Return-Path: <noreply@github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id 2788A130F2F
 for <quic-issues@ietfa.amsl.com>; Thu,  7 Feb 2019 22:14:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8
X-Spam-Level: 
X-Spam-Status: No, score=-8 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, 
 DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
 DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_32=0.001, HTML_MESSAGE=0.001,
 MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001]
 autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key)
 header.d=github.com
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 3IradqkGHReu for <quic-issues@ietfa.amsl.com>;
 Thu,  7 Feb 2019 22:14:49 -0800 (PST)
Received: from out-7.smtp.github.com (out-7.smtp.github.com [192.30.252.198])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id 7BB59130DC2
 for <quic-issues@ietf.org>; Thu,  7 Feb 2019 22:14:49 -0800 (PST)
Date: Thu, 07 Feb 2019 22:14:48 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com;
 s=pf2014; t=1549606488;
 bh=JPbzYexI4yNp/mq744psfyxMEJelj433mqa2ONTJEGU=;
 h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID:
 List-Archive:List-Post:List-Unsubscribe:From;
 b=PViKloyY6RXTCe8UY0M+Vr6bnv99DAxyfL/eEyIr7lWit1cGBUemGa7YwQGoq5wWV
 yxN+3dn3f5Z0AX/2XQfAvaQN+rXPJvTguB9rbUmBYwlQVFhvMaaIsZyKGYrKC05zax
 GlZEISY0NQokNGLiI602eeVgRVW5aro4XTkGrugA=
From: Kazuho Oku <notifications@github.com>
Reply-To: quicwg/base-drafts
 <reply+0166e4aba82f70fd796552a1cd0904cabd6627570534794292cf000000011874e05892a169ce18321f5a@reply.github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <quicwg/base-drafts/issues/2400/461702432@github.com>
In-Reply-To: <quicwg/base-drafts/issues/2400@github.com>
References: <quicwg/base-drafts/issues/2400@github.com>
Subject: Re: [quicwg/base-drafts] VN packets may be dropped more often when
 the QUIC bit is 0 (#2400)
Mime-Version: 1.0
Content-Type: multipart/alternative;
 boundary="--==_mimepart_5c5d1e5838460_2ca93fad0f4d45bc1725b8";
 charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: kazuho
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/GSmUAnlsKxUWFl_NZwSuth-xxsw>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG
 <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>,
 <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>,
 <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Feb 2019 06:14:51 -0000


----==_mimepart_5c5d1e5838460_2ca93fad0f4d45bc1725b8
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

> (2) bring it under header protection for server-generated packets only.

I would oppose to such a design, because that disables a reverse proxy from using a single port for accepting connections and also for initiating connections, assuming that either the proxy or a middlebox in front of the proxy relies on the QUIC bit to route the packets. Greasing would be fine, because it's not something to be required for every endpoint to implement.

> Are there any privacy implications to there being a "client bit"?

The bit would be a good indicator to police P2P traffic for ISPs...

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/quicwg/base-drafts/issues/2400#issuecomment-461702432
----==_mimepart_5c5d1e5838460_2ca93fad0f4d45bc1725b8
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<blockquote>
<p>(2) bring it under header protection for server-generated packets only=
.</p>
</blockquote>
<p>I would oppose to such a design, because that disables a reverse proxy=
 from using a single port for accepting connections and also for initiati=
ng connections, assuming that either the proxy or a middlebox in front of=
 the proxy relies on the QUIC bit to route the packets. Greasing would be=
 fine, because it's not something to be required for every endpoint to im=
plement.</p>
<blockquote>
<p>Are there any privacy implications to there being a "client bit"?</p>
</blockquote>
<p>The bit would be a good indicator to police P2P traffic for ISPs...</p=
>

<p style=3D"font-size:small;-webkit-text-size-adjust:none;color:#666;">&m=
dash;<br />You are receiving this because you are subscribed to this thre=
ad.<br />Reply to this email directly, <a href=3D"https://github.com/quic=
wg/base-drafts/issues/2400#issuecomment-461702432">view it on GitHub</a>,=
 or <a href=3D"https://github.com/notifications/unsubscribe-auth/AWbkq5AB=
KchZkBGUR6nk7Ap3rFhAq8knks5vLRXYgaJpZM4afXoe">mute the thread</a>.<img sr=
c=3D"https://github.com/notifications/beacon/AWbkqxIBBWmXHwt5l32UWKMA4GTt=
o6MMks5vLRXYgaJpZM4afXoe.gif" height=3D"1" width=3D"1" alt=3D"" /></p>
<script type=3D"application/json" data-scope=3D"inboxmarkup">{"api_versio=
n":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name"=
:"GitHub"},"entity":{"external_key":"github/quicwg/base-drafts","title":"=
quicwg/base-drafts","subtitle":"GitHub repository","main_image_url":"http=
s://github.githubassets.com/images/email/message_cards/header.png","avata=
r_image_url":"https://github.githubassets.com/images/email/message_cards/=
avatar.png","action":{"name":"Open in GitHub","url":"https://github.com/q=
uicwg/base-drafts"}},"updates":{"snippets":[{"icon":"PERSON","message":"@=
kazuho in #2400: \u003e (2) bring it under header protection for server-g=
enerated packets only.\r\n\r\nI would oppose to such a design, because th=
at disables a reverse proxy from using a single port for accepting connec=
tions and also for initiating connections, assuming that either the proxy=
 or a middlebox in front of the proxy relies on the QUIC bit to route the=
 packets. Greasing would be fine, because it's not something to be requir=
ed for every endpoint to implement.\r\n\r\n\u003e Are there any privacy i=
mplications to there being a \"client bit\"?\r\n\r\nThe bit would be a go=
od indicator to police P2P traffic for ISPs..."}],"action":{"name":"View =
Issue","url":"https://github.com/quicwg/base-drafts/issues/2400#issuecomm=
ent-461702432"}}}</script>
<script type=3D"application/ld+json">[
{
"@context": "http://schema.org",
"@type": "EmailMessage",
"potentialAction": {
"@type": "ViewAction",
"target": "https://github.com/quicwg/base-drafts/issues/2400#issuecomment=
-461702432",
"url": "https://github.com/quicwg/base-drafts/issues/2400#issuecomment-46=
1702432",
"name": "View Issue"
},
"description": "View this Issue on GitHub",
"publisher": {
"@type": "Organization",
"name": "GitHub",
"url": "https://github.com"
}
}
]</script>=

----==_mimepart_5c5d1e5838460_2ca93fad0f4d45bc1725b8--

