Re: [Captive-portals] I-D Action: draft-ietf-capport-api-00.txt

David Bird <dbird@google.com> Tue, 06 February 2018 14:37 UTC

Return-Path: <dbird@google.com>
X-Original-To: captive-portals@ietfa.amsl.com
Delivered-To: captive-portals@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70AE512E052 for <captive-portals@ietfa.amsl.com>; Tue, 6 Feb 2018 06:37:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level:
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DxpecJZ7MhqB for <captive-portals@ietfa.amsl.com>; Tue, 6 Feb 2018 06:37:44 -0800 (PST)
Received: from mail-it0-x22b.google.com (mail-it0-x22b.google.com [IPv6:2607:f8b0:4001:c0b::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8496B12D7EC for <captive-portals@ietf.org>; Tue, 6 Feb 2018 06:37:44 -0800 (PST)
Received: by mail-it0-x22b.google.com with SMTP id p139so2766389itb.1 for <captive-portals@ietf.org>; Tue, 06 Feb 2018 06:37:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=nWbcbHHdJ0lF/qjyK6EOd3peyUzwkdYWn2ypRHJ4tWY=; b=v0dpksoFwp3ca1fTIEw+GUrhruVwHL0XW5DMqey27WFhX7vYpKgq/EtN4/cMhtTAq5 c7JePeZtiAFXQqVngqqRxBJepqHNWdCE/Lp1oReTAfjS45MzKmYT1sZU9dd0259aFC1/ zLm8pxL0fNXalA1cf4tcyqrTtytaSWo9MYjKo4xvivigQaKTeUr2LPCzgpqVgY/1BH8z 7D0PUQUCyu7Fw2hEzUggoMKt2GmoQqV40aJVOadtd1/ruYkdlTa0xDzri6jEVQ87iMPI 8HyBq4R5hsXdwMo/93NMcPu0R8pU9Q0rZYljbRZbSyHC/sS10i9HS48gVdWrQdV9geYo pbXQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=nWbcbHHdJ0lF/qjyK6EOd3peyUzwkdYWn2ypRHJ4tWY=; b=A+ps8Iejw+cE9CIXhR4CzwtYLa0htz9ABZW4Enu30PSVY1COzu2QbH2gan/HJj93x0 zpLWU4Fed0zVvnc3okP2xWpPQvhwS2pmHZRNeZXYjflr6nsHsgYQ3/8HE/OxMDL8DIk7 2Xd+VkQWNo7nEunnwzGU+M6FcC3TMqBoEHVMTNV9LuEmuFehfuESTyHeWGIy+nsB8+N1 U6WYAjtnQU/FlfBv5v4g+o6qE3hM5cZl4+UhWcfbGZLF67S7aHfH3zoEP4bsjBmaXVs3 emLmdas7oHR762ySdqaEAiVKY4ZAiQF/7EGrg94zIsGOkPq6O7hlnbdFE5UQDYAg85YZ TcXA==
X-Gm-Message-State: APf1xPDWFOuJROO8h7sWnS73mCcDpCEcpWxQZFPKQ+5ZbsLwAf+WbG8y fOWAenPukFlXfcp9LomxeksV0iD0LPaq+vB+TW885dsa
X-Google-Smtp-Source: AH8x227iLKw0lCOa1maMN2PuNQ4yLGy5ZPivgpqUmp145Sr7v9RJ+YGm+DrBtPjk9RnkTCKuRAvmCszR1TtcqD1+UFI=
X-Received: by 10.36.20.145 with SMTP id 139mr3257165itg.15.1517927863386; Tue, 06 Feb 2018 06:37:43 -0800 (PST)
MIME-Version: 1.0
Received: by 10.2.137.229 with HTTP; Tue, 6 Feb 2018 06:37:42 -0800 (PST)
In-Reply-To: <CAKD1Yr39abK5U18tz-B2c3qyaTdHLU3QiFF9r1Lzqap1nsvJiw@mail.gmail.com>
References: <151778535115.5816.386541967960931391@ietfa.amsl.com> <CADo9JyV2Rz2B9H_h9JMne7XLtMeVb2OajheZ86i5g8nsPmmFOw@mail.gmail.com> <CABkgnnW_x6sokdEo-yyzk0DKFqom6b7aHpoLgRnBHOW_cGB6yA@mail.gmail.com> <CADo9JyXRtyuzoWJKA+aASGh-bEJ8hi323VRdBeyqsgXwNxSkbw@mail.gmail.com> <CADo9JyVtKMCwcXsZgfNSJ8VshjaTxSPS7YWro71Z4Y7K4UWFxA@mail.gmail.com> <CABkgnnX2iQwDR_zgk15OQSCWh1pJBrJRvTwmEHbvsecaoQOuow@mail.gmail.com> <CADo9JyWyv=d9osYiRRAG4cav6zGbS4imstV0TJcP4fbTaYamUg@mail.gmail.com> <CAKD1Yr39abK5U18tz-B2c3qyaTdHLU3QiFF9r1Lzqap1nsvJiw@mail.gmail.com>
From: David Bird <dbird@google.com>
Date: Tue, 06 Feb 2018 06:37:42 -0800
Message-ID: <CADo9JyWD3K7R1FahFNuCXT1MVKAF9iL1OiGzM4haBygBy=13Hg@mail.gmail.com>
To: Lorenzo Colitti <lorenzo@google.com>
Cc: Martin Thomson <martin.thomson@gmail.com>, captive-portals@ietf.org
Content-Type: multipart/alternative; boundary="001a1143e54c18555b05648c1fec"
Archived-At: <https://mailarchive.ietf.org/arch/msg/captive-portals/tyHryMafT7nDNH_uOtVMJ9JE0bU>
Subject: Re: [Captive-portals] I-D Action: draft-ietf-capport-api-00.txt
X-BeenThere: captive-portals@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussion of issues related to captive portals <captive-portals.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/captive-portals/>
List-Post: <mailto:captive-portals@ietf.org>
List-Help: <mailto:captive-portals-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Feb 2018 14:37:46 -0000

On Mon, Feb 5, 2018 at 8:40 PM, Lorenzo Colitti <lorenzo@google.com> wrote:
>
> You're splitting hairs here. The UE does not ban applications from using
> the captive network in the sense that applications can choose to use it if
> they wish to. One notable use case is applications whose goal is to log
> into captive portals automatically by leveraging existing credentials. So
> Martin's original statement could be worded as "UE vendors express a strong
> desire to be able to know about status before they inflict the network on
> apps that want Internet access".
>

Just a quick reminder that not only multi-network mobile phones use WiFi
hotspots...

My question is... how does an App know if it wants to use the network or
not? Even if there is a captive portal, maybe the App in question will work
just fine within the walled garden. Indeed, maybe the system OS might use
the walled garden (*free!*) resources for an OS upgrade download. I don't
see how the UE or App can really know if any network is suitable for any
application, in the general sense, irrespective of captive portals. What we
(generally) need is some magic in multi-homed devices that helps Apps find
the best (cheapest/fasted) network for them to run in -- but that is for
another working group. I know this is rather idealistic :-)

What I am concerned about is forming the protocols for capport around the
current design / implementation limitations for multi-homed networked
devices..

[Hypothetical UE design: When the user opt into a network, the default
route is moved over. As apps use the network, they may generate ICMP
notifications which prompt API queries and the App(s) in question being
restarted pinned to the existing known good network (perhaps with a captive
portal dialog in there somewhere). The same could  be done for App(s)
otherwise not getting network responses (e.g. routing or capacity problems,
etc).]