Re: New Version Notification for draft-momoka-httpbis-settings-enable-websockets-00.txt

Lucas Pardue <lucaspardue.24.7@gmail.com> Tue, 28 February 2023 17:25 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB6E8C14EB18 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 28 Feb 2023 09:25:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.747
X-Spam-Level:
X-Spam-Status: No, score=-7.747 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kBfiXkPX3A6F for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 28 Feb 2023 09:25:20 -0800 (PST)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 05446C14E511 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Tue, 28 Feb 2023 09:25:19 -0800 (PST)
Received: from lists by lyra.w3.org with local (Exim 4.94.2) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1pX3it-004HvK-Su for ietf-http-wg-dist@listhub.w3.org; Tue, 28 Feb 2023 17:25:07 +0000
Resent-Date: Tue, 28 Feb 2023 17:25:07 +0000
Resent-Message-Id: <E1pX3it-004HvK-Su@lyra.w3.org>
Received: from mimas.w3.org ([128.30.52.79]) by lyra.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <lucaspardue.24.7@gmail.com>) id 1pX3ir-004Hu2-B4 for ietf-http-wg@listhub.w3.org; Tue, 28 Feb 2023 17:25:05 +0000
Received: from mail-ot1-x32d.google.com ([2607:f8b0:4864:20::32d]) by mimas.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from <lucaspardue.24.7@gmail.com>) id 1pX3iq-00EdOX-5q for ietf-http-wg@w3.org; Tue, 28 Feb 2023 17:25:05 +0000
Received: by mail-ot1-x32d.google.com with SMTP id e18-20020a0568301e5200b00690e6abbf3fso5978445otj.13 for <ietf-http-wg@w3.org>; Tue, 28 Feb 2023 09:25:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=lbqw1koXpJi5pNDCPJ9AuQfFq/FTg+Vy+KkA3h5HQek=; b=K4Zt2GBalitUWk3EaYHcQvQXUwGB/kgL0POmuoBa+lbRezTrTRwm+bRAWzdlHs+UV8 i1IUm3wm+4hAFEDrfNHU2NZ1ddXDCOL1Zrmh6dR2IjxvLQifIHGr+0et9dBesPaqJ8BU kRfBN5E65Qwm0Og9I08UZYjJc2qASwexCl//naMHXGcIadKQESUUnMuKlCAb0C3Hx2/Q PASOO7fd6R55fGMnEz16s+VxsN8g6PVRytXAt8dO0Pfocl/Sp0VqR5zhgXCKhTmNGuJ7 pUFJSoeuYkgtYxIYb5QOmjgY/L/Y7KZPn7B0xVSjoxcMC4rnRPi98XAwnPy8z7SVulzy q3cw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=lbqw1koXpJi5pNDCPJ9AuQfFq/FTg+Vy+KkA3h5HQek=; b=RtPlDD4gCNNXDJK98axaeauZHXP6IuNyQXTbwWXuJbAFet5C14GH5LtpHANWA3TuGx qMz2Ipx+hzEQ5mx1QAXLa9IGU9QZx/XAAXLGeLTpIJK+t+79Rc0shHyDd/VfEiKaMgp+ soaO3feyDb7f+os03e+k0ldVcIqlcBT3vMGpeH/gD1WxgoNfYRlSiEJbnEAgbOZgNG+Q +fA5EAvhPZzuAqqmSJ6goOGMcjaTxUnZrKfy58/L9E51mG2rAEo9b2pegViUPKkp4RWe XSr91vGdFwmjCjFQPAP8nHpA5jl1cwVoTKhPKHtS/k+1q8g5JNPGKE3hbjeHhCPPyET3 sobw==
X-Gm-Message-State: AO0yUKUUIWnVqfOsSM7t3ZvXjBXCkhZ+bYZROK+33jSf2lNuVFUwwjMk 0zCK74WgI/fKAfTOQ74JLh7wRT9snW2+bNfyG3I=
X-Google-Smtp-Source: AK7set94twwgj4PqoKbzSl3wGmRocO5ljGEKnc/Es+Oe2AphizL7voEwkibNbXAJ4gKGfLGx1V4rqjJVzTX0/LZLlks=
X-Received: by 2002:a05:6830:6505:b0:693:c7e4:f9e2 with SMTP id cm5-20020a056830650500b00693c7e4f9e2mr6714924otb.0.1677605093086; Tue, 28 Feb 2023 09:24:53 -0800 (PST)
MIME-Version: 1.0
References: <CAHbrMsDSFRHQhciZM6PYNL=qoWAK8N-g+Pd39NngBKxag62wpA@mail.gmail.com> <CALGR9oYmYid=0pMW5tCLpE1GFdz1hgTL0Vy6HDjYBSNZC1WP3A@mail.gmail.com> <CAHbrMsDKrDf7v4DLHnHUnRCK2ABZ_ZMfGy4_2PAz+g=2RhDNHQ@mail.gmail.com> <CALGR9obABt+cL2Cafkt_x9fRvu9BTD+tZmPGF7-SaDeaNYvBhA@mail.gmail.com> <CAHbrMsB2a-9U_f+AFq5L9PmQzquc=wdEWcYoR8UyN4H=LiaBzQ@mail.gmail.com> <CAD9w2qaGEG96hDrGEadMSRE+Kxr-DzuThyMmShBzjzmBarC_Jg@mail.gmail.com> <CAHbrMsBT3DQJe8jvxmpt8TPW4jhttOLkQmco9+_FpZfGUJxCRw@mail.gmail.com> <CALGR9oZfiura=WnVVX47YZx-TFY_6xvK8PckS5cXY325a859AA@mail.gmail.com> <CAD9w2qajqHy+JbSPGKUjfPL0Bh94CaOyNn=iRouBS1PWRUBZkA@mail.gmail.com> <CAD9w2qYW=aV-m+FdY2X1J1933WgiDjDs02uMgq2w1i1NCK4PqA@mail.gmail.com> <Y/4zvq81+pE0UBl7@xps13>
In-Reply-To: <Y/4zvq81+pE0UBl7@xps13>
From: Lucas Pardue <lucaspardue.24.7@gmail.com>
Date: Tue, 28 Feb 2023 17:24:41 +0000
Message-ID: <CALGR9oZYkMAT1r=ngeDujbE8pFRoDfG0qe=Y4YhvNiZjzBmLeg@mail.gmail.com>
To: Glenn Strauss <gs-lists-ietf-http-wg@gluelogic.com>
Cc: Momoka Yamamoto <momoka.my6@gmail.com>, Ben Schwartz <bemasc@google.com>, ietf-http-wg@w3.org
Content-Type: multipart/alternative; boundary="000000000000a59e5005f5c5df82"
Received-SPF: pass client-ip=2607:f8b0:4864:20::32d; envelope-from=lucaspardue.24.7@gmail.com; helo=mail-ot1-x32d.google.com
X-W3C-Hub-DKIM-Status: validation passed: (address=lucaspardue.24.7@gmail.com domain=gmail.com), signature is good
X-W3C-Hub-Spam-Status: No, score=-4.8
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, W3C_AA=-1, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: mimas.w3.org 1pX3iq-00EdOX-5q 12801a8762b31f4318566ffa479f7676
X-Original-To: ietf-http-wg@w3.org
Subject: Re: New Version Notification for draft-momoka-httpbis-settings-enable-websockets-00.txt
Archived-At: <https://www.w3.org/mid/CALGR9oZYkMAT1r=ngeDujbE8pFRoDfG0qe=Y4YhvNiZjzBmLeg@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/50788
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Hey Glenn,



On Tue, Feb 28, 2023 at 5:03 PM Glenn Strauss <
gs-lists-ietf-http-wg@gluelogic.com> wrote:

> On Tue, Feb 28, 2023 at 04:12:21PM +0800, Momoka Yamamoto wrote:
> > Hello,
> > I have submitted a new revision of this
> > draft draft-momoka-httpbis-settings-enable-websockets.
> > > URL:
> > >
> https://www.ietf.org/archive/id/draft-momoka-httpbis-settings-enable-websockets-01.txt
>
> Why should SETTINGS_ENABLE_WEBSOCKETS be added to HTTP/2, HTTP/3, HTTP/X
> protocols instead of using existing service discovery mechanisms such as
> alt-svc or the proposed alt-svcb?
>
> https://martinthomson.github.io/alt-svcb/draft-thomson-httpbis-alt-svcb.html


The service discovery is decoupled from the service. This means the client
has to take a gamble that out-of-band information is in agreement with the
active connection. Settings are a means to discover the features of the
service's active connection.

As discussed upthread, there are other proposals that could put this
information in e.g. the DNS. That might help address other problems but is
separate from this proposal.


>
>
> There is already SETTINGS_ENABLE_CONNECT_PROTOCOL and the proposed
> SETTINGS_ENABLE_WEBSOCKETS would be a specific subset of that.
> While websockets is important to many apps, is this subset important
> enough to add its own setting to multiple HTTP protocol versions and
> to be advertised as part of every single HTTP/2 and HTTP/3 request?
>

SETTINGS_ENABLE_CONNECT_PROTOTCOL enables the use of the ":protocol:
psuedo-header, that's it. This field can contain many vaules, so using it
as a signal that the server supports ":protocol: websocket" is a gamble.
The gamble potentially gets worse as more protocols get defined and get
deployed across the range of HTTP/2 and HTTP/3 protocls: see connect-udp,
connect-ip and webtransport.

Might there be settings created for other protocols that leverage
> SETTINGS_ENABLE_CONNECT_PROTOCOL?  Why should a new SETTING be created
> for websockets and not for ... ?
>

Yes, this is already the case for WebTransport over HTTP/2 [1] and
WebTransport over HTTP/3 [2], which define a SETTINGS_ENABLE_WEBTRANSPORT.
So adding a setting explicitly for WebSocket would make things consistent.

Cheers
Lucas

[1] -
https://www.ietf.org/archive/id/draft-ietf-webtrans-http2-04.html#section-3.2
[2] -
https://www.ietf.org/archive/id/draft-ietf-webtrans-http3-04.html#section-3.1