Re: [arch-d] <draft-lazanski-consolidation-00>

Christian Huitema <huitema@huitema.net> Thu, 12 November 2020 03:29 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A46A63A1380 for <architecture-discuss@ietfa.amsl.com>; Wed, 11 Nov 2020 19:29:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.889
X-Spam-Level:
X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VsfHwcaBbvZv for <architecture-discuss@ietfa.amsl.com>; Wed, 11 Nov 2020 19:29:18 -0800 (PST)
Received: from mx36-out10.antispamcloud.com (mx36-out10.antispamcloud.com [209.126.121.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA0253A137F for <architecture-discuss@ietf.org>; Wed, 11 Nov 2020 19:29:17 -0800 (PST)
Received: from xse289.mail2web.com ([66.113.197.35] helo=xse.mail2web.com) by mx170.antispamcloud.com with esmtp (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1kd3IQ-00012K-Br for architecture-discuss@ietf.org; Thu, 12 Nov 2020 04:29:16 +0100
Received: from xsmtp22.mail2web.com (unknown [10.100.68.61]) by xse.mail2web.com (Postfix) with ESMTPS id 4CWnBt2dffz1l02 for <architecture-discuss@ietf.org>; Wed, 11 Nov 2020 19:29:10 -0800 (PST)
Received: from [10.5.2.15] (helo=xmail05.myhosting.com) by xsmtp22.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1kd3IM-000837-8k for architecture-discuss@ietf.org; Wed, 11 Nov 2020 19:29:10 -0800
Received: (qmail 28382 invoked from network); 12 Nov 2020 03:29:08 -0000
Received: from unknown (HELO [192.168.1.103]) (Authenticated-user:_huitema@huitema.net@[172.58.43.90]) (envelope-sender <huitema@huitema.net>) by xmail05.myhosting.com (qmail-ldap-1.03) with ESMTPA for <architecture-discuss@ietf.org>; 12 Nov 2020 03:29:08 -0000
To: Martin Thomson <mt@lowentropy.net>, "Rob Wilton (rwilton)" <rwilton@cisco.com>, "architecture-discuss@ietf.org" <architecture-discuss@ietf.org>
References: <3B4C73E8-1215-43CB-B969-56A2554F1348@lastpresslabel.com> <2bfceb63-1b94-de6f-72e8-4d80eef356f5@digitaldissidents.org> <c18b290b-b0c1-4056-b678-3f07475279c0@www.fastmail.com> <MN2PR11MB4366ED6DFF38BE9663C9AF04B5E80@MN2PR11MB4366.namprd11.prod.outlook.com> <76dada1c-652b-4d4d-8b7f-ba836660c1d0@www.fastmail.com>
From: Christian Huitema <huitema@huitema.net>
Autocrypt: addr=huitema@huitema.net; prefer-encrypt=mutual; keydata= mDMEXtavGxYJKwYBBAHaRw8BAQdA1ou9A5MHTP9N3jfsWzlDZ+jPnQkusmc7sfLmWVz1Rmu0 J0NocmlzdGlhbiBIdWl0ZW1hIDxodWl0ZW1hQGh1aXRlbWEubmV0PoiWBBMWCAA+FiEEw3G4 Nwi4QEpAAXUUELAmqKBYtJQFAl7WrxsCGwMFCQlmAYAFCwkIBwIGFQoJCAsCBBYCAwECHgEC F4AACgkQELAmqKBYtJQbMwD/ebj/qnSbthC/5kD5DxZ/Ip0CGJw5QBz/+fJp3R8iAlsBAMjK r2tmyWyJz0CUkVG24WaR5EAJDvgwDv8h22U6QVkAuDgEXtavGxIKKwYBBAGXVQEFAQEHQJoM 6MUAIqpoqdCIiACiEynZf7nlJg2Eu0pXIhbUGONdAwEIB4h+BBgWCAAmFiEEw3G4Nwi4QEpA AXUUELAmqKBYtJQFAl7WrxsCGwwFCQlmAYAACgkQELAmqKBYtJRm2wD7BzeK5gEXSmBcBf0j BYdSaJcXNzx4yPLbP4GnUMAyl2cBAJzcsR4RkwO4dCRqM9CHpVJCwHtbUDJaa55//E0kp+gH
Message-ID: <f81060f0-56cf-2ad2-4ccf-f0324890261f@huitema.net>
Date: Wed, 11 Nov 2020 19:29:09 -0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.12.1
MIME-Version: 1.0
In-Reply-To: <76dada1c-652b-4d4d-8b7f-ba836660c1d0@www.fastmail.com>
Content-Type: multipart/alternative; boundary="------------31A32B1E0BA24B8EDEB0168D"
Content-Language: en-US
X-Originating-IP: 66.113.197.35
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 66.113.197.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=66.113.197.0/24@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.15)
X-Recommended-Action: accept
X-Filter-ID: Mvzo4OR0dZXEDF/gcnlw0cThwnZT+ODcFyeCwCHoUjupSDasLI4SayDByyq9LIhVUZbR67CQ7/vm /hHDJU4RXkTNWdUk1Ol2OGx3IfrIJKywOmJyM1qr8uRnWBrbSAGDsYLBcJLyHnVrULITPs15U6ts NHuRxlWqWR9fNqLY1ai4Dcwf+CZK8NXgy3In+fX7SvmMbusD8MAdJfTseGdhqVO05s+oip5EC/YK rMQ9+O9t+TYaqvvx766D6vBkj4PutP0Dzal8myJ8vVhoWnSKP9MNEQeb4WXjUDFU/KbUpHy8pnvZ XWSe7jV34Pxn0vH1Lz/y+awqhw7CmTPsWtYsCV/oEQh3zFZ7AJOfdc5NLopVCPmS+MVojfDUugvn Zl+jhHQOLtWk4clq0P6Ltvr/5Zl+BJt+8hYKwgejR0Z9YPn97p3CKmEi95YYeXPNWMiahaC2TJpF rGrq1WX76kTmg5w7R2/M+XaT5BLifEp8KpWu41J1t4cteGI4vH6PuMQp0kaOEXLuWd+6zLg4wp8u XxPcpGyeyPXKNTABBN67jV7JvFCbAD7w3FUirQwmJIqD2OUMeHyTpNN0eXybX/w7/3ZCM0u5uBlK VwmNWN494pUPBFtmg5GCGtjOaQC74kK2pwFkX37ezuu5b0o/wSdkkLoi5ifCAfaw/iBTFFzjTc/a f+kM2U7Xb/97uLa8qeCAMYjMUqZL6iBLUS97OHj8b53ugII7ouYCgfwcsP8qn8jymNgFzWRkuRvd 2hsh/DKjJTkETFTHdBwnk7JDmeUy/EMJglQRMX745HX5paWB37c14O9uIBc4R2FHvu2iptL1hh2Y oFjD56mbgZ6ciM1h0E4vidrAbzPztKfs4s5XguJVPHw49Qp0cfq+G/9UPz2fnyYrcxSML4eIxZUn seMzuLzpwlGzT4HD3EMMzICh8kMVKPqpdskk5LxBR/9t1zMMNgZ00xRl+f8iOCsvtWSXGxqnOR+D xGR3qCP3ei1hX999s+yzMCxnaIvRTEOY/XUFLzItWCgLp9eSUEiS8gk+ZPjEzm1SsR8v3aJbN/NZ fa/X7fXWg6J5cHei57l/ibtd
X-Report-Abuse-To: spam@quarantine11.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/_yVY0wK7RbHHCmdapNRxDDfa8Ew>
Subject: Re: [arch-d] <draft-lazanski-consolidation-00>
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2020 03:29:20 -0000

On 11/11/2020 4:37 PM, Martin Thomson wrote:

>> Are you really intending to say that a headline goal of QUIC is to make 
>> it more difficult to manage traffic at the network layer, and by 
>> implication make it more difficult for ISPs to manage networks?
> No, I should have been more careful there.  There were a couple of goals relevant to this.  One was to reduce information exposure and improve privacy with respect to on-path attackers.  The other was to limit active interference by an on-path attacker.
>
> The net effect is that ISPs are less able to manage the details of other people's interactions.  But there are affordances in the protocol that should allow ISPs (and other network operators) to continue to manage their networks effectively.  Of course, it's still a matter of debate how much information or control network operators need from endpoints, but at least QUIC provides end users (or at least end systems) greater ability to decide what happens.

This is not a new debate. The MARNEW workshop was very much dedicated to
this topic: how does encryption affect network management. See the
report in RFC 8462. Another reference directly related to this subject
is RFC 8404, Effects of Pervasive Encryption on Operators. We learned
something from MARNEW and from the review process of RFC 8404: "network
management" is defined very loosely. When an operator say that they
"need to manage the network", it covers a spectrum of things from "being
able to debug an error condition" to "being able to extract additional
revenues from the network". It is easier to get IETF consensus on some
parts of that spectrum than on others.

Encryption does not preclude network slices, priorities and other forms
of QoS. Applications can absolutely be programmed to explicitly use a
QoS API and request a specific form of network service. What encryption
precludes is differentiated treatment of various applications without
explicit agreement between network and endpoint. We could have a debate
over the consequences, but this is a very different issue than
concentration.

>> I am more concerned about the loss of privacy that seems to be 
>> occurring at the application layer via extensive tracking of users and 
>> sharing of user information, rather than my perception of what is now 
>> occurring at the network layer.
> A totally legitimate concern, but that line of argumentation sounds like whataboutism. Improvements in privacy with respect to the network do not drive privacy violations at the application layer.

What Martin says. The draft is supposedly about consolidation. There is
definitely a relation between concentration and privacy: if traffic gets
consolidated on a small number of big platforms, the owners of these
platforms see a lot of data and metadata, which affects privacy. But the
relation between that and end-to-end encryption is tenuous. For example,
Google was getting just as many cookies before web pages started being
sent over HTTPS. The differences is that before encryption other actors
were also able to read these cookies. That was hardly a better privacy
posture.

-- Christian Huitema