Re: [arch-d] <draft-lazanski-consolidation-00>

Martin Thomson <mt@lowentropy.net> Tue, 10 November 2020 01:44 UTC

Return-Path: <mt@lowentropy.net>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 582553A15B9 for <architecture-discuss@ietfa.amsl.com>; Mon, 9 Nov 2020 17:44:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lowentropy.net header.b=jAV/Npkk; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=drMXP4CC
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uosl1-8n5obk for <architecture-discuss@ietfa.amsl.com>; Mon, 9 Nov 2020 17:44:20 -0800 (PST)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 98F0C3A1638 for <architecture-discuss@ietf.org>; Mon, 9 Nov 2020 17:44:03 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id C93405C0280 for <architecture-discuss@ietf.org>; Mon, 9 Nov 2020 20:44:02 -0500 (EST)
Received: from imap10 ([10.202.2.60]) by compute1.internal (MEProxy); Mon, 09 Nov 2020 20:44:02 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lowentropy.net; h=mime-version:message-id:in-reply-to:references:date:from:to :subject:content-type:content-transfer-encoding; s=fm3; bh=Rlzey kGZE/m4MEk3z7mP5B4FegZ3WD0eO1b5rIpVkP4=; b=jAV/NpkkkfO9TUCZABNju 29ggKopZ0HVg9ZQQIeJ4AhMGxgA91jeRdjRIADqZhavfv5cRaqNZ8Lr1NDoe9J4X n9KSDzAJBLpxvUI7GkreZmS/DL6WEBZL8W+4OHdbp6+9tdQKmBfWgGtHD2tXp8wg Erg4wS1M1gZVaRs6jlM8OAPvPnXadXfgq8NXe0BhwM3ezXs6MyoxhoNbEsYTX+TU RTgxQdYQ4R+oLTR6Bpp9MPglcAxZlt2ToWIWHRJERhk6ulmg4sHt8Vl68d+mTXBD yLv2H4YZ1nogiiUXWMs7mn4fvpYjvnmNNqJ2zOcl0IVchac3H4I2yj3R+Mc/dJC1 g==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm1; bh=RlzeykGZE/m4MEk3z7mP5B4FegZ3WD0eO1b5rIpVk P4=; b=drMXP4CC+6EajPKXuQr7c6WYnhK6f/3e2dswvCS6x3fUgoFHZC4qby2Gp NE+rKqaqALyhjo9UrBCUuq6Qd0No55wTgdTmw0lqHJy84hNt+G8foS4cVyjZH7ly HG/e2WTEoFzFjEay27XBRFR7mCbZzwx6hPYtqVM4KvPO7FD6PYmmzhxXz8++JLse YZjLJR3UnXwzoZ9dGHDBTQAfwidEwZQqtrSUZN42FwPU5laHbv//MXT19VFvMxIu 8XveQdBjgwmkqA3+jOTOTdoijul7vWo6STuWGNwW8zo5ETJlbLxBAXTXb/MPMbNd WxkGdx12alpjf0yq+pRlRaAWvxqyg==
X-ME-Sender: <xms:YvCpXz6RH74B6aiftCHd81FlXxfSCGOj8kwMGRXTJCh0nhUCkZOjJA> <xme:YvCpX46nDEFggNuKoCGVJf5y90WV6XILGdqFVV2ALWnX1pABKJf7tcbIZqTrZoooQ vCcGUi0_1ADiaJk7Uc>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedujedrudduiedgfeelucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefofgggkfgjfhffhffvufgtgfesth hqredtreerjeenucfhrhhomhepfdforghrthhinhcuvfhhohhmshhonhdfuceomhhtsehl ohifvghnthhrohhphidrnhgvtheqnecuggftrfgrthhtvghrnhepteetteegleekteevke dvgeejiefhhffhvddttedugfejfffhveevudehuefgieevnecuffhomhgrihhnpehivght fhdrohhrghdpnhhivghlshhtvghnohgvvhgvrhdrnhgvthdpuhhvrgdrnhhlnecuvehluh hsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomhepmhhtsehlohifvghn thhrohhphidrnhgvth
X-ME-Proxy: <xmx:YvCpX6dDNaOD12c5dtBRdORrmi9qAz14ZlUR9lQJEpg6_7ZKyfjVBA> <xmx:YvCpX0JETc28f181WKQoCZcPDr5PqA37sPngNIta1bnzRgSgfX5Gpw> <xmx:YvCpX3IgVTqZZam_2vxmcqnb_WUoe33XS4dAFOZkaqvg5sGP4PFBig> <xmx:YvCpX8WljSnWNOCW-R9JtkpoBy2hE-yqkHFZ9-fuyHJjX7gqSo7Ong>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 94FF52038B; Mon, 9 Nov 2020 20:44:02 -0500 (EST)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.3.0-570-gba0a262-fm-20201106.001-gba0a2623
Mime-Version: 1.0
Message-Id: <c18b290b-b0c1-4056-b678-3f07475279c0@www.fastmail.com>
In-Reply-To: <2bfceb63-1b94-de6f-72e8-4d80eef356f5@digitaldissidents.org>
References: <3B4C73E8-1215-43CB-B969-56A2554F1348@lastpresslabel.com> <2bfceb63-1b94-de6f-72e8-4d80eef356f5@digitaldissidents.org>
Date: Tue, 10 Nov 2020 12:43:43 +1100
From: Martin Thomson <mt@lowentropy.net>
To: architecture-discuss@ietf.org
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/WOtz4J-GNU0RUvS9dLPj1aBbixQ>
Subject: Re: [arch-d] <draft-lazanski-consolidation-00>
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Nov 2020 01:44:22 -0000

Hi Dominique,

In addition to Dr. Niels' excellent questions and observations, I think that you might want to think about the effects that attacks on these protocols might have.

I agree that there are consolidation effects exhibited by some of the examples.  Privacy Pass continues to bother me in this regard, for example, but that doesn't necessarily render it irredeemable; it might just be that the deployment models considered don't work in all cases.

However, I think that it pays to understand the dynamics involved in the standardization of these protocols better.

For the QUIC example (which is not dominated in the implied fashion by Google and Mozilla (who also don't make Safari)), I would prefer to say that the effect is the opposite of what this draft claims.  That is, technology that was previously available only to Google and Facebook is now available to others.  There are many implementations, many of them good, and many of them accessible to more than just a few.  This function of standardization remains a valuable defense against accretion of proprietary technologies that provide larger actors with greater advantage.

The draft doesn't suggest any particular course of action in response for these protocols (QUIC, TLS, DoH) in response to the implication that they drive consolidation.  If I were to infer that refusal to standardize is an option, I posit that that would have a severe deleterious effect on the playing field.  It wouldn't remove the desire to deploy such mechanisms, but it would affect the availability of technology to smaller players.

That isn't to say that QUIC isn't without its shortcomings when it comes to power and resource disparities.  The deployment complexities involved mean that - for the foreseeable future at least - small players are still significantly disadvantaged.  But that would be considerably worse had the IETF not been involved at all.

Separately, I find this reassuring:

>  [...] QUIC should improve
>   efficiency and delivery of applications, but also forces all data to
>   be managed at the endpoint, which in this case is a browser, making
>   it more difficult to manage traffic at the network layer.

This was a headline goal of QUIC and I'm glad you agree that we've achieved it.

The document claims that DoH deployment was forced.  The claim is that this was not market forces at work.  I have to reject that thesis entirely.  While I agree with the author of RFC 8890 that the development of RFC 8484 had some issues (some of which were novel, all of which are worth learning from), the progress toward deployment seems to me to be unremarkable.  It's a deployment with a disruptive technical innovation that has a displacement effect on some incumbents, for sure, which are never painless, but it's not like Microsoft or Apple or Google or Comcast or any of the other actors who have responded are responding to force.  They are responding to market pressures.

This is FUD, and I'm disappointed to see it repeated here:

>   By routing the DNS over HTTPS, it becomes much easier to track user
>   activity through the use of cookies.  Therefore a protocol that was
>   developed to enhance user privacy and security could actually
>   undermine both: privacy through the use of cookies and security by
>   consolidating DNS traffic onto far fewer resolver operators that are
>   far more attractive targets for malicious actors of various types.

Yes, cookies are terrible.  Which is why no DoH implementation I'm aware of pays any attention to them.  That's a simplification, but the suggestion that client implementations don't take all reasonable steps to manage privacy risks and the trade-offs involved demonstrates a lack of understanding.

Cheers,
Martin

p.s., your drafting tool seems to have produced some weird errors.

On Tue, Nov 10, 2020, at 06:42, Niels ten Oever wrote:
> Hi Dominique,
> 
> Thanks for this well documented work! I hope you don't mind if I ask 
> some questions. I am a bit confused by this argument:
> 
>    The QUIC protocol is an example of the consolidation between layers
>    of the Internet - and not at the application layer. Designed and
>    deployed as a transport layer protocol, it effectively replaces TCP
>    at the network layer while also adding improved security. The result
>    is the merging or consolidation of three layers. QUIC should improve
>    efficiency and delivery of applications, but also forces all data to
>    be managed at the endpoint, which in this case is a browser, making
>    it more difficult to manage traffic at the network layer.
> 
> The web browser is not one entity, right? So how does QUIC lead to 
> consolidation?
> 
> Further down you argue that:
> 
> However,
>    there was little multistakeholder consultation and discussion prior
>    to the adoption of DoH. This was more of a rapid development and
>    deployment process, without the market driving the use cases and
>    uptake.
> 
> Does this mean that you think that the IETF process in general is 
> flawed or only in this case? Because I don't think this process have 
> deviated from the standard IETF process.
> 
> You also argue that:
> 
>    The market should be a regulating factor in consolidation.
> 
> I am curious what you base this on, because almost no contemporary 
> economic theory argues this. Would be nice to add some sources.
> 
> For the purposes of this draft we view it from the
>    perspective of the underlying architecture of the public Internet.
> 
> What do you mean with 'the public Internet' here? Is that different 
> from 'the Internet'? Or would you argue that global dependency bring 
> about other responsibilities for the Internet architecture and hence 
> the term 'public'? More discussion here would be welcome too. 
> 
> This will
>    create not a network of networks, but a mesh. 
> 
> This differentiation could also benefit from some elaboration imho.
> 
> The 'Actions for the IETF', largely seem actions for IRTF (1 and 4) and 
> the IAB. Point 4 would be an interesting point of discussion for hrpc!
> 
> 
> Thanks again for this work, curious to see where it goes, and thanks 
> for keeping this discussion going.
> 
> Best,
> 
> Niels
> 
> 
> On 11/9/20 6:09 PM, Dominique Lazanski wrote:
> > Hey Mark and I have a draft on consolidation. 
> > 
> > Protocol and Engineering Effects of Consolidation can be found here: https://datatracker.ietf.org/doc/draft-lazanski-consolidation/
> > 
> > If you have any thoughts or comments, we would love to have them!
> > 
> > Dominique
> > 
> > _______________________________________________
> > Architecture-discuss mailing list
> > Architecture-discuss@ietf.org
> > https://www.ietf.org/mailman/listinfo/architecture-discuss
> > 
> 
> -- 
> Niels ten Oever, PhD
> Postdoctoral Researcher - Media Studies Department - University of 
> Amsterdam
> Postdoctoral Research Fellow - Communications Department - Texas A&M 
> University
> Research Fellow - Centre for Internet and Human Rights - European 
> University Viadrina
> Associated Scholar - Centro de Tecnologia e Sociedade - Fundação 
> Getúlio Vargas
> 
> W: https://nielstenoever.net
> E: mail@nielstenoever.net
> T: @nielstenoever
> P/S/WA: +31629051853
> PGP: 2458 0B70 5C4A FD8A 9488 643A 0ED8 3F3A 468A C8B3
> 
> Read my disseration 'Wired Norms' here: 
> https://pure.uva.nl/ws/files/50781961/Thesis.pdf
> 
> _______________________________________________
> Architecture-discuss mailing list
> Architecture-discuss@ietf.org
> https://www.ietf.org/mailman/listinfo/architecture-discuss
>