Re: [Masque] Updated proposed charter text

Marcus Ihlar <marcus.ihlar@ericsson.com> Fri, 03 April 2020 13:06 UTC

Return-Path: <marcus.ihlar@ericsson.com>
X-Original-To: masque@ietfa.amsl.com
Delivered-To: masque@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26B363A08E9 for <masque@ietfa.amsl.com>; Fri, 3 Apr 2020 06:06:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tu7geePPIOsn for <masque@ietfa.amsl.com>; Fri, 3 Apr 2020 06:06:30 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80041.outbound.protection.outlook.com [40.107.8.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BFD273A08E2 for <masque@ietf.org>; Fri, 3 Apr 2020 06:06:29 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=O6rOnvZ9SXb8/uvhOi5waEBrxUx5QdGiuV/8uvTMFRaXWq8+/wcIt5BfMWiqS/+STL4PJBII1DJXfWiyzmMk+EnxvU/4lGafDk+jKNn3JOuWuc/YwmD1gHzhnhPsvdeJ52t6lNMaCwMiUXxX1iX7SmHeK23xpr4mMyAU3YytS0R4vm8IkMoL9KbRinr9cmnvVRS7ezUrgVtob6wNDiaHB3K+LBvbt650iZSYG3DNW7c7Zq8g5lBpmM7CLCdfZ/tTLm3WrjgO6y+Ji4ObOZFi2yf/JwDKMj1mN//4kVCDrJOlgV3B59sj4AYBqrxb93NcfQQTkXcKvFn/VF/pviAQFw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SRA0XAnyJC6mpa5GB7o0FHUsQZu5GSh1TlHadp6sKPc=; b=XzYAmb4Jz2LxwgL6dTvuLrLxUnhh3qqhnFVaSMdRggPEpIRAGJSQLLha36fRm4a3jd8yoLaYDEFCu5TDpEWfDsTrx/LtZoLnbHNhAb9HyNk6GsjoL/UWvLaqme/wdhxqAWRG7ydX7EzvxZKcheUX4tU2yOKIN/Aq2kQajkY28bFTU5DGmfBTaJDJ6qjXJeCNEXTLRyg9yQGIR/dxZn3svd3W6U/2SRHFLuxiRwBIVLFi25b00cI0+/Yo5dlVLjLvvoZDq+SfYa86l5xI2t1LctHNV1wYJ+jFMfgWyZiXG+5waYzFeKX3Zgi/kX0eCwdO+ArMrq6XsAGp6PP7usP2Zg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SRA0XAnyJC6mpa5GB7o0FHUsQZu5GSh1TlHadp6sKPc=; b=Ig3CEsBFNKMKJe8Af07kik4ojxpIRFPQcii/0DOLyOqy1xp/5ISNStKDDL2qO6cTH8uHM1TpsODgBifIEE9qPm66K7D7tSbUWaVdjEB6+LfhFGBvTlrcfec7sFdLKNEC2HLWovNUurtT0du/oz95gPwN/vaGuDEvXcLPvSDnP3s=
Received: from HE1PR07MB4426.eurprd07.prod.outlook.com (20.176.167.143) by HE1PR07MB3417.eurprd07.prod.outlook.com (10.170.244.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2878.13; Fri, 3 Apr 2020 13:06:08 +0000
Received: from HE1PR07MB4426.eurprd07.prod.outlook.com ([fe80::8a2:3c28:9b48:8003]) by HE1PR07MB4426.eurprd07.prod.outlook.com ([fe80::8a2:3c28:9b48:8003%6]) with mapi id 15.20.2878.014; Fri, 3 Apr 2020 13:06:08 +0000
From: Marcus Ihlar <marcus.ihlar@ericsson.com>
To: "caw@heapingbits.net" <caw@heapingbits.net>, "masque@ietf.org" <masque@ietf.org>
Thread-Topic: [Masque] Updated proposed charter text
Thread-Index: AQHWB3uAOmKmdJgY1EKBmv04UALbG6hnW/ig
Date: Fri, 03 Apr 2020 13:06:08 +0000
Message-ID: <HE1PR07MB442601004BE58A00FD2D6B04E2C70@HE1PR07MB4426.eurprd07.prod.outlook.com>
References: <89136f8b-70bd-40a0-b6d1-0e8a62a50ece@www.fastmail.com>
In-Reply-To: <89136f8b-70bd-40a0-b6d1-0e8a62a50ece@www.fastmail.com>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=marcus.ihlar@ericsson.com;
x-originating-ip: [213.113.147.148]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5112d36e-0184-4547-a383-08d7d7cfc65d
x-ms-traffictypediagnostic: HE1PR07MB3417:
x-microsoft-antispam-prvs: <HE1PR07MB3417B96E82987935DA62C857E2C70@HE1PR07MB3417.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0362BF9FDB
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR07MB4426.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(10009020)(4636009)(366004)(136003)(39860400002)(346002)(396003)(376002)(66446008)(81156014)(64756008)(9686003)(81166006)(8676002)(966005)(110136005)(316002)(71200400001)(66476007)(66556008)(478600001)(55016002)(5660300002)(6506007)(8936002)(76116006)(186003)(33656002)(26005)(86362001)(44832011)(53546011)(15650500001)(52536014)(2906002)(7696005)(66946007); DIR:OUT; SFP:1101;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: a41OG+5FW9cAAcePiXXVzmQ6ag8shxsfv7p6wOMyUR2ul0VWzs8lZRD6hwPvMQ4aL8hS7Xrau65h3UwN8TwLMvy2yX7CvRo4dvIarMavGVmieVRgcVNY+18AOX2osSF1xDc08UBT94D8QCYaID5hMQ==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5112d36e-0184-4547-a383-08d7d7cfc65d
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Apr 2020 13:06:08.0972 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: muhRl3gXVKB3xlmyTfGK9LNIiE4QBKzD37Q2W6NDahSRQ2jRLwE3jocDLR96ygaNOizGKQOSBvIyZXP+h4ePpScj1i94+kj5yA4RAfvRGpY=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3417
Archived-At: <https://mailarchive.ietf.org/arch/msg/masque/DoUvIepjwWSddO6tTp7PaOA_87U>
Subject: Re: [Masque] Updated proposed charter text
X-BeenThere: masque@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiplexed Application Substrate over QUIC Encryption <masque.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/masque>, <mailto:masque-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/masque/>
List-Post: <mailto:masque@ietf.org>
List-Help: <mailto:masque-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/masque>, <mailto:masque-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 13:06:32 -0000

Hi,
The previous charter proposal, shown in the BoF slides, refers to using QUIC as a candidate protocol for proxying traffic.
In the text you propose below, all mentions of QUIC are replaced with HTTP/3.
I'm afraid that specifying that HTTP/3 should serve as the substrate for the proxied traffic at this point will limit the possible solutions the working group can consider. Using the word QUIC instead of HTTP/3 in the charter text would allow the wg to consider a broader solution space, including something based on HTTP/3.

Marcus

-----Original Message-----
From: Masque <masque-bounces@ietf.org> On Behalf Of Christopher Wood
Sent: den 31 mars 2020 18:43
To: masque@ietf.org
Subject: [Masque] Updated proposed charter text

Based on last week's meeting, it seems folks are generally enthusiastic about some form of MASQUE moving forward. To help scope that particular form, here's an update to the proposed charter.

~~~
Many network topologies lead to situations where transport protocol proxying is beneficial. For example, proxying enables endpoints to communicate when end-to-end connectivity is not possible and can apply additional encryption where desirable (such as a VPN). Proxying can also improve client privacy, e.g., by hiding a client's IP address from a target server.

Proxying technologies such as SOCKS and HTTP(S) CONNECT exist, albeit with their own shortcomings. For example, SOCKS signalling is not encrypted and HTTP CONNECT is currently limited to TCP. In contrast, HTTP/3 is a viable candidate protocol for proxying arbitrary traffic, as it provides secure connectivity, multiplexed streams, and migration for a single connection while taking advantage of a unified congestion controller. HTTP/3 datagrams provide for unreliable data transmission, which enables transporting UDP and other unreliable flows via a proxy without introducing potentially redundant or unnecessary recovery mechanisms. Further, HTTP/3 supports an established request/response semantic that can set up and configure flows for different services.

The primary goal of this working group is to develop mechanisms that allow configuring and concurrently running multiple proxied stream- and datagram-based flows inside a HTTP/3 connection. The group will specify an HTTP-based signaling protocol for creating and configuring each service flow. The group will first focus on a limited set of client-initiated services such as IP, UDP, and TCP proxying. Specifying proxy server discovery mechanisms is out of scope for the group. However, the group may specify techniques for identifying proxy servers to aid future discovery mechanisms.

The group will coordinate closely with other working groups responsible for maintaining relevant protocol extensions, such as HTTPBIS, QUIC, or TLS.
~~~

This should address most of the issues raised during the meeting [1]. We'd like to hear what people think about this as a viable path forward.

Thanks,
Chris, on behalf of the chairs

[1] These issues include, though are not limited to:

1. Whether or not this is a new protocol or an extension of an existing protocol must be clear before moving forward.
2. Motivation for proxy technologies requires improvement. In particular, there’s no mention of privacy objectives.
3. The proxy threat model is unclear or underspecified. Does it model Tor’s threat model, or is it something simpler? (Meta question: should this be part of an existing document?) 4. Why are services beyond simple “CONNECT for UDP or IP” in scope? Should we focus on the simple datagram proxy case first and carve out room for extensibility?
5. To what extent is discovery out of scope?
6. Framework is perhaps not the best word to describe MASQUE.

Any errors or omissions from this list are entirely my fault!

--
Masque mailing list
Masque@ietf.org
https://www.ietf.org/mailman/listinfo/masque