[MBONED] Multicast to the Browser

"Holland, Jake" <jholland@akamai.com> Fri, 27 September 2019 04:03 UTC

Return-Path: <jholland@akamai.com>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id CBD3B1200D5 for <mboned@ietfa.amsl.com>; Thu, 26 Sep 2019 21:03:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id zfzuctzi0ZVX for <mboned@ietfa.amsl.com>; Thu, 26 Sep 2019 21:03:38 -0700 (PDT)
Received: from mx0b-00190b01.pphosted.com (mx0b-00190b01.pphosted.com [IPv6:2620:100:9005:57f::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AEC88120033 for <mboned@ietf.org>; Thu, 26 Sep 2019 21:03:38 -0700 (PDT)
Received: from pps.filterd (m0050102.ppops.net []) by m0050102.ppops.net-00190b01. ( with SMTP id x8R42wc3006326 for <mboned@ietf.org>; Fri, 27 Sep 2019 05:03:37 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : subject : date : message-id : content-type : content-id : content-transfer-encoding : mime-version; s=jan2016.eng; bh=TZnEE6FRiHLxqpHdzpLfIMgjuqTIcz5zFlQ/4kiilw0=; b=oqlZkg560gkJn6GKPRjwiADlcY6c0224VxqwoigeW0zpZVzDchcoY/TzkWkW8vTaPKiC t+OgxMkNX+itKO5PvVUnvY0zS4hdq7+5m4MACnZbj01jMUPuVpgqL+nkPlkqUbYHthoG pJvYFIushcv6sUqs5xq0MtaqlG+K41zXfY1K08+YtFBjdvns4/zIFLqJMYmy60IJzg2G N9gm8DodBfbPf6hAXZATc9QJ86Sz3yR668SoRVPWV/SFAlPu6wYc+NwZaqy4pxZ84OZ4 V6z9Hjv2kBEm1N+Oq5Ab9BS4PrHJhTnAPj1/yInOROrN51biDP6bF63P1ZVEB000UIQ3 fw==
Received: from prod-mail-ppoint8 (prod-mail-ppoint8.akamai.com [] (may be forged)) by m0050102.ppops.net-00190b01. with ESMTP id 2v73qpqubs-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <mboned@ietf.org>; Fri, 27 Sep 2019 05:03:36 +0100
Received: from pps.filterd (prod-mail-ppoint8.akamai.com []) by prod-mail-ppoint8.akamai.com ( with SMTP id x8R41vO7027506 for <mboned@ietf.org>; Fri, 27 Sep 2019 00:03:36 -0400
Received: from email.msg.corp.akamai.com ([]) by prod-mail-ppoint8.akamai.com with ESMTP id 2v73vqsfpa-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT) for <mboned@ietf.org>; Fri, 27 Sep 2019 00:03:36 -0400
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com ( by ustx2ex-dag1mb2.msg.corp.akamai.com ( with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 26 Sep 2019 23:03:35 -0500
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com ([]) by ustx2ex-dag1mb4.msg.corp.akamai.com ([]) with mapi id 15.00.1473.005; Thu, 26 Sep 2019 23:03:35 -0500
From: "Holland, Jake" <jholland@akamai.com>
To: "mboned@ietf.org" <mboned@ietf.org>
Thread-Topic: Multicast to the Browser
Thread-Index: AQHVdOiIMBnNkFOhz0G6CIaF22f1lA==
Date: Fri, 27 Sep 2019 04:03:34 +0000
Message-ID: <3B82B31F-25CE-4D32-A137-96814D1AA724@akamai.com>
Accept-Language: en-US
Content-Language: en-US
user-agent: Microsoft-MacOutlook/10.1d.0.190908
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: []
Content-Type: text/plain; charset="utf-8"
Content-ID: <C427C1908C7CE3448681E90BF22AF4C9@akamai.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-09-27_03:, , signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1909270038
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,1.0.8 definitions=2019-09-27_03:2019-09-25,2019-09-27 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=0 lowpriorityscore=0 mlxscore=0 malwarescore=0 bulkscore=0 adultscore=0 impostorscore=0 phishscore=0 mlxlogscore=999 clxscore=1015 priorityscore=1501 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1908290000 definitions=main-1909270038
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/23TqBUQkB2lD2_rBk0GApNs66t8>
Subject: [MBONED] Multicast to the Browser
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Sep 2019 04:03:41 -0000

Hi mboned,

I have finally posted a few docs that give an outline of the architecture
we're proposing to make multicast safe enough to run arbitrary interdomain
traffic, and to use it on web pages.

This is a slightly more concrete version of the hand-waving I did at the
meeting in Montreal, and hopefully explains what we're aiming for a little
more clearly.

WICG proposal:

That refers to a few IETF drafts.  I'd like to request some time in Singapore
to go over them.

I'm also requesting feedback about these docs at your earliest convenience,
as well as any comments you've got on whether these I-Ds are appropriate
for adoption in mboned (and if not, what you'd suggest instead):

1. DORMS (or: how to get metadata about multicast groups from senders):

I'll argue that this is in-scope for mboned, and hopefully not too hard
a read.  Its main point is to provide a vehicle for the metadata for the
other 2 docs, plus other future extensions.

2. CBACC (or: how to ensure the subscribed capacity level stays safe):

Although I think this doc will need review from TSV, I believe early work
and perhaps adoption is appropriate within mboned, since it's targeted at
enabling interdomain multicast support.

3. AMBI (or: how to authenticate the traffic, assuming you can send
some out-of-band hashes securely):

This one will of course need security review, and perhaps would be best
done in the security area, especially if we can re-open msec.

However, when we last presented the pre-split AMBI+ALTA proposal in
secdispatch, they said we should go find more people who are interested
and come back.

In my ideal world, I'd like to go back to secdispatch, ideally in Singapore,
with some consensus from mboned that this is a worthwhile direction that
would be valuable if it can be made to work (or to get advice from mboned
that it's not, if it's not).

So to anyone who can read the doc and post an opinion on that point, I'd be
very grateful.