Re: [p2pi] Information in an ALTO protocol

"Spencer Dawkins" <spencer@wonderhamster.org> Mon, 25 August 2008 21:01 UTC

Return-Path: <p2pi-bounces@ietf.org>
X-Original-To: p2pi-archive@ietf.org
Delivered-To: ietfarch-p2pi-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1C8C13A6BFC; Mon, 25 Aug 2008 14:01:54 -0700 (PDT)
X-Original-To: p2pi@core3.amsl.com
Delivered-To: p2pi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 99F1C3A6BCB for <p2pi@core3.amsl.com>; Mon, 25 Aug 2008 14:01:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.002
X-Spam-Level:
X-Spam-Status: No, score=0.002 tagged_above=-999 required=5 tests=[BAYES_50=0.001, STOX_REPLY_TYPE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N6N42JA3qUyR for <p2pi@core3.amsl.com>; Mon, 25 Aug 2008 14:01:48 -0700 (PDT)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.197]) by core3.amsl.com (Postfix) with ESMTP id 612FA3A6BD0 for <p2pi@ietf.org>; Mon, 25 Aug 2008 14:01:48 -0700 (PDT)
Received: from s73602 (w173.z064002096.dfw-tx.dsl.cnc.net [64.2.96.173]) by mrelay.perfora.net (node=mrus0) with ESMTP (Nemesis) id 0MKp8S-1KXjBM3yj6-0005mP; Mon, 25 Aug 2008 17:01:03 -0400
Message-ID: <00d701c906f5$c5f2aee0$6501a8c0@china.huawei.com>
From: Spencer Dawkins <spencer@wonderhamster.org>
To: David R Oran <oran@cisco.com>, p2pi@ietf.org
References: <489B498B.4040804@telecomitalia.it> <20080811143531.GA18911@net.t-labs.tu-berlin.de> <E3361EDE-EDC6-4EF0-9249-B87B6C2D349C@nokia.com> <df9ced400808110837n57c79866se83369300812975e@mail.gmail.com> <20080811165443.GB18911@net.t-labs.tu-berlin.de><1219070969.6961.37.camel@bart2><48AAD5EF.5030303@alcatel-lucent.com> <BEEA9A6E-26F6-4314-B4B5-EB6396BA3DCF@cisco.com>
Date: Mon, 25 Aug 2008 16:01:38 -0500
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.3138
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198
X-Provags-ID: V01U2FsdGVkX18OFym7vPmxMX9G4T7gI+gZA+9oE0fbVNELicX z8WvNbrK8F13ofu+2V7U6+Y090T43ynda/GUCEaEHG1Dh5dBs1 G1IUtfqCMEveZdvrzkELYgbgU7DFMFsQBNSpaqriKQ=
Subject: Re: [p2pi] Information in an ALTO protocol
X-BeenThere: p2pi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: P2P Infrastructure Discussion <p2pi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/p2pi>
List-Post: <mailto:p2pi@ietf.org>
List-Help: <mailto:p2pi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: p2pi-bounces@ietf.org
Errors-To: p2pi-bounces@ietf.org

I strongly agree with Dave. I might suggest a couple of additions:

- the hop-by-hop and end-to-end distinction is important for a lot of other 
stuff besides security, in addition to security, and

- ("snork!") I'm not sure whether a NAT traversal story (which could be "use 
ICE, stupid") would be appropriate, but best to consider that up front as 
well.

Thanks,

Spencer

From: "David R Oran" <oran@cisco.com>

> This is only tangentially related to the main topic of this thread,
> but since it occurred to me on reading this exchange about server
> chaining I thought I'd mention it here:
>
> Many client/server protocols are were initially designed to be
> strictly two party, with no architectural support for proxies or other
> stateful intermediaries (HTTP and RTSP come to mind...there are likely
> many others).
>
> It may behoove us to build proxy capability into ALTO from day 1,
> since it will almost inevitably have to be added later at some level
> of pain, perhaps large, and almost assuredly some undesirable security
> tradeoffs.
>
> This probably involves at least the following:
> - separating our end-to-end from ho--by hop (transport layer?) security
> - clear data model separation between things used to "route" requests
> and things used to interpret queries.
> - a flexible addressing model
> - a way to aggregate and summarize in responses
>
> and likely a bunch of other considerations I'm missing in the above. 

_______________________________________________
p2pi mailing list
p2pi@ietf.org
https://www.ietf.org/mailman/listinfo/p2pi