Re: For discussion: scope for AltSvc and ORIGIN bis efforts

Daniel Stenberg <daniel@haxx.se> Thu, 05 November 2020 09:22 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10E683A121E for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 5 Nov 2020 01:22:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.649
X-Spam-Level:
X-Spam-Status: No, score=-2.649 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.25, MAILING_LIST_MULTI=-1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zBru8wIUdYQj for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 5 Nov 2020 01:22:13 -0800 (PST)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E31E3A1186 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Thu, 5 Nov 2020 01:22:12 -0800 (PST)
Received: from lists by lyra.w3.org with local (Exim 4.92) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1kabQe-0005Ok-Nj for ietf-http-wg-dist@listhub.w3.org; Thu, 05 Nov 2020 09:19:36 +0000
Resent-Date: Thu, 05 Nov 2020 09:19:36 +0000
Resent-Message-Id: <E1kabQe-0005Ok-Nj@lyra.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by lyra.w3.org with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from <daniel@haxx.se>) id 1kabQd-0005Nw-GU for ietf-http-wg@listhub.w3.org; Thu, 05 Nov 2020 09:19:35 +0000
Received: from giant.haxx.se ([2a00:1a28:1200:9::2]) by titan.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from <daniel@haxx.se>) id 1kabQb-0000bV-D8 for ietf-http-wg@w3.org; Thu, 05 Nov 2020 09:19:35 +0000
Received: from giant.haxx.se (mail [127.0.0.1]) by giant.haxx.se (8.15.2/8.15.2/Debian-4) with ESMTPS id 0A59JDUt023865 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 5 Nov 2020 10:19:13 +0100
Received: from localhost (dast@localhost) by giant.haxx.se (8.15.2/8.15.2/Submit) with ESMTP id 0A59JDEe023861; Thu, 5 Nov 2020 10:19:13 +0100
X-Authentication-Warning: giant.haxx.se: dast owned process doing -bs
Date: Thu, 05 Nov 2020 10:19:13 +0100
From: Daniel Stenberg <daniel@haxx.se>
X-X-Sender: dast@giant.haxx.se
To: Mark Nottingham <mnot@mnot.net>
cc: HTTP Working Group <ietf-http-wg@w3.org>, Tommy Pauly <tpauly@apple.com>
In-Reply-To: <BBA5F9B9-7788-41DA-853E-FADD7EF20B24@mnot.net>
Message-ID: <alpine.DEB.2.20.2011051010300.17511@tvnag.unkk.fr>
References: <BBA5F9B9-7788-41DA-853E-FADD7EF20B24@mnot.net>
User-Agent: Alpine 2.20 (DEB 67 2015-01-07)
X-fromdanielhimself: yes
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Received-SPF: pass client-ip=2a00:1a28:1200:9::2; envelope-from=daniel@haxx.se; helo=giant.haxx.se
X-W3C-Hub-Spam-Status: No, score=-6.2
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1kabQb-0000bV-D8 2d6a263c6aad3df3b057a8e5fe2ec399
X-Original-To: ietf-http-wg@w3.org
Subject: Re: For discussion: scope for AltSvc and ORIGIN bis efforts
Archived-At: <https://www.w3.org/mid/alpine.DEB.2.20.2011051010300.17511@tvnag.unkk.fr>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/38171
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On Thu, 5 Nov 2020, Mark Nottingham wrote:

> Comments on this scope -- including proposals for additions -- are welcome; 
> we'll issue a Call for Adoption if we can get to a general agreement about 
> that.

For Alt-Svc, there's this little issue I've run into when playing with it for 
HTTP/3. Not sure what to do about it, but it feels like a good time to mention 
it as it is rather annoying.

Alt-Used (RFC 7838 section 5) is a request header that only sends host name + 
port number, with no hint if that port number is TCP or UDP (or ALPN name), 
which makes at least one large HTTP/3 deployment trigger its Alt-Svc loop 
detection when only swithing protocols to h3.

IOW: If we get an Alt-Svc back that says try h3 on the same host on the same 
port that we just did h1 or h2 against.

It also makes me wonder if other clients are actually not using this header or 
how have you avoided this issue?

-- 

  / daniel.haxx.se