RE: Feedback on Fallback

Mike Bishop <Michael.Bishop@microsoft.com> Mon, 22 September 2014 19:28 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1FC31A1BEE for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 22 Sep 2014 12:28:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.287
X-Spam-Level:
X-Spam-Status: No, score=-6.287 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.786, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ilVmtXszma1n for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 22 Sep 2014 12:28:05 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 24BD91A1BC7 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 22 Sep 2014 12:28:05 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1XW9Ez-0001uH-To for ietf-http-wg-dist@listhub.w3.org; Mon, 22 Sep 2014 19:25:41 +0000
Resent-Date: Mon, 22 Sep 2014 19:25:41 +0000
Resent-Message-Id: <E1XW9Ez-0001uH-To@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <Michael.Bishop@microsoft.com>) id 1XW9Ed-0001sJ-D5 for ietf-http-wg@listhub.w3.org; Mon, 22 Sep 2014 19:25:19 +0000
Received: from mail-bl2on0134.outbound.protection.outlook.com ([65.55.169.134] helo=na01-bl2-obe.outbound.protection.outlook.com) by maggie.w3.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from <Michael.Bishop@microsoft.com>) id 1XW9Ea-0002lJ-3Q for ietf-http-wg@w3.org; Mon, 22 Sep 2014 19:25:19 +0000
Received: from BL2PR03MB132.namprd03.prod.outlook.com (10.255.230.24) by BL2PR03MB130.namprd03.prod.outlook.com (10.255.230.21) with Microsoft SMTP Server (TLS) id 15.0.1034.13; Mon, 22 Sep 2014 19:24:48 +0000
Received: from BL2PR03MB132.namprd03.prod.outlook.com ([169.254.9.126]) by BL2PR03MB132.namprd03.prod.outlook.com ([169.254.9.126]) with mapi id 15.00.1034.003; Mon, 22 Sep 2014 19:24:49 +0000
From: Mike Bishop <Michael.Bishop@microsoft.com>
To: HTTP Working Group <ietf-http-wg@w3.org>
Thread-Topic: Feedback on Fallback
Thread-Index: Ac+4EKcMsRBYwrwPRqiO9BW4OtDgTgeiItFw
Date: Mon, 22 Sep 2014 19:24:48 +0000
Message-ID: <152c2ec3edb04e048252116634915828@BL2PR03MB132.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [2001:4898:80e8:ee31::2]
x-microsoft-antispam: BCL:0;PCL:0;RULEID:;SRVR:BL2PR03MB130;
x-forefront-prvs: 034215E98F
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(377454003)(199003)(189002)(2656002)(16236675004)(19625215002)(92566001)(99286002)(101416001)(15202345003)(21056001)(97736003)(120916001)(86612001)(90102001)(87936001)(107046002)(107886001)(79102003)(95666004)(33646002)(74662003)(80022003)(105586002)(110136001)(86362001)(85306004)(77096002)(76576001)(46102003)(31966008)(50986999)(54356999)(108616004)(77982003)(74502003)(76482002)(99396002)(20776003)(81542003)(19300405004)(64706001)(74316001)(15975445006)(19580395003)(4396001)(19617315012)(85852003)(106356001)(83322001)(81342003)(83072002)(3826002)(24736002); DIR:OUT; SFP:1102; SCL:1; SRVR:BL2PR03MB130; H:BL2PR03MB132.namprd03.prod.outlook.com; FPR:; MLV:sfv; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
Content-Type: multipart/alternative; boundary="_000_152c2ec3edb04e048252116634915828BL2PR03MB132namprd03pro_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.onmicrosoft.com
Received-SPF: pass client-ip=65.55.169.134; envelope-from=Michael.Bishop@microsoft.com; helo=na01-bl2-obe.outbound.protection.outlook.com
X-W3C-Hub-Spam-Status: No, score=-3.1
X-W3C-Hub-Spam-Report: AWL=-3.130, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001
X-W3C-Scan-Sig: maggie.w3.org 1XW9Ea-0002lJ-3Q 80792acf4fe3f2c05ab5827318446a5a
X-Original-To: ietf-http-wg@w3.org
Subject: RE: Feedback on Fallback
Archived-At: <http://www.w3.org/mid/152c2ec3edb04e048252116634915828@BL2PR03MB132.namprd03.prod.outlook.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/27151
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Just to recap this suggestion, we're not suggesting that any class of traffic should be bulk-relegated to HTTP/1.1 - we're suggesting the addition of a widely-recognized error code to smooth transitions.  Burning a round-trip isn't ideal, but it's a mitigation strategy for limitations on either the client or the server.  In particular, a later thread (http://lists.w3.org/Archives/Public/ietf-http-wg/2014JulSep/1894.html) raised the use of such an error code in a GOAWAY as a good hard-coded response to a client that attempts to connect with prior knowledge and gets it wrong.  A server that's aware of HTTP/2 but doesn't support it can generate an appropriate GOAWAY and close the connection.

I submitted a pull request adding the error code at https://github.com/http2/http2-spec/pull/599 -- are there any comments on this change or is this editor-ready?

From: Mike Bishop
Sent: Thursday, August 14, 2014 3:56 PM
To: HTTP Working Group
Subject: Feedback on Fallback

Going into WGLC, we committed to implementations and taking changes based solely on implementation experience and real-world data.  Based on our experience so far, Microsoft's first piece of WGLC feedback is to replace Mark's Over-Version draft<http://tools.ietf.org/html/draft-nottingham-http-over-version-00> with an error code in the spec.  Our reasoning follows.

As we continue to work on HTTP/2, one item that has come up repeatedly is the need to force clients back to HTTP/1.1 for various reasons.  We've all pushed hard against bulk-relegating any class of HTTP usage into the "They should just use 1.1" bucket, but it's becoming clear that there will occasionally be situations where a server needs a client to fall back.

Some apps we support depend on the ability to emit raw HTTP protocol text.  Others require client certs as a matter of local law and we don't have a way to retrieve the client cert without renegotiation.  Others are strictly situational, features that require adaptation work we haven't gotten to yet.

These assorted situations motivated the Over-Version draft which Mark published after the NYC Interim.  505 was already defined as meaning the server was unable/unwilling to use the current HTTP version to serve the request the client made; Mark's draft added semantics to inform a client what version would be acceptable, if any, so that an intelligent client could transparently retry over the correct HTTP version (be it 1.1 or 3.5).

We've found a couple limitations with this approach:

*         As Jeff pointed out in NYC, returning a 5XX looks bad in server logs.  This isn't actually a server "failure" per se, we just used it because the status code already exists in the 5XX range.  Not a technical issue, but definitely an operational one.  (Jeff noted in NYC that there are other 5XX status codes that Twitter non-standardly recasts in other ranges for this reason.  New 4XX and 3XX codes were proposed as part of this discussion, demonstrating that the concept doesn't bucket well as a status code.)

*         Once the HEADERS frame with :status is sent, we're locked in to that response.  You can't subsequently change the :status to 505.  Some of these situations can occur when the response is partially-generated, which leaves us stuck unless we buffer all responses until they're complete (unacceptable for perf).

*         Because Over-Version is optional, clients are not guaranteed to support it.  An unsupporting client will just retry the same request over HTTP/2 again and never be able to obtain an actual response from the server.  Including a response body with the 505 telling clients to turn off HTTP/2 in their browser is definitely not a direction we want to go in these situations, and I don't expect clients to have a "turn off HTTP/2 for this request only" button.

On the other hand, a new error code doesn't suffer from these issues.  A RST_STREAM can be sent at any point and doesn't necessarily confuse existing heuristics.  A GOAWAY with the same error code provides a clean way for the server to transition a client to HTTP/1.1 entirely, if necessary.  If it's in the base spec, we can be assured that any client will be able to understand it and respond appropriately.

Thus, we think an "HTTP/1.1 Required" error code will be a better option than proceeding with the Over-Version draft.