Re: Google, etc, and their proprietary protocols

Michael Thomas <mike@mtcc.com> Fri, 27 November 2020 22:14 UTC

Return-Path: <mike@fresheez.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E1EF3A07D1 for <ietf@ietfa.amsl.com>; Fri, 27 Nov 2020 14:14:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.651
X-Spam-Level:
X-Spam-Status: No, score=-1.651 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.249, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mtcc-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wf2eai2v7nBi for <ietf@ietfa.amsl.com>; Fri, 27 Nov 2020 14:14:42 -0800 (PST)
Received: from mail-pf1-x429.google.com (mail-pf1-x429.google.com [IPv6:2607:f8b0:4864:20::429]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A9C23A07C8 for <ietf@ietf.org>; Fri, 27 Nov 2020 14:14:41 -0800 (PST)
Received: by mail-pf1-x429.google.com with SMTP id q10so5667909pfn.0 for <ietf@ietf.org>; Fri, 27 Nov 2020 14:14:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mtcc-com.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=1vjZrCBq8pb+9Ccg3JbZJa3OH3zw6byCJEBzVLYKHAc=; b=QeyEHZ+C6yL/YzVL/lXvMHZJu53TpAhZD2FnOu3rcEZvIgAnIrNEA2NWxsHVk+uFpH fgcbaHPIDZg4hlRCfDfKstCyqKof1Ib8imvRb36Xiu9dt8F9G5wOdYjKvqeNRQDG5mBX iDtTku9Z4rG4XdkHCrNCCabDrYiKXoFZ84tuSIXpmtfcJsI6h9Zj92VE2zxwB7qjp6sc 94OtAkV9DmO0GF66hZZJUL0pGFJbv2h7+FpLK4Ll3dMuN0+kBO3h2ugJOGOr4M1qbJhG o4ph/zxzHLRoYpz1pvMgDw+V7TI0v04eze17KexM6FM1rvMGu+TakS23NJVY5OMGPPUQ xdTg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=1vjZrCBq8pb+9Ccg3JbZJa3OH3zw6byCJEBzVLYKHAc=; b=ENU5hXmexBHG0d+1PlCo7j2+ON6rqn/wCut5yh8eUYE0qhQRRD+wfuMwfcdCbBoGcs gx+vBP4PX7Zrd7hw2YoQy2WXd8A0cpsLNuoHQLhvlYBNv99F8/niyCIUoMT5AdoxebIb 0WmUlPeVzp92jBOVqxqw3ing8QzLwP8Cfdw1oXdGhn0M8MNMmw5ireaVManiqVoPRMo+ hCwvtiuSI4SeHEs12bKo1ptIVwnNWkpczQpCvuC0jtlTJFL6fumQk+90lFqygv0n8JXW UeNuyNZDKYN+d6ZzCKtpQXzK76ND/fRQdFKNSy3FsX/nKgFEiOUhi9RiASVQlyaT/2+i q3Kg==
X-Gm-Message-State: AOAM533I0A4kc9z82Sjy03cv9lDNUAyHRTUavuvpPKhPpNFT4IsDTi5U W9oAtRZJETy2dPqx5tK0EmDNvtr6ZTy2FA==
X-Google-Smtp-Source: ABdhPJw0hI+Sk5gz5XGRIbdTQrK4b1vvjjWDLYkA7crMmf8AgA1/kqeTB/mC/QW9NoZkSxMnSs1Raw==
X-Received: by 2002:aa7:93cc:0:b029:19a:8aba:97d5 with SMTP id y12-20020aa793cc0000b029019a8aba97d5mr8822226pff.66.1606515280809; Fri, 27 Nov 2020 14:14:40 -0800 (PST)
Received: from mike-mac.lan (107-182-42-33.volcanocom.com. [107.182.42.33]) by smtp.gmail.com with ESMTPSA id n68sm8510193pfn.161.2020.11.27.14.14.39 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 27 Nov 2020 14:14:40 -0800 (PST)
Subject: Re: Google, etc, and their proprietary protocols
To: Warren Kumari <warren@kumari.net>
Cc: IETF Discussion Mailing List <ietf@ietf.org>
References: <d00258b3-ef73-ee93-a47d-2831738d32d1@mtcc.com> <CAHw9_iLcYFkOuRgiyKLH-OnBs1i+Y-8L4ds3areJiT9EbxFs+w@mail.gmail.com>
From: Michael Thomas <mike@mtcc.com>
Message-ID: <43ef76c1-1a0a-718e-25cd-31c08d161759@mtcc.com>
Date: Fri, 27 Nov 2020 14:14:38 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.5.0
MIME-Version: 1.0
In-Reply-To: <CAHw9_iLcYFkOuRgiyKLH-OnBs1i+Y-8L4ds3areJiT9EbxFs+w@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/dHgn6O73g35KYJFfUybvkKVY_kk>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Nov 2020 22:14:43 -0000

On 11/27/20 7:56 AM, Warren Kumari wrote:
> On Thu, Nov 26, 2020 at 3:34 PM Michael Thomas <mike@mtcc.com> wrote:
>>
>> I know there are a whole lot of things that Google is doing for
>> configuration, casting of urls (cf chromecast), etc which use
>> proprietary protocols. Lots of other vendors are inventing the same or
>> similar wheels. Can anybody tell me why these haven't been standardized?
>> Is it politics? It sure is a PITA to not be able to send a URL to Apple
>> Device or cast from Firefox onto my chromecast. I assume that this
>> tangle applies for every other ecosystem like Apple and Amazon.
>>
>> Does anybody know the history and/or why we suffer this mess? I mean,
>> the base level mechanisms seem pretty well understood.
>>
> Hi there,
>
> So, there are a number of things at play here.
>
> Firstly is that there many of the things which you are probably
> viewing as "protocols" are more APIs/formats. In many cases these APIs
> are very narrowly focused, quite specific (and so there isn't really
> interoperability), and change frequently as new features are added,
> etc. Keeping an IETF standard updated every time the API changes would
> limit how quickly features can be added.

There is clearly an over the wire(less) protocol going on between my 
chrome browser and my chromecast which sends a URL (I assume) and some 
mechanism for authentication as needed so the chromecast pull up the 
content (chromecast does not dogleg through your device, unlike 
AppleTV). Or some such voodoo. It's probably the same/similar for 
sending a URL to another google browser. They also seem to have a 
VNC-like protocol which is used for screen sharing. For all I know it is 
just repackaged VNC.

One bad thing about it being a closed protocol is that I have no idea 
whether whatever voodoo their using to allow my chromecast to have 
access to various streaming services is secure and safe. The larger 
issue is that there are probably a dozen or more companies all doing 
similar things with varying degrees of security competence.

One of the best things that IETF has brought in the last 20 years is 
eyeballs with security clue to protocols whose authors have much less 
clue, and especially in the beginning none at all. So now we're giving 
all of these household items access to intimate details of our lives 
where we don't even know whether they are properly secured. The one 
lasting lesson of the LinkedIn unsalted password debacle is that even 
really big companies can do really stupid things, and with network 
protocols it's even worse.

But the bottom line of all of this is that it's a mess, and all of their 
squabbling and posturing are making the user experience terrible.

Mike