Re: [Masque] Dropping HTTP/1.x requirement for CONNECT-UDP
Ian Swett <ianswett@google.com> Thu, 25 March 2021 18:55 UTC
Return-Path: <ianswett@google.com>
X-Original-To: masque@ietfa.amsl.com
Delivered-To: masque@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 93D183A2A19 for <masque@ietfa.amsl.com>; Thu, 25 Mar 2021 11:55:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.498
X-Spam-Level:
X-Spam-Status: No, score=-17.498 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cowxalawEmow for <masque@ietfa.amsl.com>; Thu, 25 Mar 2021 11:55:13 -0700 (PDT)
Received: from mail-wm1-x332.google.com (mail-wm1-x332.google.com [IPv6:2a00:1450:4864:20::332]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46D8B3A2A1E for <masque@ietf.org>; Thu, 25 Mar 2021 11:55:13 -0700 (PDT)
Received: by mail-wm1-x332.google.com with SMTP id r10-20020a05600c35cab029010c946c95easo1754273wmq.4 for <masque@ietf.org>; Thu, 25 Mar 2021 11:55:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8hAIynKpQ6QFyayC+qMdTld377VTgglID4jD1Ke59ao=; b=tleR1qnPr6/L7sKuH06pxEjDQNtN6yA3f0RMkLWjmqnYU70zeXB2TxiLp6JrePHCDT 6opQbXoalXeb5YyaD/zbuWtYY6RObUwdINawO7pYsm4/NlfBHtwqRv+34ApN6Xr5ajvp KcBstgOu4oKO9WUSGKmE+PfQSfELZV95wH2GZmDpi7d/mlh1JfKpGiXNqXUf+ULp7w6k GrGYLtC0OaoWT11OL2BCebLupx9ubHT3XjER2jKmz919MzCMUEXn7OWmre3Mb3Lg/A7k c80aT9oc2DMqRuxJH4IXuiNctyPQ5dPlO6WCoEMOCmTyggTvI+LsV4U7TqcS1X5pvmiI M9sg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8hAIynKpQ6QFyayC+qMdTld377VTgglID4jD1Ke59ao=; b=Xu2LHbATR+w6Sz7mCU8tQEB6y9syJZ8inm2JZqNAmbIJYZsoG4awe9y0OYDSycTc9I PYIealfnccJGHS8QeE9Z7iHmfAwZpw0CrW793w0KhtJfKuVMJA7boZfYY3O0KUz32X38 U9p9H4yhR0pPm2r+14kj8mvHhDFZk5oo8SUz/Z8VqhxshY/gMWeUACR5LB74HgAjNRCe BiXpvwUce5wIE+hqPuul5rPaWfKYwYm+nl8WOjim5V3T0wMxdmgZvWkRr+kEq+peNTG3 lIImt8WjPFn0oemAsht77VL+8/JRIpDtoGoeaTVHGXpNiasLryezd2Nj/aqZUbmOHHuH TKyw==
X-Gm-Message-State: AOAM531Jdi0tbU74WJhiKwSUOxs/pewbULmXUs7JHcUWQhLauTQgm0+W FE/O4+MnMI5Bxhq4loCAHDqtchuJ1JZt4Ml5g/86Zw==
X-Google-Smtp-Source: ABdhPJwc6d5WycsIwaPThNBg/K5eQAasC3fRfNaJLye4voqrAffaOoj82OjCbkxmK2IDz2ucI9p3bVaBZs6XYjifNOU=
X-Received: by 2002:a05:600c:3796:: with SMTP id o22mr1822400wmr.139.1616698510680; Thu, 25 Mar 2021 11:55:10 -0700 (PDT)
MIME-Version: 1.0
References: <CAPDSy+5QOV-QfJVi1c1yN5KCawkibHfzZvWUaX3z9nby1tRKCg@mail.gmail.com> <CAHbWFkTjqo8kPfJZ1iYJf9Haz3bERSoo_hFuTEW7Ht-qVR=DqQ@mail.gmail.com> <2DFDA98E-E6A4-4D7A-9B22-043048ADF30E@apple.com> <4950F4ED-AF9C-493D-A72A-D2CFEE90C0FA@mnot.net> <9E9DFAEA-7B83-4208-AA99-770B70B6D569@apple.com> <CAPDSy+7ZWUeQt=Y6EvgSC=MeMAQ3QoHikta4g6ocyGViqTs0fg@mail.gmail.com> <CAKcm_gN561ruvtUL5JX9N0M58MN1dEQegWH0NuD6cGN-Badh9g@mail.gmail.com> <CAHbWFkR+5Y5jtXu2NnZ-fVxoFdSpBxP7ewutVPT0rfX1oHM6JQ@mail.gmail.com> <6476D243-6173-457F-9953-0382F7B7037B@ericsson.com> <CAKKJt-favDBmSWfBrHo3Pa1EXZ1MPsB6nxSe25x-O9i=VW+_Vw@mail.gmail.com> <CAHbWFkSsUovK-rrCGDguPgxbdLZVz4P7R5REsedxh6d38i7VqA@mail.gmail.com>
In-Reply-To: <CAHbWFkSsUovK-rrCGDguPgxbdLZVz4P7R5REsedxh6d38i7VqA@mail.gmail.com>
From: Ian Swett <ianswett@google.com>
Date: Thu, 25 Mar 2021 14:54:58 -0400
Message-ID: <CAKcm_gNHg7wXH2ypf0=yW0+cuiJLOeSCdED08ayyYVO5CE=fbw@mail.gmail.com>
To: Alex Chernyakhovsky <achernya@google.com>
Cc: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>, Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>, David Schinazi <dschinazi.ietf@gmail.com>, Mark Nottingham <mnot@mnot.net>, Roy Fielding <fielding@gbiv.com>, Tommy Pauly <tpauly@apple.com>, MASQUE <masque@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000070a28705be60f44e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/masque/tUj7hcIP5C2gxf4BWEmc3MNM6nU>
Subject: Re: [Masque] Dropping HTTP/1.x requirement for CONNECT-UDP
X-BeenThere: masque@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiplexed Application Substrate over QUIC Encryption <masque.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/masque>, <mailto:masque-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/masque/>
List-Post: <mailto:masque@ietf.org>
List-Help: <mailto:masque-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/masque>, <mailto:masque-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Mar 2021 18:55:22 -0000
I agree that I think we need all 3 versions and didn't intend my message to indicate that an h2 version shouldn't be created, but rather that I expect an h1 may be used quite widely. In terms of MITMs, David Schinazi pointed out that MITMs which block QUIC may also block CONNECT-UDP, and time will tell on that. On Thu, Mar 25, 2021 at 2:14 PM Alex Chernyakhovsky <achernya@google.com> wrote: > Hi Spencer, > > Can you please double-check if if all the instances of h1, h2, h3 you > wrote are correct? I'm having trouble parsing your message. > > I also want to add that I don't think restricting ourselves to h1 if h3 > fails makes much sense. h2 has benefits, and IMO we should use them over h1 > if h3 is unavailable. > > Sincerely, > -Alex > > > On Thu, Mar 25, 2021 at 10:06 AM Spencer Dawkins at IETF < > spencerdawkins.ietf@gmail.com> wrote: > >> I'm actually following up on something Ian said earlier ... >> >> On Thu, Mar 25, 2021 at 8:42 AM Mirja Kuehlewind <mirja.kuehlewind= >> 40ericsson.com@dmarc.ietf.org> wrote: >> >>> I agree. I thought that the mapping is actually relatively straight >>> forward though. With H2 you can have one CONNECT per stream (and no >>> datagram support). For H1 you can only have one CONNECT per connection and >>> you would open multiple TCP/HTTP connections for each forwarding request >>> separately. >>> >>> >>> >>> >>> >>> >>> >>> *From: *Masque <masque-bounces@ietf.org> on behalf of Alex >>> Chernyakhovsky <achernya=40google.com@dmarc.ietf.org> >>> *Date: *Wednesday, 24. March 2021 at 02:11 >>> *To: *Ian Swett <ianswett@google.com> >>> *Cc: *David Schinazi <dschinazi.ietf@gmail.com>, Mark Nottingham < >>> mnot@mnot.net>, Roy Fielding <fielding@gbiv.com>, Tommy Pauly < >>> tpauly@apple.com>, MASQUE <masque@ietf.org> >>> *Subject: *Re: [Masque] Dropping HTTP/1.x requirement for CONNECT-UDP >>> >>> >>> >>> I don't think aligning h1 and h2 makes sense. h2 is closer to h3 than it >>> is to h1. >>> >>> >>> >>> Sincerely, >>> >>> -Alex >>> >>> >>> >>> On Tue, Mar 23, 2021 at 7:25 PM Ian Swett <ianswett@google.com> wrote: >>> >>> IMO it makes sense to align the h1 and h2 designs, since they're both >>> fallbacks we'd rather not use. If h1+h2 lands after h3 in a different doc, >>> I don't see a problem with that, but I'm also fine with them being in a >>> single document. >>> >>> >>> >>> In a surprising number of cases where h3 is blocked, h2 is blocked as >>> well(ie: Corp MITMs) and users will end up on h1. Additionally, h1 is >>> still widely used behind load balancers/proxies. As such, by the time this >>> becomes RFC, I wouldn't be surprised if there's more usage of it over h1 >>> than h2. >>> >>> I know there's a conceptual reason for having mappings for h3, h2, and >> h1, but if Ian's experience here is typical, how bad would it be if the >> recommendation was to fall back from h3 to h1? >> >> If h2 doesn't work on a path now, do we want to encourage those operators >> to allow h2 and continue to block h3, rather than encouraging people to >> allow h3? >> >> Best, >> >> Spencer >> >>> >>> >>> I don't think the CONNECT-UDP design for h2 and h3 needs to share >>> framing, given h3 has datagrams and doesn't need frames transmitted on >>> streams to transmit UDP? >>> >>> >>> >>> On Tue, Mar 23, 2021 at 6:42 PM David Schinazi <dschinazi.ietf@gmail.com> >>> wrote: >>> >>> Or we could have one document now that describes CONNECT-UDP over h2 and >>> h3, and a separate document that defines CONNECT-UDP over h1 later? >>> >>> I'm not saying CONNECT-UDP should never support HTTP/1.1, I'm just >>> saying that maybe we don't need to design that yet. >>> >>> >>> >>> Thoughts? >>> >>> David >>> >>> >>> >>> On Mon, Mar 22, 2021 at 7:57 PM Tommy Pauly <tpauly@apple.com> wrote: >>> >>> Yes, that’s what I recall as well. >>> >>> David, can we still go down the path of using frames in HTTP/3 and >>> HTTP/2, while letting CONNECT-UDP have a more degenerate case for HTTP/1.1? >>> >>> Tommy >>> >>> > On Mar 22, 2021, at 7:53 PM, Mark Nottingham <mnot@mnot.net> wrote: >>> > >>> > My recollection is that this was discussed at length during >>> chartering, and the resolution was that we'd make it version-independent, >>> like other methods. If you want to re-visit that, I think we'd need to ask >>> the whole HTTP WG, not just a couple of people. >>> > >>> > Cheers, >>> > >>> > >>> >> On 23 Mar 2021, at 9:39 am, Tommy Pauly <tpauly@apple.com> wrote: >>> >> >>> >> While I understand the desire for this, I’m concerned about making a >>> method that only works with some versions. >>> >> >>> >> From >>> https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#methods >>> <https://protect2.fireeye.com/v1/url?k=57aa9374-0831aa71-57aad3ef-86d2114eab2f-8a67a28437e1dc6d&q=1&e=cd2d81ff-d165-41ed-836c-128d76921781&u=https%3A%2F%2Fhttpwg.org%2Fhttp-core%2Fdraft-ietf-httpbis-semantics-latest.html%23methods> >>> : >>> >> >>> >> HTTP defines a number of generic extension points that can be used to >>> introduce capabilities to the protocol without introducing a new version, >>> including methods, status codes, field names, and further extensibility >>> points within defined fields, such as authentication schemes and >>> cache-directives (see Cache-Control extensions in Section 5.2.3 of >>> [Caching]). Because the semantics of HTTP are not versioned, these >>> extension points are persistent; the version of the protocol in use does >>> not affect their semantics. >>> >> >>> >> Version-independent extensions are discouraged from depending on or >>> interacting with the specific version of the protocol in use. When this is >>> unavoidable, careful consideration needs to be given to how the extension >>> can interoperate across versions. >>> >> >>> >> I’d like to hear the opinions of Mark and Roy on this. >>> >> >>> >> Tommy >>> >> >>> >>> On Mar 22, 2021, at 3:21 PM, Alex Chernyakhovsky <achernya= >>> 40google.com@dmarc.ietf.org> wrote: >>> >>> >>> >>> I think this makes a lot of sense. As it stands today, anyone >>> wishing to add UDP support would have to make changes to their >>> client/server anyway -- I feel like the complexity we'd take on by >>> continuing to support HTTP/1.1 and older isn't beneficial since we wouldn't >>> be able to interoperate with existing implementations with the new >>> features. Requiring HTTP/2 or newer lets us rely on a lot of nice things >>> that have been added (like multiplexing) and not have to re-invent them in >>> HTTP/1.1 just for UDP. >>> >>> >>> >>> Sincerely, >>> >>> -Alex >>> >>> >>> >>> On Thu, Mar 18, 2021 at 6:12 PM David Schinazi < >>> dschinazi.ietf@gmail.com> wrote: >>> >>> Hi MASQUE enthusiasts, >>> >>> >>> >>> The CONNECT-UDP draft currently states "The CONNECT-UDP method is >>> defined for all versions of HTTP." While supporting HTTP/3 is our top >>> priority, and supporting HTTP/2 is necessary because of networks that block >>> UDP, I'm not sure supporting versions of HTTP before 2 is useful. >>> Additionally, it constrains our design space as HTTP/1.1 does not have the >>> HTTP framing layer that HTTP/2 and HTTP/3 have. I would like to drop >>> support for HTTP/1.1, 1.0 and 0.9. >>> >>> >>> >>> Does anyone object to dropping the requirement to support versions >>> of HTTP before 2? >>> >>> >>> >>> Thanks, >>> >>> David >>> >>> -- >>> >>> Masque mailing list >>> >>> Masque@ietf.org >>> >>> https://www.ietf.org/mailman/listinfo/masque >>> >>> -- >>> >>> Masque mailing list >>> >>> Masque@ietf.org >>> >>> https://www.ietf.org/mailman/listinfo/masque >>> >> >>> > >>> > -- >>> > Mark Nottingham https://www.mnot.net/ >>> <https://protect2.fireeye.com/v1/url?k=0c525adb-53c963de-0c521a40-86d2114eab2f-69a3e42f0cf4ffba&q=1&e=cd2d81ff-d165-41ed-836c-128d76921781&u=https%3A%2F%2Fwww.mnot.net%2F> >>> > >>> > -- >>> > Masque mailing list >>> > Masque@ietf.org >>> > https://www.ietf.org/mailman/listinfo/masque >>> >>> -- >>> Masque mailing list >>> Masque@ietf.org >>> https://www.ietf.org/mailman/listinfo/masque >>> >>> -- >>> Masque mailing list >>> Masque@ietf.org >>> https://www.ietf.org/mailman/listinfo/masque >>> >>
- [Masque] Dropping HTTP/1.x requirement for CONNEC… David Schinazi
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Tommy Pauly
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Alex Chernyakhovsky
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Mark Nottingham
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Tommy Pauly
- Re: [Masque] Dropping HTTP/1.x requirement for CO… David Schinazi
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Ian Swett
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Martin Thomson
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Lucas Pardue
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Alex Chernyakhovsky
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Ian Swett
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Mirja Kuehlewind
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Spencer Dawkins at IETF
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Tommy Pauly
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Alex Chernyakhovsky
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Ian Swett
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Spencer Dawkins at IETF
- Re: [Masque] Dropping HTTP/1.x requirement for CO… Tommy Pauly