======================================== Smaller Tunnel Build Messages ======================================== Author: zzz, orignal Created: 2020-10-09 Thread: http://zzz.i2p/topics/2957 Last updated: 2021-07-31 Status: Closed Target: 0.9.51 Note ==== Implemented as of API version 0.9.51. Network deployment and testing in progress. Subject to minor revision. See [I2NP] and [Tunnel-Creation-ECIES] for the final specification. Overview ======== Summary ------- The current size of the encrypted tunnel Build Request and Reply records is 528. For typical Variable Tunnel Build and Variable Tunnel Build Reply messages, the total size is 2113 bytes. This message is fragmented into three 1KB tunnel messages for the reverse path. Changes to the 528-byte record format for ECIES-X25519 routers are specified in [Prop152] and [Tunnel-Creation-ECIES]. For a mix of ElGamal and ECIES-X25519 routers in a tunnel, the record size must remain 528 bytes. However, if all routers in a tunnel are ECIES-X25519, a new, smaller build record is possible, because ECIES-X25519 encryption has much less overhead than ElGamal. Smaller messages would save bandwidth. Also, if the messages could fit in a single tunnel message, the reverse path would be three times more efficient. This proposal defines new request and reply records and new Build Request and Build Reply messages. The tunnel creator and all hops in the created tunnel must ECIES-X25519, and at least version 0.9.51. This proposal will not be useful until a majority of the routers in the network are ECIES-X25519. This is expected to happen by year-end 2021. Goals ----- See [Prop152] and [Prop156] for additional goals. - Smaller records and messages - Maintain sufficient space for future options, as in [Prop152] and [Tunnel-Creation-ECIES] - Fit in one tunnel message for the reverse path - Support ECIES hops only - Maintain improvements implemented in [Prop152] and [Tunnel-Creation-ECIES] - Maximize compatibility with current network - Hide inbound build messages from the OBEP - Hide outbound build reply messages from the IBGW - Do not require "flag day" upgrade to entire network - Gradual rollout to minimize risk - Reuse existing cryptographic primitives Non-Goals ----------- See [Prop156] for additional non-goals. - No requirement for mixed ElGamal/ECIES tunnels - Layer encryption changes, for that see [Prop153] - No speedups of crypto operations. It's assumed that ChaCha20 and AES are similar, even with AESNI, at least for the small data sizes in question. Design ====== Records ------------------------------- See appendix for calculations. Encrypted request and reply records will be 218 bytes, compared to 528 bytes now. The plaintext request records will be 154 bytes, compared to 222 bytes for ElGamal records, and 464 bytes for ECIES records as defined in [Prop152] and [Tunnel-Creation-ECIES]. The plaintext response records will be 202 bytes, compared to 496 bytes for ElGamal records, and 512 bytes for ECIES records as defined in [Prop152] and [Tunnel-Creation-ECIES]. The reply encryption will be ChaCha20 (NOT ChaCha20/Poly1305), so the plaintext records do not need to be a multiple of 16 bytes. Request records will be made smaller by using HKDF to create the layer and reply keys, so they do not need to be explicitly included in the request. Tunnel Build Messages ----------------------- Both will be "variable" with a one-byte number of records field, as with the existing Variable messages. ShortTunnelBuild: Type 25 ```````````````````````````````` Typical length (with 4 records): 873 bytes When used for inbound tunnel builds, it is recommended (but not required) that this message be garlic encrypted by the originator, targeting the inbound gateway (delivery instructions ROUTER), to hide inbound build messages from the OBEP. The IBGW decrypts the message, puts the reply into the correct slot, and sends the ShortTunnelBuildMessage to the next hop. The record length is selected so that a garlic-encrypted STBM will fit in a single tunnel message. See the appendix below. OutboundTunnelBuildReply: Type 26 `````````````````````````````````````` We define a new OutboundTunnelBuildReply message. This is used for outbound tunnel builds only. The purpose is to hide outbound build reply messages from the IBGW. It must be garlic encrypted by the OBEP, targeting the originator (delivery instructions TUNNEL). The OBEP decrypts the tunnel build message, constructs a OutboundTunnelBuildReply message, and puts the reply into the cleartext field. The other records go into the other slots. It then garlic encrypts the message to originator with the derived symmetric keys. Notes ``````` By garlic encrypting the OTBRM and STBM, we also avoid any potential issues with compatibility at the IBGW and OBEP of the paired tunnels. Message Flow ------------------ STBM: Short tunnel build message (type 25) OTBRM: Outbound tunnel build reply message (type 26) Outbound Build A-B-C Reply through existing inbound D-E-F New Tunnel STBM STBM STBM Creator ------> A ------> B ------> C ---\ OBEP \ | Garlic wrapped | OTBRM | (TUNNEL delivery) | from OBEP to | creator Existing Tunnel / Creator <-------F---------E-------- D <--/ IBGW Inbound Build D-E-F Sent through existing outbound A-B-C Existing Tunnel Creator ------> A ------> B ------> C ---\ OBEP \ | Garlic wrapped (optional) | STBM | (ROUTER delivery) | from creator New Tunnel | to IBGW STBM STBM STBM / Creator <------ F <------ E <------ D <--/ IBGW Record Encryption ------------------ Request and reply record encryption: as defined in [Prop152] and [Tunnel-Creation-ECIES]. Reply record encryption for other slots: ChaCha20. Layer Encryption ------------------ Currently there is no plan to change layer encryption for tunnels built with this specification; it would remain AES, as currently used for all tunnels. Changing layer encryption to ChaCha20 is a topic for additional research. New Tunnel Data Message ------------------------- Currently there is no plan to change the 1KB Tunnel Data Message used for tunnels built with this specification. It may be useful to introduce a new I2NP message that is larger or variable-sized, concurrent with this proposal, for use over these tunnels. This would reduce overhead for large messages. This is a topic for additional research. Specification ============= Short Request Record ----------------------- Short Request Record Unencrypted ``````````````````````````````````````` This is the proposed specification of the tunnel BuildRequestRecord for ECIES-X25519 routers. Summary of changes from [Tunnel-Creation-ECIES] : - Change unencrypted length from 464 to 154 bytes - Change encrypted length from 528 to 218 bytes - Remove layer and reply keys and IVs, they will be generated from split() and a KDF The request record does not contain any ChaCha reply keys. Those keys are derived from a KDF. See below. All fields are big-endian. Unencrypted size: 154 bytes. bytes 0-3: tunnel ID to receive messages as, nonzero bytes 4-7: next tunnel ID, nonzero bytes 8-39: next router identity hash byte 40: flags bytes 41-42: more flags, unused, set to 0 for compatibility byte 43: layer encryption type bytes 44-47: request time (in minutes since the epoch, rounded down) bytes 48-51: request expiration (in seconds since creation) bytes 52-55: next message ID bytes 56-x: tunnel build options (Mapping) bytes x-x: other data as implied by flags or options bytes x-153: random padding (see below) The flags field is the same as defined in [Tunnel-Creation] and contains the following:: Bit order: 76543210 (bit 7 is MSB) bit 7: if set, allow messages from anyone bit 6: if set, allow messages to anyone, and send the reply to the specified next hop in a Tunnel Build Reply Message bits 5-0: Undefined, must set to 0 for compatibility with future options Bit 7 indicates that the hop will be an inbound gateway (IBGW). Bit 6 indicates that the hop will be an outbound endpoint (OBEP). If neither bit is set, the hop will be an intermediate participant. Both cannot be set at once. Layer encryption type: 0 for AES (as in current tunnels); 1 for future (ChaCha?) The request exipration is for future variable tunnel duration. For now, the only supported value is 600 (10 minutes). The creator ephemeral public key is an ECIES key, big-endian. It is used for the KDF for the IBGW layer and reply keys and IVs. This is only included in the plaintext record in an Inbound Tunnel Build message. It is required because there is no DH at this layer for the build record. The tunnel build options is a Mapping structure as defined in [Common]. This is for future use. No options are currently defined. If the Mapping structure is empty, this is two bytes 0x00 0x00. The maximum size of the Mapping (including the length field) is 98 bytes, and the maximum value of the Mapping length field is 96. Short Request Record Encrypted ````````````````````````````````````` All fields are big-endian except for the ephemeral public key which is little-endian. Encrypted size: 218 bytes bytes 0-15: Hop's truncated identity hash bytes 16-47: Sender's ephemeral X25519 public key bytes 48-201: ChaCha20 encrypted ShortBuildRequestRecord bytes 202-217: Poly1305 MAC Short Reply Record ----------------------- Short Reply Record Unencrypted ````````````````````````````````````` This is the proposed specification of the tunnel ShortBuildReplyRecord for ECIES-X25519 routers. Summary of changes from [Tunnel-Creation-ECIES] : - Change unencrypted length from 512 to 202 bytes - Change encrypted length from 528 to 218 bytes ECIES replies are encrypted with ChaCha20/Poly1305. All fields are big-endian. Unencrypted size: 202 bytes. bytes 0-x: Tunnel Build Reply Options (Mapping) bytes x-x: other data as implied by options bytes x-200: Random padding (see below) byte 201: Reply byte The tunnel build reply options is a Mapping structure as defined in [Common]. This is for future use. No options are currently defined. If the Mapping structure is empty, this is two bytes 0x00 0x00. The maximum size of the Mapping (including the length field) is 201 bytes, and the maximum value of the Mapping length field is 199. The reply byte is one of the following values as defined in [Tunnel-Creation] to avoid fingerprinting: - 0x00 (accept) - 30 (TUNNEL_REJECT_BANDWIDTH) Short Reply Record Encrypted ``````````````````````````````````` Encrypted size: 218 bytes bytes 0-201: ChaCha20 encrypted ShortBuildReplyRecord bytes 202-217: Poly1305 MAC KDF ----------------------- See KDF section below. .. _msg-ShortTunnelBuild: ShortTunnelBuild ------------------- I2NP Type 25 This message is sent to middle hops, OBEP, and IBEP (creator). It may not be sent to the IBGW (use garlic wrapped InboundTunnelBuild instead). When received by the OBEP, it is transformed to an OutboundTunnelBuildReply, garlic wrapped, and sent to the originator. +----+----+----+----+----+----+----+----+ | num| ShortBuildRequestRecords... +----+----+----+----+----+----+----+----+ num :: 1 byte [Integer] Valid values: 1-8 record size: 218 bytes total size: 1+$num*218 [Integer]: /spec/common-structures#type-integer Notes ````` * Typical number of records is 4, for a total size of 873. .. _msg-OutboundTunnelBuildReply: OutboundTunnelBuildReply --------------------------- I2NP Type 26 This message is only sent by the OBEP to the IBEP (creator) via an existing inbound tunnel. It may not be sent to any other hop. It is always garlic encrypted. +----+----+----+----+----+----+----+----+ | num| | +----+ + | ShortBuildReplyRecords... | +----+----+----+----+----+----+----+----+ num :: Total number of records, 1 byte [Integer] Valid values: 1-8 ShortBuildReplyRecords :: Encrypted records length: num * 218 encrypted record size: 218 bytes total size: 1+$num*218 [Integer]: /spec/common-structures#type-integer Notes ````` * Typical number of records is 4, for a total size of 873. * This message should be garlic encrypted. KDF --- We use ck from Noise state after tunnel build record encryption/decrytion to derive following keys: reply key, AES layer key, AES IV key and garlic reply key/tag for OBEP. Reply key: Unlike long records we can't use left part of ck for reply key, because it's not last and will be used later. Reply key is used to encypt reply that record using AEAD/Chaha20/Poly1305 and Chacha20 to reply other records. Both use the same key, nonce is record's position in the message starting from 0. keydata = HKDF(ck, ZEROLEN, "SMTunnelReplyKey", 64) replyKey = keydata[32:63] ck = keydata[0:31] Layer key: Layer key is always AES for now, but same KDF can be used from Chacha20 keydata = HKDF(ck, ZEROLEN, "SMTunnelLayerKey", 64) layerKey = keydata[32:63] IV key for non-OBEP record: ivKey = keydata[0:31] because it's last IV key for OBEP record: ck = keydata[0:31] keydata = HKDF(ck, ZEROLEN, "TunnelLayerIVKey", 64) ivKey = keydata[32:63] ck = keydata[0:31] OBEP garlic reply key/tag: keydata = HKDF(ck, ZEROLEN, "RGarlicKeyAndTag", 64) replyKey = keydata[32:63] replyTag = keydata[0:7] Justification ============= This design maximizes reuse of existing cryptographic primitives, protocols, and code. This design minimizes risk. ChaCha20 is slightly faster than AES for small records, in Java testing. ChaCha20 avoids a requirement for data size multiples of 16. Implementation Notes ===================== - As with the existing variable tunnel build message, messages smaller than 4 records are not recommended. The typical default is 3 hops. Inbound tunnels must be built with an extra record for the originator, so the last hop does not know it is last. So that middle hops don't know if a tunnel is inbound or outbound, outbound tunnels should be built with 4 records also. Issues ====== Migration ========= The implementation, testing, and rollout will take several releases and approximately one year. The phases are as follows. Assignment of each phase to a particular release is TBD and depends on the pace of development. Details of the implementation and migration may vary for each I2P implementation. Tunnel creator must ensure that all hops in the created tunnel are ECIES-X25519, AND are at least version TBD. The tunnel creator does NOT have to be ECIES-X25519; it can be ElGamal. However, if the creator is ElGamal, it reveals to the closest hop that it is the creator. So, in practice, these tunnels should only be created by ECIES routers. It should NOT be necessary for the paired tunnel OBEP or IBGW is ECIES or of any particular version. The new messages are garlic-wrapped and not visible at the OBEP or IBGW of the paired tunnel. Phase 1: Implementation, not enabled by default Phase 2 (next release): Enable by default There are no backward-compatibility issues. The new messages may only be sent to routers that support them. Appendix ========== Without garlic overhead for unencrypted inbound STBM, if we don't use ITBM: Current 4-slot size: 4 * 528 + overhead = 3 tunnel messages 4-slot build message to fit in one tunnel message, ECIES-only: 1024 - 21 fragment header ---- 1003 - 35 unfragmented ROUTER delivery instructions ---- 968 - 16 I2NP header ---- 952 - 1 number of slots ---- 951 / 4 slots ---- 237 New encrypted build record size (vs. 528 now) - 16 trunc. hash - 32 eph. key - 16 MAC ---- 173 cleartext build record max (vs. 222 now) With garlic overhead for 'N' noise pattern to encrypt inbound STBM, if we don't use ITBM: Current 4-slot size: 4 * 528 + overhead = 3 tunnel messages 4-slot garlic-encrypted build message to fit in one tunnel message, ECIES-only: 1024 - 21 fragment header ---- 1003 - 35 unfragmented ROUTER delivery instructions ---- 968 - 16 I2NP header - 4 length ---- 948 - 32 byte eph. key ---- 916 - 7 byte DateTime block ---- 909 - 3 byte Garlic block overhead ---- 906 - 9 byte I2NP header ---- 897 - 1 byte Garlic LOCAL delivery instructions ---- 896 - 16 byte Poly1305 MAC ---- 880 - 1 number of slots ---- 879 / 4 slots ---- 219 New encrypted build record size (vs. 528 now) - 16 trunc. hash - 32 eph. key - 16 MAC ---- 155 cleartext build record max (vs. 222 now) Notes: Current build record cleartext size before unused padding: 193 Removal of full router hash and HKDF generation of keys/IVs would free up plenty of room for future options. If everything is HKDF, required cleartext space is about 58 bytes (without any options). The garlic-wrapped OTBRM will be slightly smaller than the garlic-wrapped STBM, because the delivery instructions are LOCAL not ROUTER, there's no DATETIME block included, and it uses an 8-byte tag rather than the 32-byte ephemeral key for a full 'N' message. References ========== [Common] https://geti2p.net/spec/common-structures [ECIES] https://geti2p.net/spec/ecies [I2NP] https://geti2p.net/spec/i2np [Prop123] https://geti2p.net/spec/proposals/123-new-netdb-entries [Prop144] https://geti2p.net/spec/proposals/144-ecies-x25519-aead-ratchet [Prop145] https://geti2p.net/spec/proposals/145-ecies [Prop152] https://geti2p.net/spec/proposals/152-ecies-tunnels [Prop153] https://geti2p.net/spec/proposals/153-chacha20-layer-encryption [Prop154] https://geti2p.net/spec/proposals/154-ecies-lookups [Prop156] https://geti2p.net/spec/proposals/156-ecies-routers [Tunnel-Creation] https://geti2p.net/spec/tunnel-creation [Tunnel-Creation-ECIES] https://geti2p.net/spec/tunnel-creation-ecies