[Masque] Proposed draft charter

Mirja Kuehlewind <mirja.kuehlewind@ericsson.com> Fri, 24 January 2020 23:29 UTC

Return-Path: <mirja.kuehlewind@ericsson.com>
X-Original-To: masque@ietfa.amsl.com
Delivered-To: masque@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B18312001B for <masque@ietfa.amsl.com>; Fri, 24 Jan 2020 15:29:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EKQpS8ghLKGN for <masque@ietfa.amsl.com>; Fri, 24 Jan 2020 15:29:25 -0800 (PST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2055.outbound.protection.outlook.com [40.107.22.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA9D2120047 for <masque@ietf.org>; Fri, 24 Jan 2020 15:29:24 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HlldyOBmyTjEzVIrjPCwvr3pUUp2Zn+zsqxTUC/CAc+TipVv5hT+E9GNA31OGWoqXHgHCm+iQjnfjRy/HVbbLyQ/tNpH6xtH0Eue4WBClkX9wg7YSupAYJG4F7FIkaxgFbWnK1NBDSaPytq9YAXn2ar9XlEL5JOhwslnuYScgrjvAfCsEZd+XiCYPi3CbEj+29QXkonyot3iGgyUON0yBC3dqreAQ7dYyiFeIA6LFQoET064XrVYTGxIjj00ENcIQJO1ED8wtc5uNeO82aKvNRPPJ9Yhbbeqp8gZTZFxNAbbXzpbR0B4pAqcQrTwLxbsogcX0+Yx8nOTOh/26v2ZHQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4D7V5oHTMQLGA+crX2XuG0C8q/iQEMnk0UIvXNmxIMI=; b=HpENvYGXuv7ruspnLLLFdcccYWOojWhr9Zc99dMDVqdE5lQaDTdh0+8B8VODUm6QOGi2req8yU0uAePku7pmbAP8aWuP/JPQCISQ26hdVZKF8YqdLJxxyovdz8Ah/uRVB/sTgr3flLWK4D73ZUk4qal85Zw8keiBnTjxUr95v2KeNJJgaZtFfy9M3aupjxZ/C1QFFglVdRtkWrchZw59etuvTNSBeejgTYESCrCOLaXDUmuejAToLbSL45cn48/3wIBcaRZqo3mPIY7Mj6cvHD/ZKv9mytizya/4Iq9TE2bmY9ImGh1xpgWENFsfhC3Nr81p5aScOFQpAcv2ZeDyrQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4D7V5oHTMQLGA+crX2XuG0C8q/iQEMnk0UIvXNmxIMI=; b=ilp2PiFHfRYFDIUEaINGAqqJYiT2rZ9hPLCjHpMpXQgur3djUiHu+zCgdFefWlRZBEbGHdSBjxt9IlTT9I6KLlIKjZF3TA9dwRBNQlgqGbmCmJ70aH7mY3a2mzd9QLEUiEE4RPGUSpZZFeOUg7FfRDerdECHmrMi2/8mCe2xeBk=
Received: from AM0PR07MB4691.eurprd07.prod.outlook.com (52.135.149.158) by AM0PR07MB4369.eurprd07.prod.outlook.com (52.133.61.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.15; Fri, 24 Jan 2020 23:29:21 +0000
Received: from AM0PR07MB4691.eurprd07.prod.outlook.com ([fe80::4879:46ae:16e:f5b7]) by AM0PR07MB4691.eurprd07.prod.outlook.com ([fe80::4879:46ae:16e:f5b7%7]) with mapi id 15.20.2686.013; Fri, 24 Jan 2020 23:29:21 +0000
From: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
To: "masque@ietf.org" <masque@ietf.org>
Thread-Topic: Proposed draft charter
Thread-Index: AQHV0w4aBWkpAZDWB0m+dMAczIB7OA==
Date: Fri, 24 Jan 2020 23:29:21 +0000
Message-ID: <845946C2-EB98-4F3A-966E-968AE349302C@ericsson.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=mirja.kuehlewind@ericsson.com;
x-originating-ip: [2001:16b8:24eb:c200:bd82:62b5:8bd1:130c]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: dab70c45-5926-4b38-6f59-08d7a1253d60
x-ms-traffictypediagnostic: AM0PR07MB4369:
x-microsoft-antispam-prvs: <AM0PR07MB4369A15446DC69B7B17C5AF4F40E0@AM0PR07MB4369.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02929ECF07
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(366004)(346002)(136003)(39860400002)(396003)(199004)(189003)(86362001)(2616005)(2906002)(5660300002)(81156014)(71200400001)(44832011)(66446008)(64756008)(66556008)(66476007)(3480700007)(91956017)(76116006)(66946007)(8676002)(6916009)(7116003)(36756003)(6512007)(186003)(8936002)(6486002)(478600001)(33656002)(81166006)(6506007)(316002); DIR:OUT; SFP:1101; SCL:1; SRVR:AM0PR07MB4369; H:AM0PR07MB4691.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: xZ0Wc/wZwL/sttz+54Okngx0Iuugqq76y7wYAtx/psLxp1IFtpTWeaquNLivX95maFqpv1+a3mc2PEM/dr4Pu3wchtkSgbLPrUdxMen7l3qk6Ww5nGY49BOYx3CTP+EKd/t/o5kxgWtHagK18E3ACbhYy/pkjN/bl9p5AlDmxutXQHEHeUjX0e7KFCI5s72jvGKN5nt1l45G/5qhf7CjZidWEhiwv3VNF9HPrxz/O4//BaCAi+o8oS4czdYqNuhfFC7R8xfHcCiyqds7gZFdyNP3LyFbPoqQIiymkF65p/+/pbpkUNzfJN7xfiFOgzZFJiqXoGUqKROms1eq67sgQ1p2ERsWifRWX4kZ0RvA4AgwoK0wUq3RVqDARVcgcmOurmJhK2p9sXp+NfH7IE/P3bayH14dvKLcp3hHfZGLDrYI0X8hh77Du8dCnp69x39y
x-ms-exchange-antispam-messagedata: tYQiPLFbtEqdLXHSzsOclx8yrsvDmJ5IiHJJUj30RpLBgcDlviaS8VmhlBnMsQwP+HLc9t/8tGbsbJUWfJ5PfbtQ/CUOyrBbwQXWtpGjsPAxKlBk1U5LilLxzPNWVuZ+tbqGQJ5tmYci/ma6IX8RXVeKecSQgJKUADOjvTS5TeuB03Agkg2Nvz2cc6pvBetRMyaAiWXc3u1GiiyGztGPkA==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <F8601E690EFED944BA3F6DE9AA120F9B@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dab70c45-5926-4b38-6f59-08d7a1253d60
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Jan 2020 23:29:21.0437 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Dh8hDFLFmk6cGRO8xlzRwqnHmyQvEENCF2qDBeVXC3NAfsf/8Q3rQcgtMah6axYB4/b+xj/rgrtlSFGOzWWtrcmN3bLMGETPWju6NS1ftj0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR07MB4369
Archived-At: <https://mailarchive.ietf.org/arch/msg/masque/iiXaLSZX_f6ic4SnzlNudPdFtS4>
Subject: [Masque] Proposed draft charter
X-BeenThere: masque@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiplexed Application Substrate over QUIC Encryption <masque.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/masque>, <mailto:masque-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/masque/>
List-Post: <mailto:masque@ietf.org>
List-Help: <mailto:masque-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/masque>, <mailto:masque-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jan 2020 23:29:28 -0000

Hi everybody,

as already indicated by David in his last mail, some of us worked on a proposed draft charter for a new group. Please find the text below and provide comments!

Thanks!
Mirja

---------------------------------
MASQUE draft charter text


Many network topologies lead to situations where transport protocol proxying is beneficial. For example: helping endpoints to communicate when end-to-end connectivity is not possible, applying additional encryption where desirable (such as a VPN), or accommodating differences in network segment characteristics (e.g. long paths such as satellite, or high-loss links). Many existing proxy solutions deployed today rely on transparent intermediation. However, an increasing amount of traffic is using QUIC, and QUIC's improved security model prevents transparent proxies. In order to allow transport protocol proxying when QUIC is in use, we will need a mechanism where at least one of the QUIC endpoints actively collaborates with the proxy. QUIC is a good candidate protocols for tunneling or forwarding this kind of traffic, as QUIC provides secure connection establishment, multiplexed streams, and connection migration. Further, use of HTTP/3 on top of QUIC enables HTTP-level proxying and caching.

This working group will work on MASQUE (Multiplexed Application Substrate over QUIC Encryption) - a framework that allows concurrently running multiple networking applications inside a QUIC connection. The MASQUE framework will specify the actions and processes for establishing tunneled proxy connectivity as well as a signaling protocol that is used between the endpoint(s) and the MASQUE server to negotiate and request proxy service capabilities and parameters, and realize services that require communication between endpoints and proxies. A proxy may provide simple forwarding with optional address translation only, or more advanced services like name resolution, multipath support, or assistance for congestion control on link segments with challenging characteristics, such as high loss or strongly varying delays.

As use-cases for deploying MASQUE have different security or performance requirements, the working group may define multiple MASQUE services for proxying to suit these disparate use-cases. In particular, some deployments may want to avoid double-encryption to reduce computational costs if the inner connection as well as the outer QUIC tunnel connection use encryption, while others might prefer to keep the double-encryption of user data to sure strong privacy guarantees. Such options will need to produce documentation of the resulting security and privacy properties.

Alongside the definition of the MASQUE framework, the group will further work on discovery mechanisms for MASQUE servers and which MASQUE services they support, taking into account deployment across network segments with different operability and end-user relationship characteristics.
 
Proxy services that extend the signaling of the base MASQUE protocol can be adopted by the group by creating a new milestone with AD review.
 
If MASQUE requires any extensions to existing protocols, the group will coordinate closely with the respective group responsible for maintaining that protocol, such as the HTTPBIS, QUIC, or TLS working groups.

Milestones

July 2021 MASQUE framework and base protocol to be submitted to the IESG for publication as PS
Nov 2021 Discovery mechanism for MASQUE servers to be submitted to the IESG for publication as PS
Nov 2021 [Example WG Item] Use Case specific extension to the MASQUE protocol be submitted to the IESG for publication as EXP or PS