RE: Thoughts on HELIUM/HiNT

Lucas Pardue <Lucas.Pardue@bbc.co.uk> Tue, 10 July 2018 12:34 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90BCF130EB4 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 10 Jul 2018 05:34:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.649
X-Spam-Level:
X-Spam-Status: No, score=-7.649 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MIq74BacnZ9B for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 10 Jul 2018 05:34:04 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5CF69130DF9 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Tue, 10 Jul 2018 05:34:03 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.89) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1fcrnz-0001FB-OJ for ietf-http-wg-dist@listhub.w3.org; Tue, 10 Jul 2018 12:31:43 +0000
Resent-Date: Tue, 10 Jul 2018 12:31:43 +0000
Resent-Message-Id: <E1fcrnz-0001FB-OJ@frink.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by frink.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from <Lucas.Pardue@bbc.co.uk>) id 1fcrnx-0001EF-UW for ietf-http-wg@listhub.w3.org; Tue, 10 Jul 2018 12:31:41 +0000
Received: from mailout0.cwwtf.bbc.co.uk ([132.185.160.179]) by titan.w3.org with esmtps (TLS1.2:DHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from <Lucas.Pardue@bbc.co.uk>) id 1fcrnv-0004iP-Li for ietf-http-wg@w3.org; Tue, 10 Jul 2018 12:31:41 +0000
Received: from BGB01XI1006.national.core.bbc.co.uk ([10.184.50.56]) by mailout0.cwwtf.bbc.co.uk (8.15.2/8.15.2) with ESMTP id w6ACVFmu012629; Tue, 10 Jul 2018 13:31:15 +0100 (BST)
Received: from BGB01XUD1012.national.core.bbc.co.uk ([10.161.14.10]) by BGB01XI1006.national.core.bbc.co.uk ([10.184.50.56]) with mapi id 14.03.0389.001; Tue, 10 Jul 2018 13:31:15 +0100
From: Lucas Pardue <Lucas.Pardue@bbc.co.uk>
To: Patrick McManus <mcmanus@ducksong.com>, Ben Schwartz <bemasc@google.com>
CC: Martin Thomson <martin.thomson@gmail.com>, HTTP Working Group <ietf-http-wg@w3.org>
Thread-Topic: Thoughts on HELIUM/HiNT
Thread-Index: AQHUF23eMmUrNX+4U0+2MbbfCkufEKSG4iwAgACwoYCAAMwsYA==
Date: Tue, 10 Jul 2018 12:31:14 +0000
Message-ID: <7CF7F94CB496BF4FAB1676F375F9666A3BB7353E@bgb01xud1012>
References: <CABkgnnWKJ6D7EaWqpK9g09VzanVyofG47Ody=_JW1jEym_nmfw@mail.gmail.com> <CAHbrMsAt7HSHF5_qPTYeDZSYXsVi1JBY=cCNVbbNvnZiRfSTbg@mail.gmail.com> <CAOdDvNqqvZ3RtvfD_RODEtqzBA_RPMz++GViBh1Fwx4tFD=MMA@mail.gmail.com>
In-Reply-To: <CAOdDvNqqvZ3RtvfD_RODEtqzBA_RPMz++GViBh1Fwx4tFD=MMA@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [172.19.161.212]
x-exclaimer-md-config: 1cd3ac1c-62e5-43f2-8404-6b688271c769
x-tm-as-product-ver: SMEX-12.5.0.1300-8.2.1013-23958.006
x-tm-as-result: No-31.434700-8.000000-10
x-tmase-matchedrid: vZFhdP8fGRc7iuZ/mdYYtnQ8D+SLaQjsueok1chxwqvJ3jhK5xvrvQu/ Zh5ei+V2FXx3VY2FPtnaize54oCwVOgaAT0y0CV6+TdKNkxxkWQgfJ3S34h6EY+Mx9DVv04ymR6 4dy9AIYXCKxdd3mKUazbN0t/c2qF2h+w9Wz/xXDqlF7MF/8ayEjnuQWM5MjklgExzV+J9XRhiXQ jTxUn166dwsJe6fN2LEgwM8US/pTE5LRtPnepd1Qwv1ZvdCH+FVM2p/cRDyjHUT6czFSee2E3Zi 8ax3Q0ZvpqBrThv61MZS5uxXPxN6Zl/lu28zzkBO5zvad+1KpMmtQrYgoE2CsvnSCXBRWs5d4d6 50j76za0mJ4/iuO92Wh77jTUbA6yZORgGu5KV7f/vzSaERTM3jC0pJIQUiJO6plwdy+EW9Wk5fs MguUR93psxhuKgz2pZjQijgrFvzrSL+EVfOJR08KK0lk/wljBFDL4bOL9B341C2f8ND2KYFdTts RgoMSjzCu6GcLbI07DTPpAMD2yE/rp9upUjRG0EVcJzjkdE3C/3zi6gThtqaIuQJT6Y3OlgWpi2 jWTCQv6GyRrVcShOB/XcAla9LsVXEjKf9fhKaeUvX/ci5TjsurF3vB1+11GdQx9EXVQXrt+3viQ ySkXyoxiC3jQhVP5XhKwXj03jsAEa8g1x8eqF+2+1gN2UFC3hkGELpEWYSurs2h0X34zwOYbSyz CyCg+8a/ylbSaflT6daZahG7qsShfURyIe6Uw31GU/N5W5BAQvpiuMBLl75EK/d4qdC1/LZBapj lK5+jsbHv6pDz6tf3NPiyUzKzdqCZDkUj228NHQgtCTJ1arKPFjJEFr+olSlnU38LCY8vzV9FEg EqY0AF/RiJ3CqY9Kc7/oMqwpgDSdogP+v6tgidWxno1EVknek2JsNmrMu1ssgr8jEyJkQ==
x-tm-as-user-approved-sender: Yes
x-tm-as-user-blocked-sender: No
x-tmase-result: 10--31.434700-8.000000
x-tmase-version: SMEX-12.5.0.1300-8.2.1013-23958.006
Content-Type: multipart/alternative; boundary="_000_7CF7F94CB496BF4FAB1676F375F9666A3BB7353Ebgb01xud1012_"
MIME-Version: 1.0
X-W3C-Hub-Spam-Status: No, score=-4.7
X-W3C-Hub-Spam-Report: AWL=1.492, BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1fcrnv-0004iP-Li fc620e95d8f6512ca94e901724379ca9
X-Original-To: ietf-http-wg@w3.org
Subject: RE: Thoughts on HELIUM/HiNT
Archived-At: <https://www.w3.org/mid/7CF7F94CB496BF4FAB1676F375F9666A3BB7353E@bgb01xud1012>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/35634
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Thanks for the feedback Martin and Patrick.

In spending time on this I got the feeling that some aspects of this ecosystem seem a little underrepresented in IETF. For example, simple HTTP forward proxying as used today from the end-user perspective has multiple modes of discovery or configuration (environment variables, Web Proxy Auto-Discover (WPAD), proxy.pac, group policy) [1] [2] that sit at various levels of specification or are defacto standards.

Meanwhile, ongoing progress with HTTP/2 and HTTP/QUIC provides, in theory, new methods of proxy discovery and selection. For example, my local proxy using HTTP Alternative Services to advertise the availability of HTTP/QUIC. In practice I don’t know how much uptake there is in such evolution.

I think HTTPbis has some role to play but agree that the work might be suited to be lead from elsewhere. Part of me wonders if there is some relationship to the work of TAPS or PvD.

Lucas

[1] https://tools.ietf.org/html/draft-ietf-wrec-wpad-01
[2] https://tools.ietf.org/html/draft-nottingham-http-proxy-problem-01

P.S In writing this email I’ve discovered more I-Ds from mnot in this space that are very relevant and are due consideration in further work.


From: Patrick McManus [mailto:mcmanus@ducksong.com]
Sent: 10 July 2018 01:59
To: Ben Schwartz <bemasc@google.com>
Cc: Martin Thomson <martin.thomson@gmail.com>; HTTP Working Group <ietf-http-wg@w3.org>
Subject: Re: Thoughts on HELIUM/HiNT



On Monday, July 9, 2018, Ben Schwartz <bemasc@google.com<mailto:bemasc@google.com>> wrote:
On Mon, Jul 9, 2018 at 6:16 AM Martin Thomson <martin.thomson@gmail.com<mailto:martin.thomson@gmail.com>> wrote:
This is interesting work and a direction that has some promise.  Its
effect on consolidation [1] is something that needs consideration, but
some of the effects of that consolidation promise to have some
positive outcomes.

However, I don't think that this is an HTTP working group item, and
nor should it be.  I think that this needs to concentrate on
lower-layer primitives than what HTTP currently provides.

I think it's both.

There's definitely a big piece of lower-layer work that probably shouldn't happen in HTTP.  However, the goal is to build something that is firmly embedded in HTTP.  For example, some of our ideas would require defining new HTTP/2 frame types.  At a minimum, I think we need to check whether the HTTP WG is reasonably supportive before we start the work in earnest.

Perhaps the chairs have advice on how to structure these initial discussions.

[he whispers into the air to nobody in particular :)]

Its not clear to me either - and that's ok pre-meeting. While this isn't solely the kind of thing httpbis focuses on, its hard to ignore the introduction of new methods, modification of existing methods, and even frame types.

That's the reason we want to give it air time in Montreal - to get an understanding of the proposal and the reaction of http stakeholders (Martin is the first on the record :).. Basically, exploratory. I'm glad its seeing dispatch air time too.

I do want to urge anyone that develops, maintains, or even regularly interacts with FORWARD proxies to step forward and help us understand what you think of this and how it imapcts your system (that would be interesting feedback from the authors as well). This is a somewhat less common aspect of the ecosystem than at the time the core tunneling semantics were done so I'd like to make sure we're not writing things down in a vacuum.

-Patrick


Discussion of part of this on the DISPATCH agenda, which is good.  I
would prefer to see this taken on in a new working group.

That does seem like a good option.

[1] see https://www.ietf.org/blog/consolidation/



----------------------------

http://www.bbc.co.uk
This e-mail (and any attachments) is confidential and may contain personal views which are not the views of the BBC unless specifically stated.
If you have received it in error, please delete it from your system.
Do not use, copy or disclose the information in any way nor act in reliance on it and notify the sender immediately.
Please note that the BBC monitors e-mails sent or received.
Further communication will signify your consent to this.

---------------------