Proposed Charter Text

Magnus Westerlund <magnus.westerlund@ericsson.com> Mon, 27 January 2020 12:22 UTC

Return-Path: <magnus.westerlund@ericsson.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0250C1200DF for <quic@ietfa.amsl.com>; Mon, 27 Jan 2020 04:22:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gzbr1JyCU4KQ for <quic@ietfa.amsl.com>; Mon, 27 Jan 2020 04:22:10 -0800 (PST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on20624.outbound.protection.outlook.com [IPv6:2a01:111:f400:7d00::624]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA1A612008D for <quic@ietf.org>; Mon, 27 Jan 2020 04:22:09 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Y8hgdITUubv6hp0MUoigquG/yqx7Ur+0B7qMhVFb8EBBit56Y2IgTfkSwEtKVlXNusgHNpxn32zOgynnAzB1zX0CceoWUCglmYUPbAHsbN0AblMCqOA35mr8l7a+zf21JcBYiAo5cwis2l13H6JQleBiwGap61e9UdU0UGWQB3tGuTT4H3QglQK6ek1+yUfLNHZpuvyTjF/GP+vhU3puZV8pfWqaGtBPPhPAsVhF8B6C4uZQTWnLs4s9jrC6aVrThI/+7tKsVRrNsWRVVoncF4oXXBLt9ROYBrG4R61LoEZq11rq6hSJjKwCJ2OGrVZRIZMB61PKhZPka7/hCVbs8Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Q8zmcRhw0Y1rVQlqLOIz9EcFl6oUVro0Tn3vF2xSTuA=; b=S5JeZpXTYu4LsWHvWBCTtTpFSMFZb8DowMJ9nXbCLzBDrwnX6Uzfc0kiobpH4neYuzE/UHle1fA27qYVJB82suPHrznIfSV9cnkBDYLoz9rqI/kB1fFeggjYXzN2JJM9v/HY+QZ9tdCm0CWO5cpAX+Lyq3/yk4L1Uq29zAhXNx26m59qw8tYmVovLeyoZH3h5MZ1F9gSYUev1WqBCCmRyARXo6LzmXSw36CpZUmKlTEJB2LeEaVGDqwjx3luL8YkFAf1/MNXWb4s+v7FKzL1AOEAjstV4+OL3oIX8xJm1nywRxTFndR9BnMMHERu/WBHzB/3ZJ8pvhiuvdeJUl3zUw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Q8zmcRhw0Y1rVQlqLOIz9EcFl6oUVro0Tn3vF2xSTuA=; b=apgarKSAsR0RcBQlqu4cZA440z+wuCgbOHlsA0m5L+wnZ5USqSHuh5XuqLGp8zK8o1TFEdxov1yOp9AkCyjIwwT2WtiXhMxFj5lZ/zPTjtU1KVWn6kTpxlCk/D4fh7vuqomGHWb/x48QbO01JXrF6pdW3X/u8eYqoQUYE/BZtEY=
Received: from DB7PR07MB4572.eurprd07.prod.outlook.com (52.135.133.12) by DB7PR07MB5354.eurprd07.prod.outlook.com (20.178.42.97) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.13; Mon, 27 Jan 2020 12:22:07 +0000
Received: from DB7PR07MB4572.eurprd07.prod.outlook.com ([fe80::cd9a:187a:90ab:3544]) by DB7PR07MB4572.eurprd07.prod.outlook.com ([fe80::cd9a:187a:90ab:3544%5]) with mapi id 15.20.2686.019; Mon, 27 Jan 2020 12:22:07 +0000
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
To: "quic@ietf.org" <quic@ietf.org>
Subject: Proposed Charter Text
Thread-Topic: Proposed Charter Text
Thread-Index: AQHV1QxjvPDTcWegp0eJWJe1gsp2Nw==
Date: Mon, 27 Jan 2020 12:22:07 +0000
Message-ID: <ff12ef2fd1890c0bed636007f9e99e37b6b9c463.camel@ericsson.com>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=magnus.westerlund@ericsson.com;
x-originating-ip: [158.174.130.211]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0596f8b0-21b2-4158-1fa4-08d7a323868b
x-ms-traffictypediagnostic: DB7PR07MB5354:
x-microsoft-antispam-prvs: <DB7PR07MB535472D103DD72E473A8F6D1950B0@DB7PR07MB5354.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02951C14DC
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(376002)(39860400002)(396003)(346002)(136003)(199004)(189003)(2906002)(966005)(6916009)(36756003)(478600001)(316002)(7116003)(6506007)(6512007)(6486002)(26005)(186003)(8936002)(81156014)(8676002)(3480700007)(81166006)(44832011)(5660300002)(2616005)(66946007)(64756008)(66446008)(66476007)(66616009)(66556008)(71200400001)(91956017)(76116006)(86362001); DIR:OUT; SFP:1101; SCL:1; SRVR:DB7PR07MB5354; H:DB7PR07MB4572.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: zW5vPqoMPrppH4eEbx7+y1nX1ak6wGOgvCno3Ej/j0yIUyoSuEbBrCM1+5eFoPGTz+SB1oyH81LTeF41ulz1+ce0kbHQc1XK5HqfqobMIR9sUTDqoEoi+ZunQq53szGpxInRolCLnHPM5HDkZtKEF/ySyrVJx60z42feM5BTtjei4F+8hJ7jT6h+AipqpDwuLlr8qw8pCpCVCoW7oqyf9X/MDYousuS5/88HBXnUw1Cd4AaQpZlqQsIO+G9nBW85MQtYrdRBVhVfvWnRbNSdSg84+YYPA8QeOC4YtQGY0Xk0pVrexcdji2uSpPI0Lp2c5A9yRAgVx24N+DE5JoKlLkejVWS3ByQaYagM7ioPnjrdOmZDQNUkvz1jyHJ6dTNrDFkGxBWnxt40O1yQ6/OwNoNVEFd8XTvStB1pXLwWjycIc9Hk3QsZ2NdXKgvF4o642VORRYWHKacUhmS6PuW/Z6aySP62Pzk/G603ql8RH1mfTi/EM1D35jY1ThGOTEjrE/H4JL/uXsoeX8ywVhdP3Q==
x-ms-exchange-antispam-messagedata: 0a91uDQ9zdotD9SBAmxdymXYvpE+6V5F8gElCzhDm9C6xT61I+AKwvQeVqhMnRtXCxox9DwoY1MWEbGkMLwK5m7QoZzjnuUOAWM3PEBGU46eaQejS6Lic9jd5xqc5Q0x7Y0UIy70IxsTDJ3wuBH7Kw==
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; micalg="sha-256"; protocol="application/x-pkcs7-signature"; boundary="=-QfwfWyxvMq79mSmz8VVY"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0596f8b0-21b2-4158-1fa4-08d7a323868b
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Jan 2020 12:22:07.1572 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: RMroCU8EIVz5qQqXdm+uTkbcTN92uvzr9i8U//FCLwqZ+D3TUPQ3mMBlrcumcN+womdfFMiTdkv/XPXe8nZPAsUS9soGcSn6vKIhTPTcEFc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR07MB5354
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/Ms1DUqzIkmRn--96esACgbmz_OI>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jan 2020 12:22:13 -0000

WG,

Below you will find the draft charter text proposed by ADs and WG chairs. I
intended to have the IESG agree to send this out for External Review at the next
IESG meeting (2020-02-06). So if you have any comments and proposal for changes
now is a good time. 

Below is a copy of the current draft in the datatracker:
https://datatracker.ietf.org/doc/charter-ietf-quic/

Diff: 
https://www.ietf.org/rfcdiff?url1=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fcharter-ietf-quic%2Fwithmilestones-01.txt&url2=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fcharter-ietf-quic%2Fwithmilestones-01-00.txt

QUIC WG Draft Charter (01-00)

The QUIC working group will provide standards-track specifications for a
UDP-
based, stream-multiplexing, encrypted transport protocol, based on
pre-
standardization implementation and deployment experience.

Key goals for QUIC are:

- Minimizing connection establishment and overall transport latency for
applications, starting with HTTP/2; - Providing multiplexing without
head-of-line blocking; - Requiring only changes to path endpoints to enable
deployment; - Enabling multipath and forward error correction extensions; and -
Providing always-secure transport, using TLS 1.3 by default.

The work of the group will have five main focus areas, corresponding to five
core deliverables.

The first of these is the core transport work, which will describe the wire
format, along with the mechanisms for connection establishment, stream
multiplexing, data reliability, loss detection and recovery, congestion
control, and options negotiation. Work on congestion control will describe use
of a standardized congestion controller as a default scheme for QUIC. Defining
new congestion control schemes is explicitly out of scope for this group. QUIC
is expected to support rapid, distributed development and testing of features.

The second of these focus areas is security. This work will describe how the
protocol uses TLS 1.3 for key negotiation and will also describe how those keys
are used to provide confidentiality and integrity protection of both
application data and QUIC headers. This work will ensure that QUIC has security
and privacy properties that are at least as good as a stack composed of TLS 1.3
using TCP (or MPTCP when using multipath).

The third focus area will describe mappings between specific application
protocols and the transport facilities of QUIC. The first mapping will be a
description of HTTP/2 semantics using QUIC, specifically with the goal of
minimizing web latency using QUIC. This mapping will accommodate the extension
mechanisms defined in the HTTP/2 specification. Upon completion of that
mapping, additional protocols may be added by updating this charter to include
them, or working elsewhere.

The fourth focus area will be on extensions to core protocol facilities, to
enable datagram delivery, version negotiation, and multipath capabilities.
Other extensions are out of the scope of this charter.

The fifth focus area will provide an Applicability and Manageability Statement,
describing how, and under what circumstances, QUIC may be safely used, and
describing deployment and manageability implications of the protocol.
Additionally, the Working Group will delivery a mechanism to assist load
balancers in their handling of QUIC.

Current practices for network management of transport protocols include the
ability to apply access control lists (ACLs), hashing of flows for equal-cost
multipath routing (ECMP), directional signaling of flows, signaling of flow
setup and teardown, and the ability to export information about flows for
accounting purposes. The QUIC protocol need not be defined to enable each of
these abilities, or enable them in the same way as they are enabled by TCP when
used with TLS 1.3, but the working group must consider the impact of the
protocol on network management practices, reflecting the tensions described in
RFC 7258.

Note that consensus is required both for changes to the current protocol
mechanisms and retention of current mechanisms. In particular, because
something is in the initial document set does not imply that there is consensus
around the feature or around how it is specified.

The QUIC working group will work closely with the HTTPbis working group,
especially on the QUIC mapping for HTTP/2.

-- 
Cheers

Magnus Westerlund 


----------------------------------------------------------------------
Networks, Ericsson Research
----------------------------------------------------------------------
Ericsson AB                 | Phone  +46 10 7148287
Torshamnsgatan 23           | Mobile +46 73 0949079
SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
----------------------------------------------------------------------