Re: [p2pi] Information in an ALTO protocol

Lisa Dusseault <ldusseault@commerce.net> Wed, 27 August 2008 17:37 UTC

Return-Path: <p2pi-bounces@ietf.org>
X-Original-To: p2pi-archive@ietf.org
Delivered-To: ietfarch-p2pi-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D38D428C1A8; Wed, 27 Aug 2008 10:37:31 -0700 (PDT)
X-Original-To: p2pi@core3.amsl.com
Delivered-To: p2pi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3C00D3A684A for <p2pi@core3.amsl.com>; Wed, 27 Aug 2008 10:37:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.123
X-Spam-Level:
X-Spam-Status: No, score=-1.123 tagged_above=-999 required=5 tests=[AWL=0.236, BAYES_00=-2.599, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NoKsvH5AzcAk for <p2pi@core3.amsl.com>; Wed, 27 Aug 2008 10:37:29 -0700 (PDT)
Received: from gateout01.mbox.net (gateout01.mbox.net [165.212.64.21]) by core3.amsl.com (Postfix) with ESMTP id 4BF7F3A6C24 for <p2pi@ietf.org>; Wed, 27 Aug 2008 10:37:29 -0700 (PDT)
Received: from gateout01.mbox.net (gwsmtp.usa.net [165.212.65.102]) by gateout01.mbox.net (Postfix) with ESMTP id 99427CDC4B; Wed, 27 Aug 2008 17:37:24 +0000 (GMT)
Received: from GW2.EXCHPROD.USA.NET [165.212.116.254] by gateout01.mbox.net via smtad (C8.MAIN.3.45S) with ESMTP id XID684mHARly1957Xo1; Wed, 27 Aug 2008 17:37:24 -0000
X-USANET-Source: 165.212.116.254 IN ldusseault@commerce.net GW2.EXCHPROD.USA.NET
X-USANET-MsgId: XID684mHARly1957Xo1
Received: from [10.1.1.130] ([157.22.41.236]) by GW2.EXCHPROD.USA.NET over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Wed, 27 Aug 2008 11:37:23 -0600
Message-Id: <95B8804E-1B84-4ECA-BC68-9D4FE715F019@commerce.net>
From: Lisa Dusseault <ldusseault@commerce.net>
To: David R Oran <oran@cisco.com>
In-Reply-To: <50EBE8E6-2819-457E-BB21-94184CD4BD32@cisco.com>
Mime-Version: 1.0 (Apple Message framework v928.1)
Date: Wed, 27 Aug 2008 10:37:22 -0700
References: <489B498B.4040804@telecomitalia.it> <20080811143531.GA18911@net.t-labs.tu-berlin.de> <E3361EDE-EDC6-4EF0-9249-B87B6C2D349C@nokia.com> <df9ced400808110837n57c79866se83369300812975e@mail.gmail.com> <20080811165443.GB18911@net.t-labs.tu-berlin.de> <1219070969.6961.37.camel@bart2> <48AAD5EF.5030303@alcatel-lucent.com> <BEEA9A6E-26F6-4314-B4B5-EB6396BA3DCF@cisco.com> <91D210DB-C42D-4430-A46C-B6CE10AEA4AE@commerce.net> <59F52543-CDB0-41FB-991D-7985E8237559@cisco.com> <3D7E15E8-C27C-4B12-9A6B-627EA6767627@commerce.net> <50EBE8E6-2819-457E-BB21-94184CD4BD32@cisco.com>
X-Mailer: Apple Mail (2.928.1)
X-OriginalArrivalTime: 27 Aug 2008 17:37:24.0322 (UTC) FILETIME=[90F44420:01C9086B]
Cc: p2pi@ietf.org
Subject: Re: [p2pi] Information in an ALTO protocol
X-BeenThere: p2pi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: P2P Infrastructure Discussion <p2pi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/p2pi>
List-Post: <mailto:p2pi@ietf.org>
List-Help: <mailto:p2pi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: p2pi-bounces@ietf.org
Errors-To: p2pi-bounces@ietf.org

On Aug 27, 2008, at 10:25 AM, David R Oran wrote:

>
> On Aug 27, 2008, at 1:18 PM, Lisa Dusseault wrote:
>
>>
>> On Aug 27, 2008, at 9:58 AM, David R Oran wrote:
>>>
>>> Yeah:
>>> 1. my ISP runs a redirector to their "transparent" ALTO server so  
>>> I can't get directly to the one I want to get to.
>>
>> How does this use case affect protocol design in the short term?   
>> Other than the agreed principles of good design, I mean.  An ISP  
>> can run any kind of internal protocol and we're a long way away  
>> from generalized interoperability between agents deployed within an  
>> ISP.
>>
> Like any middlebox, it's helpful if there's a clean separation  
> between the things the middlebox can fool with and the things that  
> get integrity protected end-to-end.
>
>>>
>>> 2. My P2P "community" wants to cache and do lookaside stuff to  
>>> provide more globally optimized swarm spreading. So, I use their  
>>> Alto "proxy" and let them help decide who needs to be asked for  
>>> what.
>>
>> This is a use case I've been talking to people about in a different  
>> context, and it's a difficult one.  If the swarm's Alto server can  
>> ask as itself for useful information, probably public information,  
>> then that's easy.  But if the swarm's Alto server has to ask for  
>> information "on behalf of" a swarm member, then we have difficult  
>> delegation and permission issues.  I had assumed we wouldn't want  
>> to tackle that in the first batch of ALTO work.
> I agree this is difficult in general. It's just been my experience  
> that adding proxy hooks to a protocol that did not envision them has  
> been messy and painful. That's not to say I necessarily believe we  
> will need the full generality you talk about below.

I agree we agree... :)  I guess we'll see how this plays out in  
protocol design, and it will be at least amusing and perhaps useful to  
do an exercise imagining how an ALTO base protocol can or should be  
extended before it's baked.

>
>> But even if the swarm's Alto server can get information from other  
>> places, publically or through delegation, and compile that or  
>> forward it, the next thing to bring into question is whether the  
>> end consumer of the information needs to know where the information  
>> came from originally.  I don't even know what lesson one can draw  
>> from HTTP but I'd probably be able to put up a good argument for  
>> learning that proxy information is mostly useless.  Most proxy and  
>> forwarding information that actually appears in HTTP traffic is  
>> ignored by clients, and most traffic does not even go through non- 
>> transparent proxies.  IOW, most proxying of HTTP, and all compiling  
>> of responses, happens transparently, and does not use the protocol  
>> headers that were designed for handling intermediaries.
>>
> Do you think this was inherent, or because it was a bolt-on?

This I do not know.  I have a gut feeling it's inherent.  Perhaps meta- 
information isn't as useful as we programmers usually think it is?   
There's definitely a pattern across protocols, whether the meta- 
information is provided initially or as a bolt-on, of that being less  
used than anticipated.  This might be random rather than a pattern --  
just a natural product of designing a bunch of stuff and being wrong  
about a random selection of features being useful.   It's too loose to  
nail down, at least for me.

Lisa

_______________________________________________
p2pi mailing list
p2pi@ietf.org
https://www.ietf.org/mailman/listinfo/p2pi