Return-Path: <noreply@github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id 2DD1B1310FA
 for <quic-issues@ietfa.amsl.com>; Mon,  7 Jan 2019 22:32:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.065
X-Spam-Level: 
X-Spam-Status: No, score=-8.065 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.065, DKIM_SIGNED=0.1,
 DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001,
 MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001]
 autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key)
 header.d=github.com
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id POJwJLddoLtU for <quic-issues@ietfa.amsl.com>;
 Mon,  7 Jan 2019 22:32:03 -0800 (PST)
Received: from out-6.smtp.github.com (out-6.smtp.github.com [192.30.252.197])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id 705EB1310F4
 for <quic-issues@ietf.org>; Mon,  7 Jan 2019 22:32:03 -0800 (PST)
Date: Mon, 07 Jan 2019 22:32:02 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com;
 s=pf2014; t=1546929122;
 bh=C8nSBUjCZJzRiFE1NqWFpZJ7C7q+0rm26KJmTbEEwWw=;
 h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID:
 List-Archive:List-Post:List-Unsubscribe:From;
 b=tedhKcq0W/DeZj3hskdlytRhnBi+oiHN7opmKPR6Tl8fdiaudtBegV25kwcrTGrX7
 DxRYxt3pwuhq0+nxu0wqAe737+WFTXnxotjtP8ZIOnhT0Ounuhp9wWy42rNF8BQAPb
 NGO4taR/KKUEpexdCgIa7djehNck4Gp9bWvhhdbg=
From: Kazuho Oku <notifications@github.com>
Reply-To: quicwg/base-drafts
 <reply+0166e4abaf36a02a33d35eace1192d94ae84495813f4ea1b92cf00000001184c05e292a169ce178a34b7@reply.github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <quicwg/base-drafts/issues/2279/452190473@github.com>
In-Reply-To: <quicwg/base-drafts/issues/2279@github.com>
References: <quicwg/base-drafts/issues/2279@github.com>
Subject: Re: [quicwg/base-drafts] address-based access control (#2279)
Mime-Version: 1.0
Content-Type: multipart/alternative;
 boundary="--==_mimepart_5c3443e22259b_10e23fb454cd45b83601ab";
 charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: kazuho
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/84WoRY4wcp-MqMpjZlEOe148Hb0>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG
 <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>,
 <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>,
 <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Jan 2019 06:32:05 -0000


----==_mimepart_5c3443e22259b_10e23fb454cd45b83601ab
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

@janaiyengar 
> One advice here could be that if a server needs the client to not move to a different IP address, it can simply disable migration via the disable_migration TP. This is a policy decision of course.

I am not sure if I agree with the framing.

It is often the case that only _some_ of the URIs of an origin applies address-based authentication. I do not think that disallowing migration for the entire origin is the correct solution.

I think it is better to encourage (or requires) HTTP servers to consider "current IP address" as the client address of each HTTP request.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/quicwg/base-drafts/issues/2279#issuecomment-452190473
----==_mimepart_5c3443e22259b_10e23fb454cd45b83601ab
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<p><a class=3D"user-mention" data-hovercard-type=3D"user" data-hovercard-=
url=3D"/hovercards?user_id=3D11067604" data-octo-click=3D"hovercard-link-=
click" data-octo-dimensions=3D"link_type:self" href=3D"https://github.com=
/janaiyengar">@janaiyengar</a></p>
<blockquote>
<p>One advice here could be that if a server needs the client to not move=
 to a different IP address, it can simply disable migration via the disab=
le_migration TP. This is a policy decision of course.</p>
</blockquote>
<p>I am not sure if I agree with the framing.</p>
<p>It is often the case that only <em>some</em> of the URIs of an origin =
applies address-based authentication. I do not think that disallowing mig=
ration for the entire origin is the correct solution.</p>
<p>I think it is better to encourage (or requires) HTTP servers to consid=
er "current IP address" as the client address of each HTTP request.</p>

<p style=3D"font-size:small;-webkit-text-size-adjust:none;color:#666;">&m=
dash;<br />You are receiving this because you are subscribed to this thre=
ad.<br />Reply to this email directly, <a href=3D"https://github.com/quic=
wg/base-drafts/issues/2279#issuecomment-452190473">view it on GitHub</a>,=
 or <a href=3D"https://github.com/notifications/unsubscribe-auth/AWbkq75O=
Sv7wSVyVFDrMwjWAAISWf4Pfks5vBDtigaJpZM4ZlOJ-">mute the thread</a>.<img sr=
c=3D"https://github.com/notifications/beacon/AWbkqyOL6KriJtb3je3HF03SdADM=
tFcPks5vBDtigaJpZM4ZlOJ-.gif" height=3D"1" width=3D"1" alt=3D"" /></p>
<script type=3D"application/json" data-scope=3D"inboxmarkup">{"api_versio=
n":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name"=
:"GitHub"},"entity":{"external_key":"github/quicwg/base-drafts","title":"=
quicwg/base-drafts","subtitle":"GitHub repository","main_image_url":"http=
s://github.githubassets.com/images/email/message_cards/header.png","avata=
r_image_url":"https://github.githubassets.com/images/email/message_cards/=
avatar.png","action":{"name":"Open in GitHub","url":"https://github.com/q=
uicwg/base-drafts"}},"updates":{"snippets":[{"icon":"PERSON","message":"@=
kazuho in #2279: @janaiyengar \r\n\u003e One advice here could be that if=
 a server needs the client to not move to a different IP address, it can =
simply disable migration via the disable_migration TP. This is a policy d=
ecision of course.\r\n\r\nI am not sure if I agree with the framing.\r\n\=
r\nIt is often the case that only _some_ of the URIs of an origin applies=
 address-based authentication. I do not think that disallowing migration =
for the entire origin is the correct solution.\r\n\r\nI think it is bette=
r to encourage (or requires) HTTP servers to consider \"current IP addres=
s\" as the client address of each HTTP request."}],"action":{"name":"View=
 Issue","url":"https://github.com/quicwg/base-drafts/issues/2279#issuecom=
ment-452190473"}}}</script>
<script type=3D"application/ld+json">[
{
"@context": "http://schema.org",
"@type": "EmailMessage",
"potentialAction": {
"@type": "ViewAction",
"target": "https://github.com/quicwg/base-drafts/issues/2279#issuecomment=
-452190473",
"url": "https://github.com/quicwg/base-drafts/issues/2279#issuecomment-45=
2190473",
"name": "View Issue"
},
"description": "View this Issue on GitHub",
"publisher": {
"@type": "Organization",
"name": "GitHub",
"url": "https://github.com"
}
}
]</script>=

----==_mimepart_5c3443e22259b_10e23fb454cd45b83601ab--

