause on the Internet). The host could try
> > to back off and not use EH to see what happens. But even if the first
> > packet succeeded, there's no guarantee that all packets will take the
> > same path and some later packets in the connection may be dropped so
> > probing might need to be a continuous process over the life of a
> > connection.
> >
> > But there's a more insidious problem to deal with. Instead of dropping
> > packets, some routers will relegate EH to slow path processing in a
> > CPU. To the end hosts EH will appear viable, however when that happens
> > packets will go through different queues and be subject to greater
> > latency. When packets go through the slow path the likelihood of
> > congestion increases substantially. So, ironically, by trying to
> > measure congestion we may be the cause of congestion!
> >
> >>
> >>> The solution we're proposing is to remove the bits when packets
> >>> leave the limited domain at an egress router.
> >>          [SM2] That I disagree with, this needs to be end2end, unless your proposal entails the end points being informed about that removal.
> > I believe you also mentioned that it is also best effort. If we remove
> > EH at egress routers then we don't get feedback on congestion for
> > those destinations, but at least communications are still viable. The
> > firewalls where this happens already exist and the implementation of
> > EH removal is very straightforward. IMO, this EH removal is a more
> > feasible solution than pushing complexity with the necessary probing
> > logic into all host stacks.
> >
> > Tom
>
> Somehow this thread seems to have now developed a walk through various
> topics.
>
> Musing on the future direction for IPv6 EH I'is more appropriate to
> discuss in v6ops (if it's just operationla practice) or 6man (if the
> desire is really to change the specification of an EH). I'm sure it will
> get lots more comment there. That sort of discussion isn't really so
> appropriate here, where the focus ought to be on the end-to-end
> transport or end-to-network use of these signals.

Hi Gorry,

Sebastian's proposal is for network devices to produce multi-bit
signals meant for consumption by the transport layer at end points.
It's an interesting idea, but it seems reasonable to ask if it's
feasible for the network layer to provide those signals (right now on
the Internet it's not). If it's not feasible, then we don't need to
spend the WG's time considering the transport layer details of the
solution.

More generally, this isn't only an example of network devices
generating signals that would be consumed by the transport layer. For
example, there's also draft-ravi-ippm-csig which was posted to tsvwg
(in that case the carrier is Ethernet which isn't in scope of IETF).
We've also seen a couple of drafts proposing to use UDP options to
convey network layer information in the UDP surplus space. Network to
host signaling and host to networking signaling inevitably need to
cross protocol layers, and it's going to be hard if the carrier and
the content of signals are developed in isolation. If this isn't in
the charter of tsvwg that's fine, but I don't know that this fits into
any other WG. Please advise.

Thanks,
Tom

>
> Gorry
>
> (YSVWG Chgair)
>
> >
> >>
> >>> as described in
> >>> draft-herbert-eh-inflight-removal. This also has some nice security
> >>> properties and coincides with existing network firewalls.
> >>          [SM2] Will need to read that, when I find time.
> >>
> >> Regards
> >>          Sebastian
> >>
> >>
> >>> Tom
> >>>
> >>>>
> >>>>
> >>>>> Tom
> >>>>>
> >>>>>> Regards
> >>>>>>         Sebastian
> >>>>>>
> >>>>>>
> >>>>>>> /Ingemar
> >>>>>>>
> >>>>>>>
> >>>>>>>> -----Original Message-----
> >>>>>>>> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Christian Huitema
> >>>>>>>> Sent: Tuesday, 17 October 2023 17:28
> >>>>>>>> To: Sebastian Moeller <moeller0@gmx.de>; Ruediger.Geib@telekom.de
> >>>>>>>> Cc: tsvwg@ietf.org
> >>>>>>>> Subject: [tsvwg] Network feedback and security (was: New Version
> >>>>>>>> Notification for draft-huang-tsvwg-transport-challenges-00.txt)
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> On 10/17/2023 3:17 AM, Sebastian Moeller wrote:
> >>>>>>>>> Personally, ever since I read Arslan, Serhat, and Nick McKeown.
> >>>>>>>> ‘Switches Know the Exact Amount of Congestion’. In Proceedings of the
> >>>>>>>> 2019 Workshop on Buffer Sizing, 1–6, 2019. I came to the prediction that
> >>>>>>>> something like max(bufferoccupancy) over a network path in either
> >>>>>>>> predicted sojourntime or percentual buffer filling could really improve
> >>>>>>>> congestion control if included in all packets. That paper and follow ups
> >>>>>>>> on that idea are to my quite convincing. I see no real security concern
> >>>>>>>> as the network node adding this information might as well have dropped
> >>>>>>>> the packet if it wanted to harm that flow, so little increase in attack
> >>>>>>>> surface in that direction. What I hope something like this might allow
> >>>>>>>> is a gentler exist from slow start (assuming one can measure and compare
> >>>>>>>> the dynamics of the congestion indicator with those of the slow-starting
> >>>>>>>> flow to predict when to exist slow start without first having to dump ~2
> >>>>>>>> too much data into the network in one RTT). The network could indirectly
> >>>>>>>> profit if end-points use this information to better reign in congestion
> >>>>>>>> pro-actively, but that clearly is not guaranteed, especially over the
> >>>>>>>> open internet.
> >>>>>>>>
> >>>>>>>> Yes, network feedback is useful. You mention "max(bufferoccupancy) over
> >>>>>>>> a network path" as a signal, but I would argue that ECN is pretty much a
> >>>>>>>> 1 bit version of exactly that. So your argument is really for "more ECN
> >>>>>>>> bits". That's plausible, but the whole "L4S/Prague" effort seems to
> >>>>>>>> indicate that 1 bit is enough, because you can observe that bit on many
> >>>>>>>> consecutive packets. The conservative side of me would say we should
> >>>>>>>> first deploy the 1 bit version, and then study whether we really need
> >>>>>>>> many more bits.
> >>>>>>>>
> >>>>>>>> The "gentler exit from slow start" issue is largely addressed by
> >>>>>>>> Hystart, which uses the variations of the RTT as a signal. And yes,
> >>>>>>>> Hystart can be improved by also monitoring the ECN bits, not just the
> >>>>>>>> RTT.
> >>>>>>>>
> >>>>>>>> But there are in fact security concerns. We already know about ICMP
> >>>>>>>> attacks in which attackers spoof the network feedback and inject fake
> >>>>>>>> ICMP packets, for example to disrupt PMTU discovery. "Man on the side"
> >>>>>>>> attackers can easily send a second copy of a packet with modified header
> >>>>>>>> bits and race it to the destination. If transports accept that copy as
> >>>>>>>> genuine, they will heed the faked congestion signals and the attacker
> >>>>>>>> will succeed in disrupting the connection.
> >>>>>>>>
> >>>>>>>> -- Christian Huitema
> >>>>>> --
> >>>>>> Sent from my Android device with K-9 Mail. Please excuse my brevity.
> >>>>>>
>