Re: [art] [core] Artart last call review of draft-ietf-core-coap-tcp-tls-07

Carsten Bormann <cabo@tzi.org> Wed, 12 April 2017 04:04 UTC

Return-Path: <cabo@tzi.org>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C8563126B71; Tue, 11 Apr 2017 21:04:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OyZA3icPqMiG; Tue, 11 Apr 2017 21:04:44 -0700 (PDT)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9CFD012009C; Tue, 11 Apr 2017 21:04:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [134.102.201.11]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id v3C44YFs013672; Wed, 12 Apr 2017 06:04:34 +0200 (CEST)
Received: from client-0052.vpn.uni-bremen.de (client-0052.vpn.uni-bremen.de [134.102.107.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3w2r0L04mjzDHMj; Wed, 12 Apr 2017 06:04:33 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Subject: Re: [art] [core] Artart last call review of draft-ietf-core-coap-tcp-tls-07
From: Carsten Bormann <cabo@tzi.org>
X-Priority: 3
In-Reply-To: <7D33923C-AB67-43F1-9417-08574DCC62A3@mnot.net>
Date: Wed, 12 Apr 2017 06:04:33 +0200
Cc: weigengyu <weigengyu@bupt.edu.cn>, art@ietf.org, draft-ietf-core-coap-tcp-tls.all@ietf.org, ietf@ietf.org, core@ietf.org
X-Mao-Original-Outgoing-Id: 513662673.384077-8d9577bc6a7635a03537385cb9593471
Content-Transfer-Encoding: quoted-printable
Message-Id: <9302A268-50CF-4688-A79D-8343E5B9B7CE@tzi.org>
References: <149179722452.3118.982908107963516290@ietfa.amsl.com> <5E5238DC-B835-4BDF-B50D-8D594A46C4D4@tzi.org> <7DEDD3CB-B812-4151-97DC-403448C1080B@mnot.net> <52AFE50B189544AFB2744028519A173D@WeiGengyuPC> <7D33923C-AB67-43F1-9417-08574DCC62A3@mnot.net>
To: Mark Nottingham <mnot@mnot.net>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/AOhFVXHVC-EpCqk9iFPoulfeXMI>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Apr 2017 04:04:46 -0000

On Apr 12, 2017, at 04:42, Mark Nottingham <mnot@mnot.net> wrote:
> 
> So, is COAP using WebSockets for browser access, or for firewall traversal? The paper below seems to indicate the latter, and so the original question remains.

Can’t answer that for Gengyu, but the term “firewall” occurs in the CoAP over TCP abstract, not in the CoAP over WebSockets one.

I continue to maintain that for CoAP over WebSockets the access to CoAP proxies from browsers is the motivating case.  (Yes, these could also be HTTP to CoAP cross-protocol proxies, but there are impedance mismatches here; e.g., for a browser application that wants to observe a CoAP resource.)

> Also, the assertions about firewalls are interesting; we're hearing very different assertions in the discussions of QUIC (e.g,. 90%+ success rates for UDP protocols).

Apart from the backend motivation, the main motivation for CoAP over TCP was easier NAT traversal (UDP bindings are timed out much faster in most NATs).  This may extend to other middleboxes, including firewalls that build (and then time out) UDP-based state.

I’m not sure the QUIC numbers transfer to this use case very well, as QUIC is mostly used for web page access from browsers, so short NAT binding timeouts don’t matter that much.  For a sensor that needs to be accessed every 30 minutes, these are much more of an issue.

Grüße, Carsten