Re: [Masque] Proposed draft charter

Eric Kinnear <ekinnear@apple.com> Thu, 06 February 2020 12:05 UTC

Return-Path: <ekinnear@apple.com>
X-Original-To: masque@ietfa.amsl.com
Delivered-To: masque@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 550E9120893 for <masque@ietfa.amsl.com>; Thu, 6 Feb 2020 04:05:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7
X-Spam-Level:
X-Spam-Status: No, score=-7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MnOak5YLIt89 for <masque@ietfa.amsl.com>; Thu, 6 Feb 2020 04:05:47 -0800 (PST)
Received: from ma1-aaemail-dr-lapp02.apple.com (ma1-aaemail-dr-lapp02.apple.com [17.171.2.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3D4712089C for <masque@ietf.org>; Thu, 6 Feb 2020 04:05:46 -0800 (PST)
Received: from pps.filterd (ma1-aaemail-dr-lapp02.apple.com [127.0.0.1]) by ma1-aaemail-dr-lapp02.apple.com (8.16.0.27/8.16.0.27) with SMTP id 016C1vO2046383; Thu, 6 Feb 2020 04:05:44 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=sender : from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=Fd1dBF65E584hG5ruFTVFUl4mSZvTa+l9e4ZtcdKx1E=; b=WLwaz25ZEWZW3h7Eflr6/1VQeyZ+PRPjIsb+vN9bGyatTD5uIzVAq93DfYN6lxW2Mu3W GHP8fmaBwmuhlXtZA/fxZDfUMh2EKyW/r89iXYh0ynuw0+8soGozjks3QKtd+EZPJt/7 vffoqPTvaOHsea6OiYTSL1WEuuKv/KcXXcu6SUTHOp6iS20wHzxme/zQ5TJKjgsy8SVv jNq/v3eoqpXszVET9CcGzCFvOeIGLm2nQcSMkqNQ7SWw1/LP64q0vxkhOuJZbwnE66Qx d2J5GDI/0DkzI3M6mtA3y9B09uElc0pEc64FDVlxnqqenG+XHKPc3+O2OPHl7IdwLziu ZQ==
Received: from crk-mailsvcp-mta-lapp03.euro.apple.com (crk-mailsvcp-mta-lapp03.euro.apple.com [17.66.55.16]) by ma1-aaemail-dr-lapp02.apple.com with ESMTP id 2xykb3cjqd-6 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Thu, 06 Feb 2020 04:05:44 -0800
Received: from crk-mailsvcp-mmp-lapp03.euro.apple.com (crk-mailsvcp-mmp-lapp03.euro.apple.com [17.72.136.17]) by crk-mailsvcp-mta-lapp03.euro.apple.com (Oracle Communications Messaging Server 8.1.0.1.20190704 64bit (built Jul 4 2019)) with ESMTPS id <0Q5A00EI24973F00@crk-mailsvcp-mta-lapp03.euro.apple.com>; Thu, 06 Feb 2020 12:05:31 +0000 (GMT)
Received: from process_milters-daemon.crk-mailsvcp-mmp-lapp03.euro.apple.com by crk-mailsvcp-mmp-lapp03.euro.apple.com (Oracle Communications Messaging Server 8.1.0.1.20190704 64bit (built Jul 4 2019)) id <0Q5A00V0030RFS00@crk-mailsvcp-mmp-lapp03.euro.apple.com>; Thu, 06 Feb 2020 12:05:31 +0000 (GMT)
X-Va-A:
X-Va-T-CD: ab628b5a08785ddb247586142ad44680
X-Va-E-CD: b8b5246f2119aceeac42a2c931f18b50
X-Va-R-CD: 38229fc40af40c69b515a805699a84ca
X-Va-CD: 0
X-Va-ID: d21775f0-3009-49fb-9559-7d44aa40b084
X-V-A:
X-V-T-CD: ab628b5a08785ddb247586142ad44680
X-V-E-CD: b8b5246f2119aceeac42a2c931f18b50
X-V-R-CD: 38229fc40af40c69b515a805699a84ca
X-V-CD: 0
X-V-ID: 1c758c02-0b21-4337-b226-a716ea734889
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.138, 18.0.572 definitions=2020-02-06_01:2020-02-06, 2020-02-06 signatures=0
Received: from [17.235.213.59] (unknown [17.235.213.59]) by crk-mailsvcp-mmp-lapp03.euro.apple.com (Oracle Communications Messaging Server 8.1.0.1.20190704 64bit (built Jul 4 2019)) with ESMTPSA id <0Q5A00V0148XV350@crk-mailsvcp-mmp-lapp03.euro.apple.com>; Thu, 06 Feb 2020 12:05:24 +0000 (GMT)
Sender: ekinnear@apple.com
From: Eric Kinnear <ekinnear@apple.com>
Message-id: <1E734838-6F8E-4F13-AEEE-0A00F3E0C04C@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_8B02F5F3-BC3E-42EB-909A-08D8D0C9281A"
MIME-version: 1.0 (Mac OS X Mail 13.4 \(3608.80.4\))
Date: Thu, 06 Feb 2020 13:05:21 +0100
In-reply-to: <C58665A7-8550-4828-A7CD-603E3A64CFAF@ericsson.com>
Cc: "masque@ietf.org" <masque@ietf.org>
To: Mirja Kuehlewind <mirja.kuehlewind=40ericsson.com@dmarc.ietf.org>
References: <845946C2-EB98-4F3A-966E-968AE349302C@ericsson.com> <CABcZeBOJtyaa+J9PqoEZ7n8QahFy4n8nbBaCwUd0W+1BoMNnZQ@mail.gmail.com> <E68FB662-F6E5-49EE-AD92-AFCCCEA0CCE9@ericsson.com> <CABcZeBNEekD6GivQUvg8Gmz=_0EB1T_7PAeK=MNR_7+ObWJuTA@mail.gmail.com> <AE645E8F-6E17-4844-B8CC-373EB0909775@apple.com> <C58665A7-8550-4828-A7CD-603E3A64CFAF@ericsson.com>
X-Mailer: Apple Mail (2.3608.80.4)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2020-02-06_01:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/masque/5DaXljSP7uB7--rX-ZAO-c7qSeU>
Subject: Re: [Masque] Proposed draft charter
X-BeenThere: masque@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiplexed Application Substrate over QUIC Encryption <masque.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/masque>, <mailto:masque-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/masque/>
List-Post: <mailto:masque@ietf.org>
List-Help: <mailto:masque-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/masque>, <mailto:masque-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Feb 2020 12:05:49 -0000

Awesome, thanks all for the feedback! 

Updating with the changes proposed by Ekr and Lucas, thanks for the great suggestions.

===============

Many network topologies lead to situations where transport protocol proxying is
beneficial. For example, proxying enables endpoints to communicate when
end-to-end connectivity is not possible and can apply additional encryption
where desirable (such as a VPN).

QUIC is a good candidate protocol for tunneling these types of traffic, as QUIC
provides secure connectivity, multiplexed streams, and connection migration.
Further, HTTP/3 supports an established request/response semantic that can be
used to set up and configure services.

Using QUIC as a tunneling technology allows for proxying of both reliable stream
(TCP) and unreliable datagram (UDP) flows. For stream flows, QUIC streams
provide reliable in-order delivery across the client-proxy link. QUIC datagrams
provide for unreliable data transmission, which allows for transporting UDP and
other unreliable flows via a proxy without introducing potentially redundant or
unnecessary recovery mechanisms. In addition, QUIC can carry both types of flows
over the same connection while taking advantage of a unified congestion
controller.

This working group will work on MASQUE (Multiplexed Application Substrate over
QUIC Encryption), a framework that allows concurrently running multiple proxied
flows inside a QUIC connection. The MASQUE framework will specify a signaling
protocol that is used between the endpoint(s) and the MASQUE server to negotiate
proxy services that establish tunneled connectivity. The initial functionality
will be limited to client-initiated proxy tunnels. The WG may subsequently
recharter to consider other applications.

Proxy services that extend the signaling of the base MASQUE protocol can be
adopted by the group by creating a new milestone with AD review.
 
If MASQUE requires any extensions to existing protocols, the group will
coordinate closely with the respective group responsible for maintaining that
protocol, such as the HTTPBIS, QUIC, or TLS working groups.

===============


Thanks,
Eric



> On Feb 4, 2020, at 5:23 PM, Mirja Kuehlewind <mirja.kuehlewind=40ericsson.com@dmarc.ietf.org> wrote:
> 
> Hi Eric,
>  
> thanks for narrowing this down. The proposed text below looks like a good starting point for a working group!
>  
> Mirja
>  
>  
> From: Masque <masque-bounces@ietf.org> on behalf of Eric Kinnear <ekinnear=40apple.com@dmarc.ietf.org>
> Date: Tuesday, 4. February 2020 at 16:30
> To: "masque@ietf.org" <masque@ietf.org>
> Subject: Re: [Masque] Proposed draft charter
>  
> Hi all,  
>  
> There’s been some good discussion on this thread, which has led to some potential improvements in the draft charter. 
>  
> Here’s some proposed text which tightens things up quite a bit and tries to clarify many of the parts that caused concern. Thoughts and feedback welcome!
>  
> Thanks,
> Eric
> 
> 
> 
> ==================
> 
> Many network topologies lead to situations where transport protocol proxying is
> beneficial. For example, proxying enables endpoints to communicate when
> end-to-end connectivity is not possible and can apply additional encryption
> where desirable (such as a VPN).
> 
> QUIC is a good candidate protocol for tunneling these types of traffic, as QUIC
> provides secure connection establishment, multiplexed streams, and connection
> migration. Further, HTTP/3 provides an existing request/response syntax that can
> be used to set up and configure services.
> 
> Using QUIC as a tunneling technology allows for proxying of both reliable stream
> (TCP) and unreliable datagram (UDP) flows. For stream flows, QUIC streams
> provide reliable in-order delivery across the client-proxy link. QUIC datagrams
> provide for unreliable data transmission, which allows for transporting UDP and
> other unreliable flows via a proxy without introducing potentially redundant or
> unnecessary recovery mechanisms. In addition, QUIC can carry both types of
> streams over the same connection while taking advantage of a unified congestion
> controller.
> 
> This working group will work on MASQUE (Multiplexed Application Substrate over
> QUIC Encryption), a framework that allows concurrently running multiple proxied
> flows inside a QUIC connection. The MASQUE framework will specify a signaling
> protocol that is used between the endpoint(s) and the MASQUE server to negotiate
> proxy services that establish tunneled connectivity. The initial functionality
> will be limited to client-initiated proxy tunnels. The WG may subsequently
> recharter to consider other applications.
> 
> Proxy services that extend the signaling of the base MASQUE protocol can be
> adopted by the group by creating a new milestone with AD review.
> 
> If MASQUE requires any extensions to existing protocols, the group will
> coordinate closely with the respective group responsible for maintaining that
> protocol, such as the HTTPBIS, QUIC, or TLS working groups.
> 
> ==================