Re: Fwd: New Version Notification for draft-kazuho-quic-address-bound-token-00.txt

Kazuho Oku <kazuhooku@gmail.com> Thu, 04 April 2019 07:20 UTC

Return-Path: <kazuhooku@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5570612044E for <quic@ietfa.amsl.com>; Thu, 4 Apr 2019 00:20:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ch7RmkLV3Xx6 for <quic@ietfa.amsl.com>; Thu, 4 Apr 2019 00:20:25 -0700 (PDT)
Received: from mail-lj1-x241.google.com (mail-lj1-x241.google.com [IPv6:2a00:1450:4864:20::241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58E40120448 for <quic@ietf.org>; Thu, 4 Apr 2019 00:20:25 -0700 (PDT)
Received: by mail-lj1-x241.google.com with SMTP id h21so1084943ljk.13 for <quic@ietf.org>; Thu, 04 Apr 2019 00:20:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=myoEAdBQZ8W0++3qZD1M6Z46A7Gysm3idC/BW7GoHmE=; b=RZjKsPOY7pZKgheVzd08FQOb4VUlaaPibntz17ImS04pelkKGklyMXPvw41M7+711N b21FiEC3e55TAKAMwPDMrbJgJyB2AjhFS9eN3AO9CGIYkNFLG6Wv0joq1grTMUbXcnyG 6ze2a3L+fHZmi1YR7Tjn27yTMvGW+hagZ2us94t9VifMszSioaRZus2Lc46hTNcxrtHe ZPq8nOpxdHLxTcMr3BOXcQFiJb3p15ozOKhnnn3DXUeMMSaSKU7aOm6cXpai9XlmMyuE 4DCO+OS7GXb9MIGzZKzgY1bOvmiFUEpP/XGfGgNSTO/q2oA4WyrOVBpq3Z3LVe0JoAxj 5qyA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=myoEAdBQZ8W0++3qZD1M6Z46A7Gysm3idC/BW7GoHmE=; b=ZswuFKsf3IsykCtVvuIyuvxsx7ZDP4AH7Qtxw0NMN0EpWttQqiz2XpyNpo3jX6qtV+ hNDVMgE0MoIOwCGqDCD+IxjmTAdZxvf1qUr+KDsCGl4pAAuEvaVaQWhdQc3yiO881S40 FOONkLFbT+bFPfhi5mmLiX63bFxIEoTu6KNWEIzHQPRazwgE7K3Dd1sYLQn2w3YbgVgX ZvlwUP32exsNQdJQ55q2qt2n8hRtnMPFV2PVlCXAquTNDn5c+7ByfNPJ7P9+t+yxjIjN tLPo26NWauu8OrQx5ySHFAH75yuNcI+iTMmRVMHXCi0LMs3loAJM7Jtd1mrgp55x7cis emeQ==
X-Gm-Message-State: APjAAAXHZrHyJbJS6Np39vRBuC6v4x6d0OfdLGUBtX6G7D0gJDCHNjP+ z5W9mkjyHZNgwT110YPkI3f9PV15n2dQR1KqhAM=
X-Google-Smtp-Source: APXvYqwoCJ88diSkddpsnBN5kiIaH+PRuBrYQGsaH3mBsuhk+5vY5BboooKwHjHAVbnMup6uHX6asE1kSNadJo8MTGg=
X-Received: by 2002:a2e:910b:: with SMTP id m11mr2574664ljg.14.1554362423544; Thu, 04 Apr 2019 00:20:23 -0700 (PDT)
MIME-Version: 1.0
References: <155435502215.22668.17009854749523198767.idtracker@ietfa.amsl.com> <CANatvzz+AUc=j+36yNq78Eu6vTjs1_OThCY2O=ivJLyZRe+3Og@mail.gmail.com> <CAN1APdf-vH2B-1OSX-ndrK=JM3vQet0Sf2tqeMMyrDKxtZyofg@mail.gmail.com>
In-Reply-To: <CAN1APdf-vH2B-1OSX-ndrK=JM3vQet0Sf2tqeMMyrDKxtZyofg@mail.gmail.com>
From: Kazuho Oku <kazuhooku@gmail.com>
Date: Thu, 04 Apr 2019 16:20:11 +0900
Message-ID: <CANatvzw5pNJPpg7wQiJBPpfpd9JNdu2Cp1kMyS4wA5YD23YFPw@mail.gmail.com>
Subject: Re: Fwd: New Version Notification for draft-kazuho-quic-address-bound-token-00.txt
To: Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>
Cc: IETF QUIC WG <quic@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/akd3lH9UUGV6Cvn12iEvDMgBjXo>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Apr 2019 07:20:30 -0000

Hi Mikkel,

Thank you for your comments. My responses inline.

2019年4月4日(木) 15:15 Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>:
>
> Nice work.
>
> Just a minor thing on priority in the appendix: what about IPv6 priorities? That, and flow labels - are we starting to bypass much of the IPv6 design because it is not (yet?) sufficiently widely deployed? Or are there security implications, and if so, should QUIC consider authenticating parts of the IPv6 header?

I do not have an opinion on the design aspects of IPv6, but I can see
at least two use-cases where you would want to use the priority scheme
described in the I-D.

1. Prioritization between different browser tabs. A web browser can
raise the priority of a connection that is bound to the window tab
that's in the front. This is the type of signal should not be exposed
to on-path observers, though we have thought that it's beneficial
between endpoints (IIRC that was one of the use-cases when we designed
the HTTP/2 prioritization scheme).

2. End-to-end cross-connection prioritization on a connection using
VPN. Related thought: maybe we need a separate TP that allows a client
to opt-out from a server using IP precedence.

>
> Also, on name based alternative:
> I’m wondering which non-HTTP/3 connections would really benefit as new designs can build in multi-purpose into the protocol whereas HTTP/3 must follow HTTP semantics. You could argue about WebRTC/3 - but then - what should it co-locate with which has sufficient intelligence to share the congestion controller? You could argue share with HTTP/3, but that would probably not rule out a name based solution either.
> I’m not saying name based CG sharing is necessarily better, I’m just wondering.

I am not sure if I am following, but I'd argue that there are two ways
of using the token. One is to consolidate the congestion controller,
and the other is to reuse the most up-to-date path information (e.g.,
BDP, RTT). For the former, it's essential to use the IP address as the
scope, because that's what identifies a server instance within which a
state can be shared. For the latter, the scope does not matter, though
the probability of receiving a fresh taken rises as the scope gets
bigger. That's one of the reasons the scope proposed by the draft is
"union of server-name and server's address tuple" (the other reason is
to avoid sending two types of tokens).

>
> OTOH if name based sharing is used that could place some assumptions on a given load balancers tuple stickiness, if I understand correctly. That could be unfortunate. Or, if name sharing is only to target address validation of the client perhaps different server hosts could share that information successfully with a random or round robin load balancer?
>
> Mikkel
>
> On 4 April 2019 at 07.22.32, Kazuho Oku (kazuhooku@gmail.com) wrote:
>
> Hi,
>
> I have (finally) submitted "Address-bound Token for QUIC" I-D, that
> proposes a QUIC extension allowing tokens to be shared between
> connections that go to the same server address, even when the value of
> SNI is different. Having such tokens would maximize our chance of
> skipping address validation and slow-start phase.
>
> The I-D and the repo can be found at the links below:
>
> I-D: https://datatracker.ietf.org/doc/draft-kazuho-quic-address-bound-token/
> Github repo: https://github.com/kazuho/draft-kazuho-quic-address-bound-token
>
> Please let us know what you think.
>
> Rationale behind the proposal:
>
> The startup phase (a.k.a. slow-start) is one of the things that has
> negative impact on user experience. QUIC, in addition to reducing the
> connection establishment latency from TCP, provides the possibility of
> a server skipping the startup phase when a client provides a valid
> token.
>
> However, the probability of a server being able to skip the startup
> phase relies on how frequent a user revisits a particular server,
> identified by the value of the TLS SNI extension. To put another way,
> there is a missed opportunity if a client is visiting a server
> instance that it has previously visited with a different server name.
>
> Our proposal addresses exactly that. The proposed extension allows a
> client to use a token for a different server name, if the server
> address is the same. This maximizes the chance of the server skipping
> address validation and the startup phase.
>
>
> ---------- Forwarded message ---------
> From: <internet-drafts@ietf.org>
> Date: 2019年4月4日(木) 14:17
> Subject: New Version Notification for
> draft-kazuho-quic-address-bound-token-00.txt
> To: Kazuho Oku <kazuhooku@gmail.com>
>
>
>
> A new version of I-D, draft-kazuho-quic-address-bound-token-00.txt
> has been successfully submitted by Kazuho Oku and posted to the
> IETF repository.
>
> Name: draft-kazuho-quic-address-bound-token
> Revision: 00
> Title: Address-bound Token for QUIC
> Document date: 2019-04-04
> Group: Individual Submission
> Pages: 6
> URL:
> https://www.ietf.org/internet-drafts/draft-kazuho-quic-address-bound-token-00.txt
> Status:
> https://datatracker.ietf.org/doc/draft-kazuho-quic-address-bound-token/
> Htmlized:
> https://tools.ietf.org/html/draft-kazuho-quic-address-bound-token-00
> Htmlized:
> https://datatracker.ietf.org/doc/html/draft-kazuho-quic-address-bound-token
>
>
> Abstract:
> This document describes a QUIC extension for an address-bound token.
> This token can be used for sharing address validation and congestion
> controller state between the same two endpoints across multiple
> connections and origins.
>
>
>
>
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
>
>
> --
> Kazuho Oku
>


-- 
Kazuho Oku