Internet DRAFT - draft-kinnear-tls-client-net-address

draft-kinnear-tls-client-net-address







Network Working Group                                         E. Kinnear
Internet-Draft                                                  T. Pauly
Intended status: Informational                                   C. Wood
Expires: September 12, 2019                                   Apple Inc.
                                                          March 11, 2019


                  TLS Client Network Address Extension
                draft-kinnear-tls-client-net-address-00

Abstract

   This document describes a TLS 1.3 extension that can be by clients to
   request their public network address from a server.  This information
   can be used for a variety of purposes, including: NAT detection, ASN
   identification, and privacy-driven transport protocol features.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on September 12, 2019.

Copyright Notice

   Copyright (c) 2019 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.



Kinnear, et al.        Expires September 12, 2019               [Page 1]

Internet-Draft    TLS Client Network Address Extension        March 2019


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Requirements Language . . . . . . . . . . . . . . . . . .   2
   2.  Client Network Address Use Cases  . . . . . . . . . . . . . .   2
     2.1.  Connection Lifetime Optimizations . . . . . . . . . . . .   3
     2.2.  Privacy Stance Enhancements . . . . . . . . . . . . . . .   3
     2.3.  Metric Collections  . . . . . . . . . . . . . . . . . . .   3
   3.  Network Address Extension . . . . . . . . . . . . . . . . . .   3
   4.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   4
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .   4
   6.  Normative References  . . . . . . . . . . . . . . . . . . . .   5
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   5

1.  Introduction

   This document describes a TLS 1.3 [RFC8446] extension that can be by
   clients to request their public network address from a server.  This
   has several uses, including: NAT detection, ASN identification, and
   privacy-driven transport protocol features.  Servers that support
   this extension can send the perceived client address to clients.  The
   latter may then confirm whether or not this representation matches
   their known public address.

   Unlike the related NAT detection extension for IKE [RFC3947], clients
   do not send their perceived IP address to servers, even in an
   obfuscated form.  Doing so would introduce an unwanted privacy
   regression for clients.

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   [RFC2119] [RFC8174] when, and only when, they appear in all capitals,
   as shown here.

2.  Client Network Address Use Cases

   Knowledge of a public client network address can serve several
   purposes.  This extension allows clients to detect the presence of a
   NAT or other address-transforming proxy involved in a TLS connection.
   The following sections descibe several uses for this information.








Kinnear, et al.        Expires September 12, 2019               [Page 2]

Internet-Draft    TLS Client Network Address Extension        March 2019


2.1.  Connection Lifetime Optimizations

   Middleboxes such as NATs typically have short lifetimes for
   connection state.  Detecting such middleboxes may help influence
   client connection management logic, such as the use of keep-alive
   messages.

   Since NATs often apply to all traffic from an endhost, detection via
   a TLS connection may assist other non-TLS and non-TCP connections
   that can be more sensitive to NAT timeouts.

2.2.  Privacy Stance Enhancements

   Address-transforming proxies such as NATs may improve communication
   privacy by masking the public IP address of clients in a session.
   Modulo other cleartext signals such as session identifiers, the
   anonymity set of a connection passing through a NAT is proportional
   to the number of clients serviced by the NAT.  Absent NAT detection,
   clients cannot determine if their connections are linkable via IP-
   layer information, such as stable source addresses.  As a result,
   clients cannot determine if privacy-driven policies such as never
   resuming TLS connections improve privacy.

   If clients can detect NATs, they can make informed decisions about
   connection reuse.  As a motivating example, consider DNS-over-TLS
   [RFC7858][RFC8310].  Privacy-sensitive clients may wish to use fresh
   connections for individual queries so as to not allow recursive
   resolvers the ability of building client query histories.  However,
   in the absence of a NAT, reusing a connection does not pose a
   significant privacy regression since such clients are generally
   identifiable by their IP address.

   Client network awareness may also influence privacy-driven connection
   migration policies, such as those prescribed by QUIC
   [I-D.ietf-quic-transport].  For example, if clients know they are not
   behind a NAT, then connection ID rotation serves little value in
   preventing linkability.

2.3.  Metric Collections

   Clients may passively use their public address discovered via TLS to
   identify their corresponding ASN without the use of explicit probes.

3.  Network Address Extension

   Servers may send the perceived client IP address to its peer using
   the following "network_address" extension:




Kinnear, et al.        Expires September 12, 2019               [Page 3]

Internet-Draft    TLS Client Network Address Extension        March 2019


   enum {
       network_address(TBD), (65535)
   } ExtensionType;

   When sent by a client, this extension MUST be empty.  A server which
   receives a non-empty network_address extension MUST terminate the
   connection with an "Illegal Parameter" alert.

   Supporting servers which receive this extension may respond with a
   "network_address" extension, shown below, inside the
   EncryptedExtensions.

   struct {
       opaque address<32..255>;
   } NetworkAddress;

   address  The client's perceived address.

   In this case, NetworkAddress.address carries the raw network-order
   byte-wise representation of the client IP address.  (Since the
   extension is encrypted, there is no need to obfuscate the address for
   transit.)  Clients which receive a non-empty NetworkAddress extension
   may use it to record their public IP address.  Clients MUST treat
   empty NetworkAddress.address extensions as an error and send an
   Illegal Parameter alert in response.

4.  IANA Considerations

   IANA is requested to Create an entry, network_address(TBD), in the
   existing registry for ExtensionType (defined in [RFC8446]), with "TLS
   1.3" column values being set to "CH, EE", and "Recommended" column
   being set to "Yes".

5.  Security Considerations

   Since NetworkAddress extension contents are encrypted, this extension
   introduces no (known) additional security or privacy issues.

   An earlier design let clients send their address to servers in an
   obfuscated form, e.g., by hashing the client's perceived IP address
   with ClientHello.random, so that servers could measure whether or not
   clients were also behind NATs.  However, such obfuscation mechanisms
   are subject to dictionary attacks and therefore could be used by
   malicious on-path attackers to learn a client's true public address.
   Absent this information, there are no explicit signals from a single
   (non-resumed) TLS connection that such attackers can use to learn the
   client's public address.




Kinnear, et al.        Expires September 12, 2019               [Page 4]

Internet-Draft    TLS Client Network Address Extension        March 2019


   In general, absent a mechanism to encrypt the client extensions,
   sending the client's perceived address in any form therefore
   constitutes a privacy regression.

6.  Normative References

   [I-D.ietf-quic-transport]
              Iyengar, J. and M. Thomson, "QUIC: A UDP-Based Multiplexed
              and Secure Transport", draft-ietf-quic-transport-18 (work
              in progress), January 2019.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC3947]  Kivinen, T., Swander, B., Huttunen, A., and V. Volpe,
              "Negotiation of NAT-Traversal in the IKE", RFC 3947,
              DOI 10.17487/RFC3947, January 2005,
              <https://www.rfc-editor.org/info/rfc3947>.

   [RFC7858]  Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D.,
              and P. Hoffman, "Specification for DNS over Transport
              Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May
              2016, <https://www.rfc-editor.org/info/rfc7858>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

   [RFC8310]  Dickinson, S., Gillmor, D., and T. Reddy, "Usage Profiles
              for DNS over TLS and DNS over DTLS", RFC 8310,
              DOI 10.17487/RFC8310, March 2018,
              <https://www.rfc-editor.org/info/rfc8310>.

   [RFC8446]  Rescorla, E., "The Transport Layer Security (TLS) Protocol
              Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
              <https://www.rfc-editor.org/info/rfc8446>.

Authors' Addresses

   Eric Kinnear
   Apple Inc.
   One Apple Park Way
   Cupertino, California 95014
   United States of America

   Email: ekinnear@apple.com



Kinnear, et al.        Expires September 12, 2019               [Page 5]

Internet-Draft    TLS Client Network Address Extension        March 2019


   Tommy Pauly
   Apple Inc.
   One Apple Park Way
   Cupertino, California 95014
   United States of America

   Email: tpauly@apple.com


   Christopher A. Wood
   Apple Inc.
   One Apple Park Way
   Cupertino, California 95014
   United States of America

   Email: cawood@apple.com



































Kinnear, et al.        Expires September 12, 2019               [Page 6]