Re: Opsdir last call review of draft-ietf-quic-manageability-14

Mirja Kuehlewind <mirja.kuehlewind@ericsson.com> Wed, 16 March 2022 14:39 UTC

Return-Path: <mirja.kuehlewind@ericsson.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B27F3A18D9; Wed, 16 Mar 2022 07:39:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.111
X-Spam-Level:
X-Spam-Status: No, score=-2.111 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2RZP0O_GsYTk; Wed, 16 Mar 2022 07:39:44 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on20612.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1a::612]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B2003A18D7; Wed, 16 Mar 2022 07:39:42 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CrDawk3nr8Wzrzdx/NsKHjbPTGra13Re4nu1JoUQxDOsr5BWz6HIXbt23SEytxmc5n9Ye63y+N3z+ZDMH8mNnMxXY5NscXLvD+QP/ujvFPlWGLk2jB/i6kcIoCtf4uXFEFGNTdILxYMN41gVyXYJ9YF3lLYd7NK0zzGQ4pZeqqcc5ZTx2yR7I4GAKxwDGBPms54hGBGPa2XavVTu00+GD4pqhn2G6h4S8fpIPZVaLGasn3db5f3BTeLcX9DYkekcCJj5Zz5HWz/cSMS+Jk638zYhQJ4ea0r9rZcfVnf3Neg+hOiK8fLENhhsSK8Jp/fCRNITG+2RlCpDNT0ns8/SzQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0ZiRRse2P+yRGBW/3HEa6wlcx9+smvyWcqYUVOmBq/4=; b=Lnsd3ow8NSYbT4mPXfOmiFDkm7cJAQ99unsY3M8hS8x3+vR6ZoWHgWn/gzwsIldfC0c/1nriZaHIJbF07AaepCaWE8xzSlEzB3KMbBeaZA+b0PcY4/ISJlwwc9DxhDNZtIQ/pA6GOFcaebdk1TdZhWIUnC8LPSdGmHoBYv9waTedF0d2d79MBDO8Rac7S6/PmqCxcTlONZlFP+k0/qFC9TL3/uzgR/APH3Yzq8pMRF5vHALxV9KhvznkrHnRue3POWoistb1iEq3Y/CSCVq68pfJ7biJn02nyeXZ/XSIhw1XLH8kN7XUT8vnZ1gyKFp6Yap/cMLILQ5Otr3+sqmoJw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0ZiRRse2P+yRGBW/3HEa6wlcx9+smvyWcqYUVOmBq/4=; b=mZSYrgXoxIzMZscmtbVcz6b1j6bvjhWDmFGACjAKa4FUEdRhS0xShB7/U9/qLVUeOse6q0hm1HoQow8+CO+Z6E6Kc4FdnanFEID/7bklFWd4voGGxij5BIAvIoZFgz617wLaZm0qcGbq4W3V7tYXIHEks7wGEIseLCKpqn524Kg=
Received: from PAXPR07MB7806.eurprd07.prod.outlook.com (2603:10a6:102:13a::19) by DB6PR07MB3238.eurprd07.prod.outlook.com (2603:10a6:6:23::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.15; Wed, 16 Mar 2022 14:39:38 +0000
Received: from PAXPR07MB7806.eurprd07.prod.outlook.com ([fe80::2c5e:2cdd:a91a:e68d]) by PAXPR07MB7806.eurprd07.prod.outlook.com ([fe80::2c5e:2cdd:a91a:e68d%5]) with mapi id 15.20.5081.015; Wed, 16 Mar 2022 14:39:37 +0000
From: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
To: "MORTON JR., AL" <acmorton@att.com>
CC: "last-call@ietf.org" <last-call@ietf.org>, "draft-ietf-quic-manageability.all@ietf.org" <draft-ietf-quic-manageability.all@ietf.org>, "quic@ietf.org" <quic@ietf.org>, "ops-dir@ietf.org" <ops-dir@ietf.org>
Subject: Re: Opsdir last call review of draft-ietf-quic-manageability-14
Thread-Topic: Opsdir last call review of draft-ietf-quic-manageability-14
Thread-Index: AdggNpsvC4XiX/liSmSPxtbxuobGvgG9Sw6AATXYhEAAaJAnAAC/IODgAiqHLAA=
Date: Wed, 16 Mar 2022 14:39:37 +0000
Message-ID: <346C0025-B1CB-4CAF-BB23-A7E09D79E9B5@ericsson.com>
References: <CH0PR02MB7980CA04E5EADBF6D25AD8F2D3319@CH0PR02MB7980.namprd02.prod.outlook.com> <D82872C2-4C79-45AB-92F1-9F27B324ADE0@ericsson.com> <CH0PR02MB79803C4AF8ED0F28A5F81D30D3009@CH0PR02MB7980.namprd02.prod.outlook.com> <5224BCAC-B8EC-4150-B3B1-5735056BC54C@ericsson.com> <CH0PR02MB798003A25A1C96D02F1FE525D3069@CH0PR02MB7980.namprd02.prod.outlook.com>
In-Reply-To: <CH0PR02MB798003A25A1C96D02F1FE525D3069@CH0PR02MB7980.namprd02.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.48.21041102
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e5d8190c-1dd8-4b25-b069-08da075acc14
x-ms-traffictypediagnostic: DB6PR07MB3238:EE_
x-microsoft-antispam-prvs: <DB6PR07MB323873A24384C6F172257805F4119@DB6PR07MB3238.eurprd07.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: BjpbdKrx4WF8U7pPcAGccHkaFzAZRVaCNm7oSOOGSMflJGN9Rv+BkqFQ6Qd2DBJ+noQXdMePLe4064w26CmQMLGo5CcdZJ8dDPA0EOr8E71sTFmejPrYwahmsMmebtNVneZNuHcojx28pkvXPO0VwF8aapoeO0H2Ts0yPPLRJo7Kw6+lBkV251mOM8YQazYBOo83oC0JDIIMhRxcXh6YeMwWVuDoztqkssP1CtfFlfNDvgB0zmgRParIgdDJoXcBPaElWObQ3dUwEj5roymEaZOXVCk1xiDaRabmqVOvAC7o/izL3J8zr1cDz3wKNX3+nc9QGWzV90lyIcJlpC27mm+1Re8EM1+5qPv0MixzpznrZLkMxH0Dz7tDpHQzNZXCBopz0kliahNCGOAUrvJErvIpqEpYI2wBX+xNzxMO6rXi4ZN+fpQKy4dbbUNaFOHz5rE/8uZq8216ToE1xggzw6xK//1koKV/jcBJ8eqgIunKDuXqG89llZC0Mc+zGpDS6NyReP0shfpMKXeEgYubrInVC0/cPYjOusdyrVnHR2s5NY3MKrlRqHzFAE8vdfDM5I0NCGQn+Ql8ANlMGC0A1mfOBKBR/aVekJjnD/lK5dFCclCP/CPtjiUYOP1jGx6RZhqKKqYSg9EVLPAY1129+0XvqSmJ66uZzg6Y5ppoF+RSRCNSU9OPzzyyV0KTlEGk9K8of9WnNjfPP/LcN+KqkhK4ZmveyEHG0LoRMf7dNKtQjglSRXTUVTKnm2pf1rRtp9UrpGEJg/HEBYYfXgyrUl0vhkbtyU/o/9s2ibd5m8IQpjsg12sJC79ybQ8xBxhALatYPR79xcPld9qs6ibNrA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAXPR07MB7806.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(38070700005)(8676002)(66476007)(64756008)(66946007)(4326008)(66556008)(66446008)(86362001)(91956017)(76116006)(8936002)(5660300002)(38100700002)(122000001)(30864003)(44832011)(2906002)(82960400001)(2616005)(186003)(6486002)(966005)(71200400001)(66574015)(6512007)(6506007)(508600001)(316002)(53546011)(83380400001)(6916009)(54906003)(36756003)(33656002)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <F6DC7D4135C63F469022855C0BCEC48C@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PAXPR07MB7806.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e5d8190c-1dd8-4b25-b069-08da075acc14
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Mar 2022 14:39:37.4000 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: mtLhWKIpX3jvHuxJi+bboghWi+XrWygwxnC5CoEP8Klknw7BJCHdQNLVY00PYPun8m45xjRC3Q1riDrF0OyZ0EG9XC/g0A4EaY/FoU+Y6o4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR07MB3238
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/gGfZEHIdaL1mtWjdKQy__JO3VFs>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Mar 2022 14:39:50 -0000

Hi Al,

as you might have seen we merged the remaining PRs and submitted a new version last week.
But unfortunately, I don't think we were able to address your comment below fully.

Regarding use of version number I believe the text in the draft reflects the group consensus, so we only made my editorial change to make if clearer.

Regarding when the handshake fails, I'm not sure if it would be correct to say anything more here. You can always just not see some of the packets on the path, or the handshake could even change with a new version or an extension I guess. Again I'm also not really sure what to do with that information either. If you don't see any further packets flowing at any time, incl. right after the handshake, something went either wrong or the transmission is just done. It's really hard to make any assumption from the network here.

Mirja

 

On 05.03.22, 17:02, "MORTON JR., AL" <acmorton@att.com> wrote:

    Hi Mirja, thanks for your replies and PRs.
    please see replies below, I clipped discussions we have closed.
    Al

    > -----Original Message-----
    > From: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
    > Sent: Tuesday, March 1, 2022 1:49 PM
    > To: MORTON JR., AL <acmorton@att.com>
    > Cc: last-call@ietf.org; draft-ietf-quic-manageability.all@ietf.org;
    > quic@ietf.org; ops-dir@ietf.org
    > Subject: Re: Opsdir last call review of draft-ietf-quic-manageability-14
    > 
    > Hi Al,
    > 
    > thanks again! See below!
    > 
    > On 27.02.22, 19:50, "MORTON JR., AL" <acmorton@att.com> wrote:
    > 
    > [snip]
    ...
    >     [acm] I see that there was additional editing since you wrote last Monday,
    > so I made a comment and suggestions on GitHub.
    > 
    > [MK] Thx! Added you suggestions!
    > 
    > [snip]
    > 
    > 
    >     >     >
    >     >     >     2.8.  Version Negotiation and Greasing
    >     >     >
    >     >     >     ...
    >     >     >        QUIC is expected to evolve rapidly, so new versions, both
    >     >     >        experimental and IETF standard versions, will be deployed
    > on the
    >     >     >        Internet more often than with traditional Internet- and
    >     > transport-
    >     >     >        layer protocols.  Using a particular version number to
    > recognize
    >     >     >        valid QUIC traffic is likely to persistently miss a
    > fraction of
    >     > QUIC
    >     >     >        flows and completely fail in the near future, and is
    > therefore
    >     > not
    >     >     >        recommended.
    >     >     >     [acm] Where "valid traffic" is the focus, I agree, let it
    > flow.
    >     >     >     But the Operator's focus may instead be "admissible traffic",
    > where
    >     >     >     experimental traffic is not wanted or allowed. IOW, only
    > traffic
    >     > that is
    >     >     >     understood to conform to <RFC list> shall pass, because
    > "Active
    >     > Attacks are
    >     >     >     also Pervasive", to put a different spin on 7258. [acm] See
    > also the
    >     > comment in
    >     >     >     3.4.1.
    >     >     >
    >     >     > [MK] This is not about experimentation.
    >     >     [acm]
    >     >     OK, let's just say unexpected traffic.
    >     >
    >     >     > The expectation is that QUIC versions
    >     >     > will change often, e.g. we already have a draft for a new version
    >     > adopted in
    >     >     > the group and there might be another RFC some time this year. So
    > if you
    >     >     > "manually" have to allow for new versions in all your equipment
    > that
    >     > will
    >     >     > delay deployment of new versions (or even hinder them because
    > there is
    >     > always
    >     >     > one box that doesn't get updated). Therefore we strongly recommend
    > to
    >     > not use
    >     >     > the version to filter QUIC traffic. Is that not clear enough in
    > the
    >     > text?
    >     >     >
    >     >     >        In addition, due to the speed of evolution of the
    >     >     >        protocol, devices that attempt to distinguish QUIC traffic
    > from
    >     > non-
    >     >     >        QUIC traffic for purposes of network admission control
    > should
    >     > admit
    >     >     >        all QUIC traffic regardless of version.
    >     >     [acm]
    >     >     I think it is clear, and at the same time, it is aspirational for
    > many
    >     > networks.
    >     >     This sentence informs, but then strays into policy.
    >     >
    >     >     Maybe this will work:
    >     >           ...devices that attempt to distinguish QUIC traffic from non-
    >     >            QUIC traffic for purposes of network admission control should
    > not
    >     > rely
    >     >            on the version field alone.
    >     >
    >     > [MK] I think your proposal is not correct because the whole point is
    > that you
    >     > really should not use the version field _at all_. I know that people
    > will
    >     > still do that, but I think we should at least spell it out clearly here
    > that
    >     > this is problematic and hinders evolution.
    >     [acm]
    >     Evolution is what happens when a succeeding RFC is approved.
    >     Experimentation is the many months between approvals.
    > 
    >     	...devices that attempt to distinguish QUIC traffic from non-
    >          QUIC traffic for purposes of network admission control
    >     *** should admit all QUIC traffic regardless of version.***
    >     The last phrase attempts to define operator policy.
    >     Don't do that.
    >     The version field exists. It's specified in a standard.
    >     If you simply say,
    >     "The version field will change in the future." no one will be surprised.
    > 
    > [MK] Okay I got your point about policy. However, this document is meant to
    > provide guidance/recommendations to operators. I also see now that this in the
    > "background" part which is also rather to explain QUIC than give
    > recommendations. However, I think this is actually one of the essential
    > recommendations of the document, so I would like to still spell this out
    > clearly and as early/often as possible. I tried a slightly different wording
    > in a new PR on github. Is that any better?
    > 
    > https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-0c8d12cf3c8f69d3&q=1&e=0560674f-fb74-4ca7-afd2-16c2148a7129&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fgithub.com%2Fquicwg%2Fops-
    > drafts/pull/459/files__;!!BhdT!mOHh0CyPDRUf9uvgZfIrDspADvFLupiMn-
    > 5czo4ercUtLNr7_gQJcuGTzI0cYadmIRktrtZrgoTKCp4DmqHssizC$
    > 
    [acm]
    Not yet. Maybe we can compose your message to operators *without* making it sound like you are trying to set policy.  I suggested text in the PR like this:

    Developers would prefer admission of all QUIC traffic regardless of version in order to support continuous version-based evolution. However, all parties understand the value of versions with a corresponding, fully-approved standard.

    > 
    >     >
    >     >     >
    >     >     >     [acm] I was hoping to see a description of fallback to TCP (I
    > see
    >     > that fallback
    >     >     >     is mentioned briefly at the end of section 4.2., and later,
    > fail
    >     > over and
    >     >     >     failover. pick one...)
    >     >     >
    >     >     >     How can Network Operators observe when a QUIC setup has
    > failed, and
    >     > the
    >     >     >     corresponding TCP fallback connection(s) succeeded?
    >     >     >
    >     >     > [MK] There is no unified way how and if fallback is implemented.
    >     > However, why
    >     >     > do you think a network operator would need that information?
    >     >     [acm]
    >     >     To affirm that their admission policy is working properly, for one
    > reason.
    >     >
    >     > [MK] However, there is really no guarantee that all QUIC will have a
    > fallback.
    >     > Without further knowledge about what higher layer service the QUIC
    > transport
    >     > carries, I don't think you can make any assumption about fallback. If
    > you want
    >     > to support evolution, you need to support QUIC and not rely on any
    > potentially
    >     > fallbacks.
    >     [acm]
    >     I chose example carefully: the operator wants to support QUIC, but has
    > reports that QUIC setup is failing and needs to make measurements to gather
    > symptoms & info. Experience will indicate the circumstances where QUIC setup
    > failure is accompanied by fallback, and other possibilities. Repeated
    > experiences become heuristics for passive observation.
    >     No assumptions necessary.
    >     Has QUIC setup failed if the exchanges in Figure 1 are incomplete?
    >     I think there might be a yes or no answer...
    >     If no, then the passive observation procedure will mostly be governed by
    > heuristics.
    > 
    > [MK] I think I lost the point now. If QUIC fails even if there is a fallback,
    > that's still not great because the original intention was obviously to use
    > QUIC. Is there anything we need to say in the draft that is missing?
    [acm] 
    Without getting into fallback in any way, 
    Help the operator determine when a QUIC setup has failed by providing a little more info.
    It would be useful to know:
    What QUIC messages would accompany a QUIC setup failure? (other than those in Figure 1)
    OR
    A statement like: 
    If the exchange in Figure 1 is incomplete, then the QUIC setup has failed.
    (IF that is true)


    > 
    >     >
    >     >     >
    >     >     >     Is there a reference available with this info, to save effort
    > here?
    >     >     >
    >     >     > [MK] As I said this is rather implementation specific, so I would
    > say
    >     > no.
    >     >     >
    >     >     >     ...
    >     >     >
    >     >     >     3.4.1.  Extracting Server Name Indication (SNI) Information
    >     >     >
    >     >     >     ...
    >     >     >
    >     >     >        Note that proprietary QUIC versions, that have been
    > deployed
    >     > before
    >     >     >        standardization, might not set the first bit in a QUIC long
    >     > header
    >     >     >        packet to 1.  However, it is expected that these versions
    > will
    >     >     >        gradually disappear over time.
    >     >     >     [acm]
    >     >     >     And some networks may prefer not to admit experimental
    > traffic. The
    >     > goal of the
    >     >     >     experiment may be problematic for the network operator and/or
    > their
    >     >     >     subscribers. I think this is legitimate operator behavior, and
    > worth
    >     > a few more
    >     >     >     words in the draft.
    >     >     >
    >     >     > [MK] To be honest I don't understand this point. How would an
    > operator
    >     > even
    >     >     > know if an experiment would be problematic or no? QUIC is fully
    >     > encrypted.
    >     >     > Versioning is only one extension mechanism. So basically even if
    > you see
    >     > the
    >     >     > same version number, the QUIC behind that could behave very
    > differently
    >     >     > depending on which extensions are used and because of the
    > encryption,
    >     > there is
    >     >     > no chance for the operator to know about this. Is this not clear
    > in the
    >     >     > document? Do we need to state this more clearly?
    >     >     [acm]
    >     >     First, let's say s/experimental/unexpected/ or
    > s/experimental/proprietary/
    >     >     Then, I'm responding to your reply more than the paragraph in the
    > draft
    >     > now:
    >     >     Network operators are also end users, and often act on their
    > subscriber's
    >     > behalf. Observations are not strictly limited to mid-points, where
    > encryption
    >     > is present.
    >     >     Harboring old notions of what operators cannot do will not sit well
    > with
    >     > your audience...
    >     >
    >     >     So, (in the paragraph above) you've informed operators that some
    >     > proprietary QUIC versions remain in use as of this writing.
    >     >     But traffic that doesn't conform *might* be considered nefarious.
    > That's
    >     > all. It's a message for everyone involved.
    >     >
    >     > [MK] I think the point is actually rather that we want to say here: if
    > you
    >     > don't support these old versions that will not be a problem in the near
    >     > future.
    >     [acm]
    >     Ok, say that in the draft, please.
    > 
    > [MK] Okay started a PR on github. Is that more clear now?
    > 
    > https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-0c8d12cf3c8f69d3&q=1&e=0560674f-fb74-4ca7-afd2-16c2148a7129&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fgithub.com%2Fquicwg%2Fops-
    > drafts/pull/460/files__;!!BhdT!mOHh0CyPDRUf9uvgZfIrDspADvFLupiMn-
    > 5czo4ercUtLNr7_gQJcuGTzI0cYadmIRktrtZrgoTKCp4DmqkDVmpL$
    > 
    > 
    [acm] 
    I'm ok with this one, thanks.

    >