Re: [quicwg/base-drafts] VN packets may be dropped more often when the QUIC bit is 0 (#2400)

MikkelFJ <notifications@github.com> Fri, 08 February 2019 07:22 UTC

Return-Path: <noreply@github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F138130F3B for <quic-issues@ietfa.amsl.com>; Thu, 7 Feb 2019 23:22:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.001
X-Spam-Level:
X-Spam-Status: No, score=-8.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FItTIGGvH93E for <quic-issues@ietfa.amsl.com>; Thu, 7 Feb 2019 23:22:45 -0800 (PST)
Received: from out-2.smtp.github.com (out-2.smtp.github.com [192.30.252.193]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6554D130F3A for <quic-issues@ietf.org>; Thu, 7 Feb 2019 23:22:45 -0800 (PST)
Date: Thu, 07 Feb 2019 23:22:44 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1549610564; bh=niyoy+Kqw1UyAUMyOBnp7Fg/79BtECJVXjh5V3ujwZE=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=sVGosYhy7hung9cDr66VptquPSqFNe/ze5nVgje9irVGOeIkqwUgF/4qCVrbki4ID iLIEkCGcbp20gWoao7QVCICzb7LkayS3/2cTep/tlYDRv5DcfynCBnMDE2COU58vZ7 smENaOqufYx0CVRryTAR85hyTQfrvCPOooSwRAm0=
From: MikkelFJ <notifications@github.com>
Reply-To: quicwg/base-drafts <reply+0166e4abed3b470d0374f3e8073fea6d0f578d86835f3cd992cf000000011874f04492a169ce18321f5a@reply.github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <quicwg/base-drafts/issues/2400/461713773@github.com>
In-Reply-To: <quicwg/base-drafts/issues/2400@github.com>
References: <quicwg/base-drafts/issues/2400@github.com>
Subject: Re: [quicwg/base-drafts] VN packets may be dropped more often when the QUIC bit is 0 (#2400)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5c5d2e443176d_7acb3fb9c32d45bc499d"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: mikkelfj
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/4sHYJQITzZr0DNo31ndXgDd2lII>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Feb 2019 07:22:48 -0000

I’m in favor of always setting the bit, and if not, symmetric header protection.

There are significant symmetric use cases, including NAT-punching p2p.

Making it 1 permanently lets QUIC co-exist, eg on a single client 443 port, and it avoids a lot of potential problems over a bit that is not needed.


________________________________
Fra: Kazuho Oku <notifications@github.com>
Sendt: fredag, februar 8, 2019 7:14 AM
Til: quicwg/base-drafts
Cc: MikkelFJ; Comment
Emne: Re: [quicwg/base-drafts] VN packets may be dropped more often when the QUIC bit is 0 (#2400)


(2) bring it under header protection for server-generated packets only.

I would oppose to such a design, because that disables a reverse proxy from using a single port for accepting connections and also for initiating connections, assuming that either the proxy or a middlebox in front of the proxy relies on the QUIC bit to route the packets. Greasing would be fine, because it's not something to be required for every endpoint to implement.

Are there any privacy implications to there being a "client bit"?

The bit would be a good indicator to police P2P traffic for ISPs...

—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub<https://github.com/quicwg/base-drafts/issues/2400#issuecomment-461702432>, or mute the thread<https://github.com/notifications/unsubscribe-auth/AALzNxSA70R6OnQ0JdIwj0SmzAOEPCWYks5vLRXVgaJpZM4afXoe>.


-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/quicwg/base-drafts/issues/2400#issuecomment-461713773