The Impact of Transport Header Encryption on Operation and Evolution of the Internet

Similar documents
The Impact of Transport Header Encryption on Operation and Evolution of the Internet

The Impact of Transport Header Encryption on Operation and Evolution of the Internet. draft-fairhurst-tsvwg-transport-encrypt-04

Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels

A Path Layer for the Internet

Raising the Datagram API to Support Transport Protocol Evolution

Transport Layer Marcos Vieira

A Segment Routing (SR) Tutorial. R. Bonica NANOG70 June 6, 2017

IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

Network Layer (1) Networked Systems 3 Lecture 8

IPSec. Overview. Overview. Levente Buttyán

Packet Header Formats

IPv6: Are we really ready to turn off IPv4?

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Schahin Rajab TCP or QUIC Which protocol is most promising for the future of the internet?

Request for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo

Network Intrusion Detection Systems. Beyond packet filtering

Named Data Networking (NDN) CLASS WEB SITE: NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing

RID IETF Draft Update

An Industry view of IPv6 Advantages

Quick-Start for TCP and IP

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo.

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

More Accurate ECN Feedback in TCP draft-ietf-tcpm-accurate-ecn-04

Position of IP and other network-layer protocols in TCP/IP protocol suite

EE 122 Fall 2010 Discussion Section III 5 October 2010

this security is provided by the administrative authority (AA) of a network, on behalf of itself, its customers, and its legal authorities

Introduction to TCP/IP networking

IPv6, IPv4 and Coexistence Updates for IPPM's Active Metric Framework (Title updated formerly referred to as IPv6 update) draft-ietf-ippm-2330-ipv6-02

Ultra-Lightweight Encapsulation (ULE)

Quick-Start for TCP and IP

DetNet. Flow Definition and Identification, Features and Mapping to/from TSN. DetNet TSN joint workshop IETF / IEEE 802, Bangkok

Network Basic v0.1. Network Basic v0.1. Chapter 3 Internet Protocol. Chapter 3. Internet Protocol

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

User Datagram Protocol

Internet Engineering Task Force (IETF) Request for Comments: 7600

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

TCP /IP Fundamentals Mr. Cantu

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

RID IETF Draft Update

Share Count Analysis HEADERS

The IPsec protocols. Overview

Using HTTP/2 as a Transport for Arbitrary Bytestreams

Transport Services Internet Transport's Last Chance? Michael Welzl

Pervasive Monitoring. June /16

Mapping of Address and Port (MAP) an ISPs Perspective. E. Jordan Gottlieb Principal Engineer Charter Communications

In Defence of NATs. Geoff Huston APNIC. IEEE Global Internet Symposium, May 2017

Subnet Masks. Address Boundaries. Address Assignment. Host. Net. Host. Subnet Mask. Non-contiguous masks. To Administrator. Outside the network

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

How OAM Identified in Overlay Protocols

Concept: Traffic Flow. Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig

CSCI-GA Operating Systems. Networking. Hubertus Franke

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

Transport Layer Security

UDP. Networked Systems (H) Lecture 15

Observing Internet Path Transparency

Hashing on broken assumptions

SEN366 (SEN374) (Introduction to) Computer Networks

Transport: How Applications Communicate

EE 610 Part 2: Encapsulation and network utilities

Outlook on IEEE ZigBee Implications IP Requirements IPv6 over Low Power WPAN (IEEE ) Conclusions. KRnet /21

Chapter 2 Advanced TCP/IP

ECE 435 Network Engineering Lecture 9

Internet Governance and Internet Standardization in the Post-Snowden Era. Alissa Cooper IETF Chair / Cisco Fellow November 2017

Datagram. Source IP address. Destination IP address. Options. Data

Network Analysis of Point of Sale System Compromises

Review of Important Networking Concepts

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

Internet security and privacy

NETWORK PACKET ANALYSIS PROGRAM

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example

Internet Engineering Task Force (IETF) Category: Best Current Practice ISSN: May 2014

Network Address Translation. All you want to know about

Networking Technologies and Applications

A New Internet? RIPE76 - Marseille May Jordi Palet

BIG-IP otse vastu internetti. Kas tulemüüri polegi vaja?

IP - The Internet Protocol

Network Protocols. Internet Protocol (IP) TDC375 Autumn 2010/11 John Kristoff - DePaul University 1

Mobile Communications Chapter 8: Network Protocols/Mobile IP

WebRTC: IETF Standards Update September Colin Perkins

Congestion Feedback in RTCP

RTP Profile for TCP Friendly Rate Control draft-ietf-avt-tfrc-profile-03.txt

Networking: Network layer

Internet Control Message Protocol (ICMP)

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Implementing Real-Time Transport Services over an Ossified Network

Veryx ATTEST TM. Sample Test cases Overview. Conformance Test Suite. Internet Protocol version 4 (IPv4) Part Number: T / TCLS IPv /1.

The Internet. Overview. Network building blocks

Telecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Share IETF understanding on User Plane of 3GPP 5G System Intend to be a part of the LS reply to User Plane Protocol Study in 3GPP

QUIZ: Longest Matching Prefix

IP-DVB List Activities. 2nd Open Meeting Toulouse. Gorry Fairhurst University of Aberdeen

Forescout. Configuration Guide. Version 3.5

A New Internet? Introduction to HTTP/2, QUIC and DOH

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

Transcription:

The Impact of Transport Header Encryption on Operation and Evolution of the Internet draft-fairhurst-tsvwg-transport-encrypt-04 Gorry Fairhurst University of Aberdeen Colin Perkins University of Glasgow Presentation given to IETF TSVWG on 13 November 2017 This work is licensed under the Creative Commons Attribution-NoDerivatives 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA.

Transport Header Encryption 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Encrypted Payload Data Encrypted Payload Data Checksum Urgent Pointer DataOffset Reserved U A P R S F Window Acknowledgement Number Sequence Number 0 C K Type Packet Number (8) Length Checksum Source Port Destination Port Source Port Destination Port Destination Address Source Address TTL Protocol Header Checksum Packet Identifier D F M F Fragment Offset Version = 4 HeaderLen DSCP ECN Total Length TCP Destination Address Source Address TTL Protocol Header Checksum Packet Identifier D F M F Fragment Offset Version = 4 HeaderLen DSCP ECN Total Length QUIC Increasing fraction of transport headers encrypted reduces network visibility of transport progress (seq/ack numbers, window, flags) QUIC an example in principle everything above IP and ports could be encrypted 2

Benefits Reduces information leakage enhances privacy Harder to infer connection progress Harder to infer RTT and timing variation Prevents some spoofing/injection attacks against transport Preventing middlebox ossification flexibility to change transport Benefits are widely reported 3

4

Observable transport headers operators can analyse overall network performance help to detect anomalies inform capacity planning inform traffic engineering Passive overview of the health of the network, care about overall behaviour, not per flow Important for operations: transport encryption work-arounds will be developed active traffic probes encapsulations to replace missing headers 5

Operators can t debug what they cannot observe Encrypted transport headers flows subject to packet loss, other issues, indistinguishable from unaffected flows Debugging will require active probes intrusive, behaviour potentially differs from real traffic or information from endpoints not trustworthy? 6

Operators can t do traffic engineering or analysis if they cannot see the traffic 7

Encrypting transport headers limits open and verifiable data on transport behaviour Operators and researchers cannot tell if the transport is behaving as intended The community loses the data to inform future developments and to understand operational behaviour of transports endpoint telemetry helps, but not necessarily trustworthy 8

Understanding transport mis-behaviour relies on being able to observe transport headers Essential for transport protocol research and protocol debugging by operators/vendors Needs to happen in the wild testbeds don t discover feature interaction problems 9

Ecosystem fragmentation faster innovation is desirable, point solutions are fragile TCP works so well because it s open, and can be observed and improved by all Pervasive encryption removes the checks-andbalances, and reduces incentives to conform to specifications, develop openly problem for long-term health of standards ecosystem and network 10

Conclusions We are not against transport-level encryption it offers important benefits but also has costs for operations, protocol development, and standards We must seek balance obstructing real operations needs will lead to workarounds being deployed, and will likely not increase privacy Consider adopting as WG item, to encourage discussion of these issues While PM is an attack, other forms of monitoring that might fit the definition of PM can be beneficial and not part of any attack, e.g., network management functions monitor packets or flows and anti-spam mechanisms need to see mail message content. Some monitoring can even be part of the mitigation for PM, for example, certificate transparency [RFC6962] involves monitoring Public Key Infrastructure in ways that could detect some PM attack techniques. However, there is clear potential for monitoring mechanisms to be abused for PM, so this tension needs careful consideration in protocol design. Making networks unmanageable to mitigate PM is not an acceptable outcome, but ignoring PM would go against the consensus documented here. An appropriate balance will emerge over time as real instances of this tension are considered. [RFC7258, Pervasive Monitoring Is an Attack ] 11