Re: [arch-d] FYI: closure of the IAB Stack Evolution program

Tommy Pauly <tpauly@apple.com> Fri, 23 August 2019 15:08 UTC

Return-Path: <tpauly@apple.com>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9945120046 for <architecture-discuss@ietfa.amsl.com>; Fri, 23 Aug 2019 08:08:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m-D1q1IJzsMz for <architecture-discuss@ietfa.amsl.com>; Fri, 23 Aug 2019 08:08:05 -0700 (PDT)
Received: from nwk-aaemail-lapp02.apple.com (nwk-aaemail-lapp02.apple.com [17.151.62.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7FEA612004A for <architecture-discuss@iab.org>; Fri, 23 Aug 2019 08:08:05 -0700 (PDT)
Received: from pps.filterd (nwk-aaemail-lapp02.apple.com [127.0.0.1]) by nwk-aaemail-lapp02.apple.com (8.16.0.27/8.16.0.27) with SMTP id x7NF1sMm009460; Fri, 23 Aug 2019 08:08:04 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=sender : content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=20180706; bh=nFBOilosqsnEgoSvHf4S/5lUjDukPg1a8Rf8AYUsAgQ=; b=X1bvceVao+pum0lgEODBBC1CnXX8atJ2M0c7OnWgQ0IIbDPPJedWCPWl9b/Yx40o+iJQ BNoj24VwtjB9WWGynwCQsxsFKixP2JrBWq71FQPM/q7eXFnG1fyoSPSD7PHjGmKilr4q WtD2YG9j21Ox/ePmpWkOskGAGRrgH3SHIXgBYcRSoRFP2orzn2gfSs3f1VD5/AlXVsk1 bzD/YddATILumwebRpBkRDKQMR3gHvKZI9EKdDv65AmxAJ95vI1IQZfRRx4lfAvc4COt Q5OlCV5b7FwdA8iFbstuM8W80qphddo1NO5LIJgZ6BDyBb0X3OsCdpgLzSrKQNIV+EhB xQ==
Received: from ma1-mtap-s03.corp.apple.com (ma1-mtap-s03.corp.apple.com [17.40.76.7]) by nwk-aaemail-lapp02.apple.com with ESMTP id 2uee5xg8g4-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Fri, 23 Aug 2019 08:08:04 -0700
Received: from nwk-mmpp-sz12.apple.com (nwk-mmpp-sz12.apple.com [17.128.115.204]) by ma1-mtap-s03.corp.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPS id <0PWP0090V3DF2Q50@ma1-mtap-s03.corp.apple.com>; Fri, 23 Aug 2019 08:08:04 -0700 (PDT)
Received: from process_milters-daemon.nwk-mmpp-sz12.apple.com by nwk-mmpp-sz12.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) id <0PWP00C00366A300@nwk-mmpp-sz12.apple.com>; Fri, 23 Aug 2019 08:08:03 -0700 (PDT)
X-Va-A:
X-Va-T-CD: ca59bed23df3f788d3f801d0abd3820b
X-Va-E-CD: dd1afc614a39dd0ea07087a02e889714
X-Va-R-CD: a76eefe8fdf227aa1290bbd803b8d89a
X-Va-CD: 0
X-Va-ID: c388ee3d-bc85-483c-9a47-a86ac43e3b98
X-V-A:
X-V-T-CD: ca59bed23df3f788d3f801d0abd3820b
X-V-E-CD: dd1afc614a39dd0ea07087a02e889714
X-V-R-CD: a76eefe8fdf227aa1290bbd803b8d89a
X-V-CD: 0
X-V-ID: 35f14bec-5ce9-4c01-a0b5-86114ff84d31
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-08-23_06:,, signatures=0
Received: from [17.234.47.92] by nwk-mmpp-sz12.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPSA id <0PWP00M1Z3D2SY00@nwk-mmpp-sz12.apple.com>; Fri, 23 Aug 2019 08:08:03 -0700 (PDT)
Sender: tpauly@apple.com
Content-type: text/plain; charset="us-ascii"
MIME-version: 1.0 (Mac OS X Mail 12.4 \(3445.104.2\))
From: Tommy Pauly <tpauly@apple.com>
In-reply-to: <cece8133-6b69-a677-52fc-a7fb4c7d5136@si6networks.com>
Date: Fri, 23 Aug 2019 08:07:44 -0700
Cc: "Brian Trammell (IETF)" <ietf@trammell.ch>, architecture-discuss@iab.org
Content-transfer-encoding: quoted-printable
Message-id: <64E3A59C-8709-41E0-B74F-C036E4481AE4@apple.com>
References: <B5A0F4E0-D437-4DF9-9918-C35627A8CADC@trammell.ch> <d5009253-4884-9f1f-66e7-1159e85524b9@si6networks.com> <770822F2-688F-44EA-A6A1-7E7EDBFAA989@trammell.ch> <cece8133-6b69-a677-52fc-a7fb4c7d5136@si6networks.com>
To: Fernando Gont <fgont@si6networks.com>
X-Mailer: Apple Mail (2.3445.104.2)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-08-23_06:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/s9wxwbl3cucWJji8lsSPa8yQzV4>
Subject: Re: [arch-d] FYI: closure of the IAB Stack Evolution program
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Aug 2019 15:08:08 -0000


> On Aug 23, 2019, at 4:27 AM, Fernando Gont <fgont@si6networks.com> wrote:
> 
> On 23/8/19 13:19, Brian Trammell (IETF) wrote:
> [....]
>>>> 
>>>> That has changed. QUIC has demonstrated that it is possible to
>>>> deploy a new transport protocol at scale, and the QUIC WG has
>>>> nearly finished an IETF standard version of that protocol.
>>> 
>>> I'm certainly not much of a QUIC expert, but... isn't QUIC tunneled
>>> over UDP?
>>> 
>>> If so, then deployment of QUIC doesn't prove that it's possible to 
>>> deploy new transport protocols in the big-I Internet. Actually,
>>> the decission to make QUIC run over UDP would seem to me quite the
>>> opposite: that you cannot deploy a new transport prootocol
>>> natively, and thus need to tunnel it on something that actually is
>>> known to work (TCP or UDP).
>> 
>> This is a well known discussion rabbithole, but.. no, QUIC is not
>> tunneled over UDP, it uses a UDP header as an encapsulation but is a
>> distinct transport protocol on its own.
> 
> Yes, you are tunneling one transport protocol into another. You could
> have also tunneled on QUIC on top of TCP.

It may become clearer if we look at what elements make up the various protocols.

In a typical HTTP/2 stack, you would see the following (I'm simplifying, of course):

HTTP/2: Application stream multiplexing + message encoding
TLS: Encryption/authentication
TCP: Port demultiplexing + reliability + congestion control
IP: Addressing

With HTTP/3 (the one over QUIC), you would see the same roles divided up differently:

HTTP/3: Message encoding
QUIC: Application stream multiplexing + encryption/authentication + reliability + congestion control
UDP: Port demultiplexing
IP: Addressing

UDP alone is being used as a common way to encode port fields; it's not providing true transport functionality. Moving QUIC over TCP, on the other hand, is just like tunneling TCP over TCP, and comes with the many costs and caveats of multiple layers of reliability, congestion control, etc.

Thanks,
Tommy

> 
> 
> 
>> You're right that we can't
>> deploy new *headers* in the Internet because of middleboxes, but a
>> key insight behind QUIC is that you can run a new protocol over old
>> headers.
> 
> I guess I'm missing something here, but: isn't this the sort of thing we
> have been doing for ages? e.g., we tunnel IPsec over UDP (e.g. RFC3948)
> because of middleboxes, and I seem to remember being told that SCTP is
> also run at times over UDP.
> 
> (at times we even go up even one more layer, and tunnel over HTTPS, when
> that's the only thing that works).
> 
> 
>> I would argue that thinking of UDP as a transport protocol is itself
>> a mistake; it is a UNIX sockets model friendly way to allow
>> applications to access an IP datagram service in a multiuser
>> environment. But I think I'm in the minority there.
> 
> What would be the rationale for not considering UDP a transport protocol
> -- albeit one providing unreliable service?
> 
> 
> Thanks,
> -- 
> Fernando Gont
> SI6 Networks
> e-mail: fgont@si6networks.com
> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
> 
> 
> 
> 
> _______________________________________________
> Architecture-discuss mailing list
> Architecture-discuss@ietf.org
> https://www.ietf.org/mailman/listinfo/architecture-discuss