Merci Antoine for your review.

When I updated my ballot position [1] from DISCUSS to NO OBJECTION, I have also 
referred to your email and strongly asked the authors for a reply.

Regards

-éric

[1] https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/ballot/


From: Antoine FRESSANCOURT <antoine.fressanco...@huawei.com>
Date: Monday, 5 September 2022 at 15:12
To: Eric Vyncke <evyn...@cisco.com>, Internet Area <int-area@ietf.org>, 
"int-...@ietf.org" <int-...@ietf.org>
Cc: "ip...@ietf.org" <ip...@ietf.org>
Subject: RE: Can you review draft-ietf-ipsecme-iptfs as it is about tunnels

Hello,

Following the message from E. Vyncke on the Int-Area mailing list, I have made 
a review of draft-ietf-ipsecme-iptfs-19. As it is my first draft review, I hope 
it will bring value to the author. I am of course happy to discuss comments on 
list or off list.

The draft draft-ietf-ipsecme-iptfs-19 proposes a mechanism to obfuscate and 
anonymize flows going through an IPSec tunnel. In the proposed mechanism, 
packets of fixed size are sent at a constant rate in the tunnel. Packets 
traversing the tunnel may be multiplexed or fragmented in the tunnel using an 
AGGFRAG payload conveyed in the ESP of an IP packet. One of the benefits of 
this mechanism compared to previously presented mechanism is to improve the 
bandwidth efficiency and improve the throughput for packets inside the tunnel.

This work solves an important security / privacy attack, the traffic flow 
correlation attack, consisting in analyzing the pace and size of packets 
exchanged between hosts to determine which application is used. Recently, 
authors of the paper ditto: WAN Traffic Obfuscation at Line Rate [1] have 
presented a solution similar to the solution presented in this draft. Note that 
this work could appear in the implementation section 8 as the authors have 
published an open source implementation of their work (Or in the informative 
references).

I have two major remarks about the document:

1/ In section 2.4.1, the author mentions that “Non-congestion-controlled mode 
is also appropriate if ESP over TCP is in use [RFC8229].  However, the use of 
TCP is considered a highly non-preferred, and a fall-back only solution for 
IPsec.  This is also one of the reasons that TCP was not chosen as the 
encapsulation for IP-TFS instead of AGGFRAG.”. while no mention of QUIC is 
made. I understand that the draft has been in the work for a rather long period 
of time, and that some recent QUIC work have popped out while it was in the 
making, yet I think it would be interesting to position this draft with regards 
to RFC 9221 (An Unreliable Datagram Extension to QUIC) given that QUIC now 
provides some tools and mechanisms that are similar to the tools needed by the 
authors (alas at a different layer, which is a major difference between the 
mechanism proposed in the draft and QUIC)

2/ About the congestion mode, the draft is referring to RFCs 3168 and 6040, 
which discuss the potential problems associated with the use of ECN in an IP in 
IP tunneling mechanism. As ECN is not protected in IP Sec, the Security 
Considerations section explicitly discourages from using ECN by default. Yet, I 
think that some threats related to the use of the congestion mode in this draft 
should be explicitly stated in the document. For instance, adding congestion on 
links taken by the tunnel can force the receiver end of the tunnel to signal 
that congestion is experienced. An observer being able to look at the sender 
end’s inbound traffic could determine which flows / other tunnels are delayed 
in front of this congestion event, leading the attacker to gain information 
about the tunnel’s users. This attack requires a rather powerful attacker, yet 
is considered feasible in the literature about privacy-preserving 
communication. I would discuss this potential threat in the Security 
Considerations section as a complement to the paragraph about ECN.

Overall, I think the draft is very interesting, that the technology it presents 
is useful and while I would appreciate some answers to remarks I have made, I 
think it is ready for the next stage.

Best regards,

Antoine Fressancourt

[1] Meier, Roland, Vincent Lenders, and Laurent Vanbever. "ditto: WAN Traffic 
Obfuscation at Line Rate." NDSS Symposium 2022. 2022.


From: Int-area <int-area-boun...@ietf.org> On Behalf Of Eric Vyncke (evyncke)
Sent: mercredi 10 août 2022 17:52
To: Internet Area <int-area@ietf.org>; int-...@ietf.org
Cc: ip...@ietf.org
Subject: [Int-area] Can you review draft-ietf-ipsecme-iptfs as it is about 
tunnels

Dear intarea/int-dir,

I have a request for you about 
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/

While the draft name looks like it is about IPsec, it appears to me as an 
“aggregation and fragmentation” tunneling mechanism [1], i.e., it uses the ESP 
Next-header field (an IP protocol per section 2.6 of RFC 4303 == IPsec ESP) to 
indicate a next protocol. While the original intent is to prevent traffic 
analysis (based on packet size and rate of packets) by 
padding/aggregating/fragmenting packets, it is also a tunnel. This smart 
technique could be use above other protocols than ESP.

I have just deferred the IESG evaluation of this document to allow the int-dir 
and intarea WG to review this document as it has most probably escaped your 
filter during the IETF Last Call.

Thank you very much for your comments (please keep all lists in cc)

Regards

-éric


[1] vaguely related to draft-templin-intarea-parcels
_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to