Re: Call for Adoption: Invariants
joel jaeggli <joelja@bogus.com> Tue, 06 February 2018 16:36 UTC
Return-Path: <joelja@bogus.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 63A5312D84F for <quic@ietfa.amsl.com>; Tue, 6 Feb 2018 08:36:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.908
X-Spam-Level:
X-Spam-Status: No, score=-6.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tIR5I0qYByLX for <quic@ietfa.amsl.com>; Tue, 6 Feb 2018 08:36:42 -0800 (PST)
Received: from nagasaki.bogus.com (nagasaki.bogus.com [IPv6:2001:418:1::81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A69AD12D838 for <quic@ietf.org>; Tue, 6 Feb 2018 08:36:42 -0800 (PST)
Received: from MBP.local ([IPv6:2620:11a:c081:20:bd85:ba9e:7eba:e9b5]) (authenticated bits=0) by nagasaki.bogus.com (8.15.2/8.15.2) with ESMTPSA id w16GaVkx052008 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Tue, 6 Feb 2018 16:36:31 GMT (envelope-from joelja@bogus.com)
X-Authentication-Warning: nagasaki.bogus.com: Host [IPv6:2620:11a:c081:20:bd85:ba9e:7eba:e9b5] claimed to be MBP.local
Subject: Re: Call for Adoption: Invariants
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>, Mike Bishop <mbishop@evequefou.be>
Cc: "Brian Trammell (IETF)" <ietf@trammell.ch>, Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>, QUIC WG <quic@ietf.org>, Mark Nottingham <mnot@mnot.net>, Lars Eggert <lars@eggert.org>
References: <C35C3AB6-F0FC-4D83-9C97-DD0B605A863F@mnot.net> <DB6PR10MB17667AAB19D4A9288FD5BAF3ACFE0@DB6PR10MB1766.EURPRD10.PROD.OUTLOOK.COM> <FDFA0988-1FB4-4AFC-8958-1A6B16068FE5@trammell.ch> <MWHPR08MB2432F1CB1FBAFACD611D3913DAFE0@MWHPR08MB2432.namprd08.prod.outlook.com> <CAKKJt-cJs8Ms62tBjxGTXBZ6GeD0+VgdWzG7zYf8Yui=a4HPvg@mail.gmail.com>
From: joel jaeggli <joelja@bogus.com>
Message-ID: <a06422da-a64b-90f8-c5bd-757f2a49553c@bogus.com>
Date: Tue, 06 Feb 2018 08:36:25 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
In-Reply-To: <CAKKJt-cJs8Ms62tBjxGTXBZ6GeD0+VgdWzG7zYf8Yui=a4HPvg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------4F159B70308CAB01AAA78B1A"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/ryAcHkWsIRqrO8ACMjUyb9NReO4>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Feb 2018 16:36:44 -0000
On 2/6/18 6:54 AM, Spencer Dawkins at IETF wrote: > Asking with no hat, but ... > > On Mon, Feb 5, 2018 at 1:00 PM, Mike Bishop <mbishop@evequefou.be > <mailto:mbishop@evequefou.be>> wrote: > > I support adoption. The way to change the invariants will be to > mint a new protocol, and not claim that your new protocol is a > version of QUIC. If it happens to be startlingly similar, all > well and good. > > > If you roll a new protocol, that's not a version of QUIC, is it > obvious to everyone but me whether you can run both protocols on UDP/443? > > I thought I remembered that UDP/443 was chosen because firewalls often > pass port 443, so that aids deployment. Hence, my question. In my experience as a vendor of and consumer of commercial firewalls. UDP and TCP port numbers receive separate treatment. So a decision to pass TCP 80/443 or UDP 443 would be undertaken independently. Outgoing UDP through a stateful NAT/PAT tends to create state for a binding which will be used to map incoming packets with obverse 5-tuple to the original sender. unsolicited incoming UDP (for which no binding or rule exists) will be dropped. There is the complexity with UDP of determining when you can remove the state since connection oriented signaling may well be (is) opaque to the stateful device. if you have to fall back to a timer or some kind of LRU policy for state entries you will tend break long lived flows that don't use keep-alives. > Thanks, > > Spencer
- Call for Adoption: Invariants Mark Nottingham
- Re: Call for Adoption: Invariants Mikkel Fahnøe Jørgensen
- Re: Call for Adoption: Invariants Brian Trammell (IETF)
- Re: Call for Adoption: Invariants Ian Swett
- Re: Call for Adoption: Invariants Christian Huitema
- RE: Call for Adoption: Invariants Mike Bishop
- Re: Call for Adoption: Invariants Roberto Peon
- Re: Call for Adoption: Invariants Mikkel Fahnøe Jørgensen
- Re: Call for Adoption: Invariants Jana Iyengar
- RE: Call for Adoption: Invariants Lubashev, Igor
- RE: Call for Adoption: Invariants Praveen Balasubramanian
- Re: Call for Adoption: Invariants Eric Kinnear
- Re: Call for Adoption: Invariants Spencer Dawkins at IETF
- Re: Call for Adoption: Invariants joel jaeggli
- RE: Call for Adoption: Invariants Mike Bishop
- Re: Call for Adoption: Invariants Ted Hardie
- RE: Call for Adoption: Invariants Mike Bishop
- Re: Call for Adoption: Invariants Jana Iyengar
- RE: Call for Adoption: Invariants Praveen Balasubramanian
- RE: Call for Adoption: Invariants Spencer Dawkins at IETF
- Re: Call for Adoption: Invariants Eggert, Lars