Re: Fwd: New Version Notification for draft-kazuho-quic-address-bound-token-00.txt

Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com> Thu, 04 April 2019 06:15 UTC

Return-Path: <mikkelfj@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B01FE12039A for <quic@ietfa.amsl.com>; Wed, 3 Apr 2019 23:15:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SNMdJuxGSg-4 for <quic@ietfa.amsl.com>; Wed, 3 Apr 2019 23:15:19 -0700 (PDT)
Received: from mail-it1-x142.google.com (mail-it1-x142.google.com [IPv6:2607:f8b0:4864:20::142]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8EA2C120338 for <quic@ietf.org>; Wed, 3 Apr 2019 23:15:19 -0700 (PDT)
Received: by mail-it1-x142.google.com with SMTP id 139so1831528ita.4 for <quic@ietf.org>; Wed, 03 Apr 2019 23:15:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:in-reply-to:references:mime-version:date:message-id:subject:to; bh=g+/bBcAwORTV2pYifYdyO4FWS0C8Lix+9rOG2D9Hs/c=; b=TCkwJGjZIQhXoqaBevDg23M/DFo4xpF6CKooQbNKTVno4m753cXrIZP+R8UgPqnZPX DNiotm0XV+3InmMCPLbJ90FEZM1G+1i9dXe4j152QNphWgoYrf6XPvHrFGRM4yVDTVV8 7VpgbSX0Og3J8696Bk7U/1iKsr9RGXyWvCNHjM2d30d2CPsvcUdJDp7/w8z5VwH9wAT1 lVt1ucj++qoZbgvOUqiasyjOaJivrHYPq6LVRUIDIRvx5FJ0I50Liikews1PlAjw9gCV XYXsORgUDXJyRB1tNv4MIRgFckdZu1/lGaktvTCRtgV8LpkWlkg+HEQmq4LdiJ6c4xne 8xrg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:in-reply-to:references:mime-version:date :message-id:subject:to; bh=g+/bBcAwORTV2pYifYdyO4FWS0C8Lix+9rOG2D9Hs/c=; b=m9uope3BQcjpOB6e5b4sp/+1hdjUF3ho6j5kiUN3nSKjgkVwnxenMWX8CYela4Qaec OVthKP7GG0VZkolNnnMXmUEJwA8sEHMeGwTxy9L8OLj7md4PuMOhI2RCkaVWuK0NUXqi xnNXFHS6pAqT4Typ6vkdawsQIrApQjtXDHF/gJoAm2x6CyJ5kdWCGI/XhZIgojXnQuOy qz1kNSFq2Sh1/rgUm4E0qyADPRuilxxPooreDZhvc/9dBF4jLBhu/JQxPLRPSqXyD1xN nPHKR+AjlORfQz+iFEwZWKwf1sXQYlF5GSoi1QLpjWthPffLv58D/2/7oLN1BiqBcEcB CuKw==
X-Gm-Message-State: APjAAAVo5Q15uUsDFZOQ+o7EjK/Ax3ztTC5ExzHPsh0X6Bwu2WJlUvQI uy4MmB9V1smeUGrBdf7MW8rPC1WMlq80POKUF2BZiw==
X-Google-Smtp-Source: APXvYqx//P9i7VWasELkC4EKg2NY98FGFkct0cbBoLx3xrr75+Tw1blOD6Mg2FHYIxP2QAZiEPXa4luFzWi1A0zqNG8=
X-Received: by 2002:a24:4d:: with SMTP id 74mr3624886ita.6.1554358518727; Wed, 03 Apr 2019 23:15:18 -0700 (PDT)
Received: from 1058052472880 named unknown by gmailapi.google.com with HTTPREST; Thu, 4 Apr 2019 06:15:17 +0000
From: Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>
In-Reply-To: <CANatvzz+AUc=j+36yNq78Eu6vTjs1_OThCY2O=ivJLyZRe+3Og@mail.gmail.com>
References: <155435502215.22668.17009854749523198767.idtracker@ietfa.amsl.com> <CANatvzz+AUc=j+36yNq78Eu6vTjs1_OThCY2O=ivJLyZRe+3Og@mail.gmail.com>
X-Mailer: Airmail (420)
MIME-Version: 1.0
Date: Thu, 04 Apr 2019 06:15:17 +0000
Message-ID: <CAN1APdf-vH2B-1OSX-ndrK=JM3vQet0Sf2tqeMMyrDKxtZyofg@mail.gmail.com>
Subject: Re: Fwd: New Version Notification for draft-kazuho-quic-address-bound-token-00.txt
To: IETF QUIC WG <quic@ietf.org>, Kazuho Oku <kazuhooku@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000005cc8b90585ae4ba0"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/iVvzOm-f9yJO-1vQXTz-0AQmHDA>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Apr 2019 06:15:23 -0000

Nice work.

Just a minor thing on priority in the appendix: what about IPv6 priorities?
That, and flow labels - are we starting to bypass much of the IPv6 design
because it is not (yet?) sufficiently widely deployed? Or are there
security implications, and if so, should QUIC consider authenticating parts
of the IPv6 header?

Also, on name based alternative:
I’m wondering which non-HTTP/3 connections would really benefit as new
designs can build in multi-purpose into the protocol whereas HTTP/3 must
follow HTTP semantics. You could argue about WebRTC/3 - but then - what
should it co-locate with which has sufficient intelligence to share the
congestion controller? You could argue share with HTTP/3, but that would
probably not rule out a name based solution either.
I’m not saying name based CG sharing is necessarily better, I’m just
wondering.

OTOH if name based sharing is used that could place some assumptions on a
given load balancers tuple stickiness, if I understand correctly. That
could be unfortunate. Or, if name sharing is only to target address
validation of the client perhaps different server hosts could share that
information successfully with a random or round robin load balancer?

Mikkel

On 4 April 2019 at 07.22.32, Kazuho Oku (kazuhooku@gmail.com) wrote:

Hi,

I have (finally) submitted "Address-bound Token for QUIC" I-D, that
proposes a QUIC extension allowing tokens to be shared between
connections that go to the same server address, even when the value of
SNI is different. Having such tokens would maximize our chance of
skipping address validation and slow-start phase.

The I-D and the repo can be found at the links below:

I-D: https://datatracker.ietf.org/doc/draft-kazuho-quic-address-bound-token/
Github repo: https://github.com/kazuho/draft-kazuho-quic-address-bound-token

Please let us know what you think.

Rationale behind the proposal:

The startup phase (a.k.a. slow-start) is one of the things that has
negative impact on user experience. QUIC, in addition to reducing the
connection establishment latency from TCP, provides the possibility of
a server skipping the startup phase when a client provides a valid
token.

However, the probability of a server being able to skip the startup
phase relies on how frequent a user revisits a particular server,
identified by the value of the TLS SNI extension. To put another way,
there is a missed opportunity if a client is visiting a server
instance that it has previously visited with a different server name.

Our proposal addresses exactly that. The proposed extension allows a
client to use a token for a different server name, if the server
address is the same. This maximizes the chance of the server skipping
address validation and the startup phase.


---------- Forwarded message ---------
From: <internet-drafts@ietf.org>
Date: 2019年4月4日(木) 14:17
Subject: New Version Notification for
draft-kazuho-quic-address-bound-token-00.txt
To: Kazuho Oku <kazuhooku@gmail.com>



A new version of I-D, draft-kazuho-quic-address-bound-token-00.txt
has been successfully submitted by Kazuho Oku and posted to the
IETF repository.

Name: draft-kazuho-quic-address-bound-token
Revision: 00
Title: Address-bound Token for QUIC
Document date: 2019-04-04
Group: Individual Submission
Pages: 6
URL:
https://www.ietf.org/internet-drafts/draft-kazuho-quic-address-bound-token-00.txt
Status:
https://datatracker.ietf.org/doc/draft-kazuho-quic-address-bound-token/
Htmlized:
https://tools.ietf.org/html/draft-kazuho-quic-address-bound-token-00
Htmlized:
https://datatracker.ietf.org/doc/html/draft-kazuho-quic-address-bound-token


Abstract:
This document describes a QUIC extension for an address-bound token.
This token can be used for sharing address validation and congestion
controller state between the same two endpoints across multiple
connections and origins.




Please note that it may take a couple of minutes from the time of
submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat



-- 
Kazuho Oku