Re: New Version Notification for draft-momoka-httpbis-settings-enable-websockets-00.txt

Lucas Pardue <lucaspardue.24.7@gmail.com> Tue, 28 February 2023 18:18 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 322B3C151B08 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 28 Feb 2023 10:18:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.748
X-Spam-Level:
X-Spam-Status: No, score=-7.748 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LAGrmg9W4j37 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 28 Feb 2023 10:18:20 -0800 (PST)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 753AFC14CE3B for <httpbisa-archive-bis2Juki@lists.ietf.org>; Tue, 28 Feb 2023 10:18:19 -0800 (PST)
Received: from lists by lyra.w3.org with local (Exim 4.94.2) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1pX4YC-004RXv-Ej for ietf-http-wg-dist@listhub.w3.org; Tue, 28 Feb 2023 18:18:08 +0000
Resent-Date: Tue, 28 Feb 2023 18:18:08 +0000
Resent-Message-Id: <E1pX4YC-004RXv-Ej@lyra.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by lyra.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <lucaspardue.24.7@gmail.com>) id 1pX4Y9-004RSq-Pr for ietf-http-wg@listhub.w3.org; Tue, 28 Feb 2023 18:18:06 +0000
Received: from mail-ot1-x336.google.com ([2607:f8b0:4864:20::336]) by titan.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from <lucaspardue.24.7@gmail.com>) id 1pX4Y6-0047TN-P1 for ietf-http-wg@w3.org; Tue, 28 Feb 2023 18:18:06 +0000
Received: by mail-ot1-x336.google.com with SMTP id r23-20020a05683001d700b00690eb18529fso6123068ota.1 for <ietf-http-wg@w3.org>; Tue, 28 Feb 2023 10:18:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Y/zqNCN+q5yFUy4FWLRiq8u+tn7ssaiQsfpRm1p3Q38=; b=HKjKEgKERJPkrVzx4YOUumkhW/kVDFyHvKlQlj5ToHZS+KP7+h9VEs+1IpfTI1kl7+ Thj2xZNg7x1hi/QZPevmp2PT2JkRXIVYmGEJ63x1n4rc5FCaAYFjY17uW4OLRhEx0g3x a9cBmZjupiLPFxXrkRXa9Nu5BDi9YBAeINGU2B+8xhS2M93swjhOg2X4u4bnlZ+3Rwhz hulxVSjynRxIHpp+pwRtmdiQAKDFLJnJFF7IDMDFneR6ef9iFdNTFJHOhkmWeAWzg5+8 VSeLZ5e2Bqt9++TzLz8d+/2ed4i7OULP3yPXPkzD/Ybg/U6/AHdW5olnx/1Yhqf7ueFF 0M+A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Y/zqNCN+q5yFUy4FWLRiq8u+tn7ssaiQsfpRm1p3Q38=; b=1/eQAmTzYvA7J/Y1sJDxmNISnfwkui/oYuQtuiOrxzYmNU8fxvUKeub9eWdqQzwGWW K50RfF9D54NN2zbTID0VVfATkb+LS5b5GuBeKpaNh1yaGuiN8yv66kSUY89ffAT3Vjey 0jXG0fGFNbCY8cP0PFeB3ZxgAz2ET+vzRzV3LyPSsRxWGsIhiMI2arnXgbfmO07DtdpV OqFpM2cW5YqIuDwO+oEI0DEWz1CzZLRA3c/tAuCisKeKLcnlmiqUrHdMRAMQQLNSNriK 5KHYoz0WiDpoAld6TgI7GhGCkxwCtbwSU31JHV4mNZ6LVP9BQd8yI2w7XzNoUoNxRUWe t90g==
X-Gm-Message-State: AO0yUKX32l+Dx3Ek6h4+w3Tl4pXJSg3cOZDkLZer9VVEepjLv/qOUzdI F9IhmIOtpJnppwiEeec/k/D8rnl5iCiuUsY9v90=
X-Google-Smtp-Source: AK7set8svR7ByQaaSMIJhl0BJT5ISxyy3RGei6fvI/f/LQ/XDDGvzlZ7LzMEEaSL2VrDbgvj/MBZ0mtzz32WfapIR/A=
X-Received: by 2002:a9d:62a:0:b0:68d:4b7f:e993 with SMTP id 39-20020a9d062a000000b0068d4b7fe993mr1255231otn.3.1677608273640; Tue, 28 Feb 2023 10:17:53 -0800 (PST)
MIME-Version: 1.0
References: <CAHbrMsDKrDf7v4DLHnHUnRCK2ABZ_ZMfGy4_2PAz+g=2RhDNHQ@mail.gmail.com> <CALGR9obABt+cL2Cafkt_x9fRvu9BTD+tZmPGF7-SaDeaNYvBhA@mail.gmail.com> <CAHbrMsB2a-9U_f+AFq5L9PmQzquc=wdEWcYoR8UyN4H=LiaBzQ@mail.gmail.com> <CAD9w2qaGEG96hDrGEadMSRE+Kxr-DzuThyMmShBzjzmBarC_Jg@mail.gmail.com> <CAHbrMsBT3DQJe8jvxmpt8TPW4jhttOLkQmco9+_FpZfGUJxCRw@mail.gmail.com> <CALGR9oZfiura=WnVVX47YZx-TFY_6xvK8PckS5cXY325a859AA@mail.gmail.com> <CAD9w2qajqHy+JbSPGKUjfPL0Bh94CaOyNn=iRouBS1PWRUBZkA@mail.gmail.com> <CAD9w2qYW=aV-m+FdY2X1J1933WgiDjDs02uMgq2w1i1NCK4PqA@mail.gmail.com> <Y/4zvq81+pE0UBl7@xps13> <CALGR9oZYkMAT1r=ngeDujbE8pFRoDfG0qe=Y4YhvNiZjzBmLeg@mail.gmail.com> <Y/4+7+WEIx30mJnx@xps13>
In-Reply-To: <Y/4+7+WEIx30mJnx@xps13>
From: Lucas Pardue <lucaspardue.24.7@gmail.com>
Date: Tue, 28 Feb 2023 18:17:42 +0000
Message-ID: <CALGR9oYuGGDO1=icFxsM3f6tk_8bKcHFdLyE1_XBGDZ9G0Hc4A@mail.gmail.com>
To: Glenn Strauss <gs-lists-ietf-http-wg@gluelogic.com>
Cc: Momoka Yamamoto <momoka.my6@gmail.com>, Ben Schwartz <bemasc@google.com>, ietf-http-wg@w3.org
Content-Type: multipart/alternative; boundary="0000000000003900ff05f5c69da8"
Received-SPF: pass client-ip=2607:f8b0:4864:20::336; envelope-from=lucaspardue.24.7@gmail.com; helo=mail-ot1-x336.google.com
X-W3C-Hub-DKIM-Status: validation passed: (address=lucaspardue.24.7@gmail.com domain=gmail.com), signature is good
X-W3C-Hub-Spam-Status: No, score=-4.8
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, W3C_AA=-1, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1pX4Y6-0047TN-P1 7f554419a13ee50f4147fac91f1f960f
X-Original-To: ietf-http-wg@w3.org
Subject: Re: New Version Notification for draft-momoka-httpbis-settings-enable-websockets-00.txt
Archived-At: <https://www.w3.org/mid/CALGR9oYuGGDO1=icFxsM3f6tk_8bKcHFdLyE1_XBGDZ9G0Hc4A@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/50790
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Hey Glenn,



On Tue, Feb 28, 2023 at 5:50 PM Glenn Strauss <
gs-lists-ietf-http-wg@gluelogic.com> wrote:

> On Tue, Feb 28, 2023 at 05:24:41PM +0000, Lucas Pardue wrote:
> >
> > On Tue, Feb 28, 2023 at 5:03 PM Glenn Strauss <
> > gs-lists-ietf-http-wg@gluelogic.com> wrote:
> >
> > > On Tue, Feb 28, 2023 at 04:12:21PM +0800, Momoka Yamamoto wrote:
> > > > Hello,
> > > > I have submitted a new revision of this
> > > > draft draft-momoka-httpbis-settings-enable-websockets.
> > > > > URL:
> > > > >
> > >
> https://www.ietf.org/archive/id/draft-momoka-httpbis-settings-enable-websockets-01.txt
> > >
> > > Why should SETTINGS_ENABLE_WEBSOCKETS be added to HTTP/2, HTTP/3,
> HTTP/X
> > > protocols instead of using existing service discovery mechanisms such
> as
> > > alt-svc or the proposed alt-svcb?
> > >
> > >
> https://martinthomson.github.io/alt-svcb/draft-thomson-httpbis-alt-svcb.html
> >
> >
> > The service discovery is decoupled from the service. This means the
> client
> > has to take a gamble that out-of-band information is in agreement with
> the
> > active connection. Settings are a means to discover the features of the
> > service's active connection.
> >
> > As discussed upthread, there are other proposals that could put this
> > information in e.g. the DNS. That might help address other problems but
> is
> > separate from this proposal.
>
> Thanks.  ISTR the DNS discussion.  I'll go find it in the archives.
>
> My point is that this proposal should reference other potential
> solutions and should discuss pros and cons of this proposal versus
> other potential solutions, especially solutions that already exist.
>

I disagree. The proposal is succinct and focused. Discussion of the problem
space  can take place elsewhere like this mailing list, an IETF meeting,
another problem statement, an explainer, a use case document etc.


> > Might there be settings created for other protocols that leverage
> > > SETTINGS_ENABLE_CONNECT_PROTOCOL?  Why should a new SETTING be created
> > > for websockets and not for ... ?
> > >
> >
> > Yes, this is already the case for WebTransport over HTTP/2 [1] and
> > WebTransport over HTTP/3 [2], which define a
> SETTINGS_ENABLE_WEBTRANSPORT.
> > So adding a setting explicitly for WebSocket would make things
> consistent.
> > [1] -
> >
> https://www.ietf.org/archive/id/draft-ietf-webtrans-http2-04.html#section-3.2
> > [2] -
> >
> https://www.ietf.org/archive/id/draft-ietf-webtrans-http3-04.html#section-3.1
>
> Those are drafts, too.
> Personally, I remain unconvinced that these should be their own SETTING.
>
> At a minimum, I would like to see the drafts highlight that these new
> SETTINGS are absolutely optional to indicate specific support, meaning
> that clients can use this information if provided, but SHOULD NOT use
> absense of this (IMO protocol bloat) information in any way.
>

Note that in the case of SETTINGS_ENABLE_WEBTRANSPORT, it is a
bidirectional signal that is bound to a single connection and sent
independent of requests. That has some attractive properties, such as being
possible to encode in TLS handshake via the ALPS proposal [1].


> As an alternative, I would think another extensible service discovery
> mechanism might be extending OPTIONS responses with additional response
> headers.  Others may choose DNS or to extend /.well-known/.  These are
> existing discovery mechanisms (with their own pros and cons) and might
> be extended for service discovery as well as protocol feature discovery.
>

Yes that might be possible. I suggested OPTIONS upthread [2] , and didn't
hear much support for it at the time. But perhaps others think it is nice?


>
> SETTINGS_ENABLE_WEBSOCKETS and SETTINGS_ENABLE_WEBTRANSPORT proposals
> aim to allow protocol feature discovery upon the initial connection and
> without an additional round trip, and so should highlight why this is of
> such importance, and why someone using these features is also someone
> who is visiting the site for the very first time and might not have
> cached alternate protocol feature discovery from a prior set of
> connections and requests.  If I connect to example.com and attempt
> websockets over HTTP/3, I can then cache (maybe for a week or so)
> if it succeeded or failed, and use that for subsequent connections.
>

I mean that's a possibility. But then we risk caching issue edge case just
like Alt-Svc has today in mutli-CDN setups. Which Alt-Svc plan B is
intended to back us out of.

Cheers,
Lucas

[1] - https://datatracker.ietf.org/doc/html/draft-vvv-tls-alps
[2] - https://lists.w3.org/Archives/Public/ietf-http-wg/2023JanMar/0016.html