Re: [hybi] WebSocket handshake (HTTP and SSO)

Ian Fette (イアンフェッティ) <ifette@google.com> Sat, 04 September 2010 05:57 UTC

Return-Path: <ifette@google.com>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6E03A3A67E9 for <hybi@core3.amsl.com>; Fri, 3 Sep 2010 22:57:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.74
X-Spam-Level:
X-Spam-Status: No, score=-104.74 tagged_above=-999 required=5 tests=[AWL=-0.553, BAYES_05=-1.11, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5zY8qwXpXJcR for <hybi@core3.amsl.com>; Fri, 3 Sep 2010 22:57:11 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.44.51]) by core3.amsl.com (Postfix) with ESMTP id 5633E3A63EB for <hybi@ietf.org>; Fri, 3 Sep 2010 22:57:10 -0700 (PDT)
Received: from hpaq1.eem.corp.google.com (hpaq1.eem.corp.google.com [172.25.149.1]) by smtp-out.google.com with ESMTP id o845vc5r011646 for <hybi@ietf.org>; Fri, 3 Sep 2010 22:57:39 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1283579859; bh=3GZQYmew0P4NFFeRbGcfMq7BSfQ=; h=MIME-Version:Reply-To:In-Reply-To:References:Date:Message-ID: Subject:From:To:Cc:Content-Type; b=xPJYK5sZbN05eE/7jGADyyVCZxgaPf/3BlUqWqeP5DoGeDItfw1jVn4iAzMNF7lbM i91Y1+Z7pe/xb5/eyoAxw==
Received: from yxk30 (yxk30.prod.google.com [10.190.3.158]) by hpaq1.eem.corp.google.com with ESMTP id o845vaCk006015 for <hybi@ietf.org>; Fri, 3 Sep 2010 22:57:37 -0700
Received: by yxk30 with SMTP id 30so1059302yxk.6 for <hybi@ietf.org>; Fri, 03 Sep 2010 22:57:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:received:received:received :reply-to:in-reply-to:references:date:message-id:subject:from:to:cc :content-type; bh=FLbXB94RHOwCxpS8sd2n814ZX7ISc6SBDE9ir2qk0ko=; b=PPqFc+v5tG3ivWtZbvAcCsci4Vmfjg8pLjD3ERBpiiZ4LlIZoXqBQTVaNtf/lmsw9K 78EoEQIoM6fWywumwe5w==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:reply-to:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; b=Hyr0p4NOTJI1E247YkrIduc8qMtOPRAg10OKbadnREaUFnbs+/OdzhB57ZuJWdv3rn /n4KkcIc5CfZuaLQyelA==
MIME-Version: 1.0
Received: by 10.150.200.6 with SMTP id x6mr331674ybf.349.1283579856369; Fri, 03 Sep 2010 22:57:36 -0700 (PDT)
Received: by 10.150.229.7 with HTTP; Fri, 3 Sep 2010 22:57:36 -0700 (PDT)
Received: by 10.150.229.7 with HTTP; Fri, 3 Sep 2010 22:57:36 -0700 (PDT)
In-Reply-To: <AANLkTinxTLuDEiS=XuyVHG1W+aizKHWk2Z4=LLqEHvC4@mail.gmail.com>
References: <AANLkTinxTLuDEiS=XuyVHG1W+aizKHWk2Z4=LLqEHvC4@mail.gmail.com>
Date: Fri, 03 Sep 2010 22:57:36 -0700
Message-ID: <AANLkTik5uJ4wxUV-gvRmAMBe=JjOa-2yaA7zpf+hznS_@mail.gmail.com>
From: "Ian Fette (イアンフェッティ)" <ifette@google.com>
To: Benjamin Black <b@b3k.us>
Content-Type: multipart/alternative; boundary="000e0cd34832613903048f68b96f"
X-System-Of-Record: true
Cc: hybi@ietf.org
Subject: Re: [hybi] WebSocket handshake (HTTP and SSO)
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: ifette@google.com
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Sep 2010 05:57:14 -0000

As a general point, we (Google) are very concerned with initial latency. The
addition of 50ms before an app is usable is nontrivial. I say that not to
argue for or against the current handshake, but rather to push back against
the notion that 50ms at startup doesn't matter. Time at startup is among the
most important, we can often hide delays at other points.

On Sep 3, 2010 10:08 PM, "Benjamin Black" <b@b3k.us> wrote:
> The focus of the argument in favor of re-implementing authn in
> Websockets mechanisms that already exist in HTTP is that the authn
> process sometimes requires an extra round trip. One. Round. Trip.
> Sometimes. The phrase you seek is "premature optimization".
>
> Instead of talking about it in the abstract of a single, extra round
> trip, I ask when this is relevant. In cases where connections are
> short-lived, intended for a single request/response, and credentials
> can't be retained, this concern seems quite important. Since the
> entire process is one round trip, adding another could add
> considerable latency.
>
> Are Websockets intended for short-lived, request/reply applications?
> If so, they are pointless as HTTP can handle these applications all on
> its own.
>
> Are they intended for applications in which:
> 1) a user is not already authenticated
> OR
> 2) the credentials can't be passed to the Websocket system to use in
> authentication?
>
> Or, instead, are Websockets intended for long-running connections with
> numerous round trips, often from applications that can collect
> credentials and send them directly in the HTTP request that begins the
> Websocket negotiation? And, if this is so, why are we obsessing over
> a single round trip adding all of 50ms to initial connection setup
> instead of recognizing the existing mechanisms are perfectly workable
> _as is_? If, in the fullness of time and experience, we discover the
> extra round trip is a serious impediment, we are free to design and
> implement new mechanisms.
>
> File under: another confusing example of hybi efforts eschewing HTTP
> mechanisms and HTTP compliance. If someone could elucidate that, I
> would be grateful.
>
>
> b
> _______________________________________________
> hybi mailing list
> hybi@ietf.org
> https://www.ietf.org/mailman/listinfo/hybi