Weekly github digest (QUIC Working Group Specifications)

Github Notifications <do_not_reply@mnot.net> Sun, 28 July 2019 00:45 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AEAF1200C1 for <quic@ietfa.amsl.com>; Sat, 27 Jul 2019 17:45:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=sj7vb0ol; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=nddWwXgu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SBj0iwjgtkrw for <quic@ietfa.amsl.com>; Sat, 27 Jul 2019 17:45:24 -0700 (PDT)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EA250120047 for <quic@ietf.org>; Sat, 27 Jul 2019 17:45:23 -0700 (PDT)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 0A3EC21B03 for <quic@ietf.org>; Sat, 27 Jul 2019 20:45:23 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute4.internal (MEProxy); Sat, 27 Jul 2019 20:45:23 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm3; bh=hCXm42QbYxNaBCNdoRPYUBmY24a64ZClhpdnjkbODsY=; b=sj7vb0ol RB2ZOvg/AEXZxE6TRFHBsssP0orBYtGGKY9BdGar1pk6BaXgJt1T2Bkix6iBF02D DoJLum7vrrlnSeySPvMoiW74le0GT/zIuIWR3bDsnSNQsT9fLv5XIL/FmM7s4rh7 jko/mQeelxoNLWzIfKaxuT6mOGSvAsdGvMooW1QbSElgD1nnjrZj2McENK54zlMa TwoxqYrc6qYBfx92KBIi6FDXT5QUtI+tmVzHP2LoMYwgzk4/8mvNTf5meqalwyjL tJ/v6Cyt51mQ8Ci6VlN1wPnJhvPs6+sWtO6u0zy1RlNXZzaIcWAQ03PAH/kPmWZo OfIAt3y3JLF2nw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=hCXm42QbYxNaBCNdoRPYUBmY24a64 ZClhpdnjkbODsY=; b=nddWwXguMp3W5tp3kkh8tx3ZnES914hLqpgJxqVVC4GQI 92CctgJrSpDNfTD9oAhubQ3uJrGwpXs77uNKJUc2HNK7+eceR7WhPYRW6lQZt6Gi fxnu4qv96UktTiNYETgEyMflBBhd1eZdhFFlFoFGBmMXNiY7+nuy6y5DFijNyqM+ Kp1G3vV1YmEVNH3A+3ONsBAY2nwoe7kbHvkKl3O+z0I0aIdwVWXJEwz5DU1ixKcS Q3hNLiQoCEGKhFn/eGGKXwSQuBC2XzkxMZf/nEjNfpmCom78mw2a1Mz2mliQcedZ kcWXS/g6WVfKUApvpyN8Xc1KG0LO/JJt3IvMSEgHA==
X-ME-Sender: <xms:IfA8XUE47gt6E5a13TL-4yyaD70-kNWaPZ20WXbBVngf9GmQlDYSbw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduvddrkeejgddvhecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtjeenuc fhrhhomhepifhithhhuhgspgfpohhtihhfihgtrghtihhonhhsuceoughopghnohhtpghr vghplhihsehmnhhothdrnhgvtheqnecuffhomhgrihhnpehgihhthhhusgdrtghomhenuc fkphepudduledrledrgeefrddvgedunecurfgrrhgrmhepmhgrihhlfhhrohhmpeguohgp nhhothgprhgvphhlhiesmhhnohhtrdhnvghtnecuvehluhhsthgvrhfuihiivgeptd
X-ME-Proxy: <xmx:IfA8XWyPJQID68G4ngTlfsbxKi4V9ETqxK1uyeIxjByuTUHjnaWOtA> <xmx:IfA8Xdtm_9byyD4Dc1Bk3Dvk1dCLkb9WF-cBdA3NOnCLy2YyzRbpbA> <xmx:IfA8Xb2g9kRa0Bo9ZGxz3Sm_P1ccmf7PE06uPJ7VMYpXpWeMjXmP6Q> <xmx:IvA8XWaPDii7y7APoO8YXo1vnZy09z-KeP_h3O6KaVE3U9Mp2F3zjA>
Received: from cloud.mnot.net (cloud.mnot.net [119.9.43.241]) by mail.messagingengine.com (Postfix) with ESMTPA id 0C08180059 for <quic@ietf.org>; Sat, 27 Jul 2019 20:45:21 -0400 (EDT)
Received: from cloud.mnot.net (localhost [127.0.0.1]) by cloud.mnot.net (Postfix) with ESMTP id 1A76FC0F8D for <quic@ietf.org>; Sun, 28 Jul 2019 00:45:18 +0000 (UTC)
Content-Type: multipart/alternative; boundary="===============7206424627899281272=="
MIME-Version: 1.0
From: Github Notifications <do_not_reply@mnot.net>
To: quic@ietf.org
Subject: Weekly github digest (QUIC Working Group Specifications)
Message-Id: <20190728004518.1A76FC0F8D@cloud.mnot.net>
Date: Sun, 28 Jul 2019 00:45:18 +0000
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/kj0Zx-U9wj9xm3XZVEufY-DGCko>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Jul 2019 00:45:28 -0000



Issues
------
* quicwg/base-drafts (+6/-6/💬90)
  6 issues created:
  - Non-ACK-eliciting packets never need to be ACKed (by dtikhonov)
    https://github.com/quicwg/base-drafts/issues/2931 
  - Lift single-packet ClientHello requirement? (by davidben)
    https://github.com/quicwg/base-drafts/issues/2928 
  - ICID or OCID? (by mikkelfj)
    https://github.com/quicwg/base-drafts/issues/2926 
  - Remove PRIORITY (by martinthomson)
    https://github.com/quicwg/base-drafts/issues/2924 [-http] [design] 
  - MIn_RTT management (by gorryfair)
    https://github.com/quicwg/base-drafts/issues/2923 
  - Should server TP encryption be a requirement for the cryptographic handshake? (by chris-wood)
    https://github.com/quicwg/base-drafts/issues/2920 

  28 issues received 90 new comments:
  - #2844 Client connection IDs are broken (27 by kazuho, marten-seemann, mikkelfj, Ralith, larseggert, DavidSchinazi, martinthomson, igorlord, martinduke)
    https://github.com/quicwg/base-drafts/issues/2844 [-transport] [design] 
  - #2924 Remove PRIORITY (11 by RyanAtGoogle, martinthomson, rmarx, LPardue, mikkelfj)
    https://github.com/quicwg/base-drafts/issues/2924 [-http] [design] 
  - #2928 Lift single-packet ClientHello requirement? (9 by janaiyengar, mikkelfj, nibanks, martinthomson, davidben, ianswett)
    https://github.com/quicwg/base-drafts/issues/2928 [-tls] 
  - #2670 Remove ack_delay_exponent TP (7 by janaiyengar, martinthomson, larseggert, huitema, mikkelfj)
    https://github.com/quicwg/base-drafts/issues/2670 [-transport] [design] [proposal-ready] 
  - #2632 H3 GOAWAY should be symmetric and cover bidi and uni streams (4 by martinthomson, LPardue, afrind)
    https://github.com/quicwg/base-drafts/issues/2632 [-http] [design] 
  - #2143 Be more conservative about migration? (4 by erickinnear, gorryfair, mikkelfj)
    https://github.com/quicwg/base-drafts/issues/2143 [-transport] [design] 
  - #2834 Long Header Packets and Routing Connection IDs (3 by igorlord, larseggert, martinduke)
    https://github.com/quicwg/base-drafts/issues/2834 [-transport] [design] 
  - #2496 QUIC Version Ossification (2 by mnot, martinduke)
    https://github.com/quicwg/base-drafts/issues/2496 [-transport] [design] 
  - #2785 Disallow reuse of stateless reset tokens (2 by martinthomson, larseggert)
    https://github.com/quicwg/base-drafts/issues/2785 [-transport] [design] 
  - #2792 Timing side-channel on key updates (2 by larseggert, ekr)
    https://github.com/quicwg/base-drafts/issues/2792 [-tls] [design] 
  - #2920 Should server TP encryption be a requirement for the cryptographic handshake? (2 by DavidSchinazi, martinthomson)
    https://github.com/quicwg/base-drafts/issues/2920 [-transport] [design] 
  - #2593 Persistent congestion interaction with app limited state (1 by siyengar)
    https://github.com/quicwg/base-drafts/issues/2593 [-recovery] [editorial] 
  - #2084 Discuss requirement that connection IDs not be correlatable (1 by martinduke)
    https://github.com/quicwg/base-drafts/issues/2084 [-transport] [design] 
  - #2863 unrecoverable loss pattern leads to deadlock (1 by ianswett)
    https://github.com/quicwg/base-drafts/issues/2863 [-transport] [design] 
  - #2931 Non-ACK-eliciting packets never need to be ACKed (1 by mikkelfj)
    https://github.com/quicwg/base-drafts/issues/2931 
  - #2498 Error Code when SETTINGS exceeds maximum (1 by MikeBishop)
    https://github.com/quicwg/base-drafts/issues/2498 [-http] [design] 
  - #1860 ACK-only feedback loop in recovery instead of transport (1 by ianswett)
    https://github.com/quicwg/base-drafts/issues/1860 [-recovery] [editorial] 
  - #2895 Advise bundling a PING or other small ACK eliciting frame with Initials (1 by janaiyengar)
    https://github.com/quicwg/base-drafts/issues/2895 [-recovery] [design] 
  - #2387 Write up our security target against on-path attack (1 by larseggert)
    https://github.com/quicwg/base-drafts/issues/2387 [-transport] [design] 
  - #2656 Discarding connection state at server on unvalidated client (1 by larseggert)
    https://github.com/quicwg/base-drafts/issues/2656 [-transport] [design] 
  - #2789 Use a higher seed RTT for new paths (1 by mnot)
    https://github.com/quicwg/base-drafts/issues/2789 [-recovery] [design] 
  - #2534 ECN text disables ECN too aggressively (1 by janaiyengar)
    https://github.com/quicwg/base-drafts/issues/2534 [-recovery] [-transport] [design] 
  - #2923 MIn_RTT management (1 by gorryfair)
    https://github.com/quicwg/base-drafts/issues/2923 
  - #2163 ECN attacks (1 by gloinul)
    https://github.com/quicwg/base-drafts/issues/2163 [-transport] [editorial] 
  - #2170 Embed QUIC version in expansion (1 by larseggert)
    https://github.com/quicwg/base-drafts/issues/2170 [-tls] [design] 
  - #2555 Define idle period for congestion control (1 by mnot)
    https://github.com/quicwg/base-drafts/issues/2555 [-recovery] [design] 
  - #2556 Should kPersistentCongestionThreshold be 2 or 3? (1 by mnot)
    https://github.com/quicwg/base-drafts/issues/2556 [-recovery] [design] 
  - #2685 CC state after a change of path? (1 by janaiyengar)
    https://github.com/quicwg/base-drafts/issues/2685 [-transport] [design] 

  6 issues closed:
  - Should kPersistentCongestionThreshold be 2 or 3? https://github.com/quicwg/base-drafts/issues/2556 [-recovery] [design] 
  - Persistent congestion interaction with app limited state https://github.com/quicwg/base-drafts/issues/2593 [-recovery] [editorial] 
  - Clients cannot abandon Initial packets while server can still send initial close https://github.com/quicwg/base-drafts/issues/2541 [-transport] [design] 
  - Error Code when SETTINGS exceeds maximum https://github.com/quicwg/base-drafts/issues/2498 [-http] [design] 
  - Advise bundling a PING or other small ACK eliciting frame with Initials https://github.com/quicwg/base-drafts/issues/2895 [-recovery] [design] 
  - CC state after a change of path? https://github.com/quicwg/base-drafts/issues/2685 [-transport] [design] 



Pull requests
-------------
* quicwg/base-drafts (+8/-4/💬14)
  8 pull requests submitted:
  - Fix typo in transport draft: eliciting (by dtikhonov)
    https://github.com/quicwg/base-drafts/pull/2930 
  - Minor clarification. Fixes #2084 (by ekr)
    https://github.com/quicwg/base-drafts/pull/2929 
  - Update draft-ietf-quic-transport.md (by ianswett)
    https://github.com/quicwg/base-drafts/pull/2927 [-transport] 
  - Add initial threat model appendix (by erickinnear)
    https://github.com/quicwg/base-drafts/pull/2925 
  - Remove PRIORITY (by martinthomson)
    https://github.com/quicwg/base-drafts/pull/2922 [-http] [design] 
  - Confidentiality for server transport parameters (by martinthomson)
    https://github.com/quicwg/base-drafts/pull/2921 [-transport] [design] 
  - MinRTT for the congestion control context (by ianswett)
    https://github.com/quicwg/base-drafts/pull/2919 
  - Fix language around CC on migration (by janaiyengar)
    https://github.com/quicwg/base-drafts/pull/2918 

  4 pull requests received 14 new comments:
  - #2922 Remove PRIORITY (11 by kazuho, rmarx, janaiyengar, LPardue, mikkelfj)
    https://github.com/quicwg/base-drafts/pull/2922 [-http] [design] 
  - #2893 Remove DoS vector for spoofed connection migration (1 by igorlord)
    https://github.com/quicwg/base-drafts/pull/2893 [-transport] 
  - #2907 Fix Recovery Pseudocode (1 by janaiyengar)
    https://github.com/quicwg/base-drafts/pull/2907 [-recovery] [editorial] 
  - #2925 Add initial threat model appendix (1 by erickinnear)
    https://github.com/quicwg/base-drafts/pull/2925 

  4 pull requests merged:
  - Fix typo in transport draft: eliciting
    https://github.com/quicwg/base-drafts/pull/2930 
  - PTO should always send an ack-eliciting packet
    https://github.com/quicwg/base-drafts/pull/2912 [-recovery] 
  - Up to two full-sized datagrams, not packets
    https://github.com/quicwg/base-drafts/pull/2915 [-recovery] 
  - Clarify resetting congestion control
    https://github.com/quicwg/base-drafts/pull/2917 [-transport] [editorial] 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/quicwg/base-drafts