-
Notifications
You must be signed in to change notification settings - Fork 205
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Don't change CID on peer CID change #2145
Comments
I'm not sure it is always well-defined when you are on a new path and you risk accidental linkage. I believe this was the thinking behind this. |
IIRC, @ekr is correct; we agreed to do this on peer address change.
|
The recommendation exists to avoid linkability across a non-migrating change in connection ID. |
I don't think that that's particularly useful, and it seems to create a bunch of new problems. |
My recollection is what @MikeBishop says. I remember discussing that changing CID on both sides allows a flow to be broken up into flowlets, but if the address is the same on both sides, that's a pretty clear signal anyways. I am fine with requiring a change only if the peer's CID and address change. |
That is not sufficient because the client could be migrating from domestic wifi to mobile, to train wifi, while the server always sees the IP address of the load balancer. |
In this case the LB and the server should be regarded as the same thing,
and it's the LB's job to convey that somehow.
…On Sat, Dec 15, 2018 at 3:07 AM MikkelFJ ***@***.***> wrote:
but if the address is the same on both sides, that's a pretty clear signal
anyways. I am fine with requiring a change only if the peer's CID and
address change.
That is not sufficient because the client could be migrating from domestic
wifi to mobile, to train wifi, while the server always sees the IP address
of the load balancer.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#2145 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/ABD1oQwz-CDVeYLTwd9HSiiPFxjWl1fjks5u5NgHgaJpZM4ZSOPm>
.
|
FWIW, it helps when you have multiple connections coalesced onto a 5-tuple. An endpoints rotates the sending CIDs of all the connections at once, and that triggers the peer to rotate all of it's sending CIDs at once. Then, it becomes very hard for an observer to track the individual connections. |
Tokyo:
|
This was closed by #2386 |
I don't remember this being what we agreed, and it's not necessary. You only need to change when you see a new path, not after a new CID. That's how we got rid of counting to infinity.
The text was updated successfully, but these errors were encountered: