Re: [Webtransport] Confirming consensus calls from today's WebTransport interim

Alan Frindell <afrind@fb.com> Fri, 04 June 2021 00:20 UTC

Return-Path: <prvs=57895d47b0=afrind@fb.com>
X-Original-To: webtransport@ietfa.amsl.com
Delivered-To: webtransport@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1A6D3A205F for <webtransport@ietfa.amsl.com>; Thu, 3 Jun 2021 17:20:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.495
X-Spam-Level:
X-Spam-Status: No, score=-3.495 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.698, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fb.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id seyef-lriKV0 for <webtransport@ietfa.amsl.com>; Thu, 3 Jun 2021 17:20:01 -0700 (PDT)
Received: from mx0a-00082601.pphosted.com (mx0b-00082601.pphosted.com [67.231.153.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9CE13A205E for <webtransport@ietf.org>; Thu, 3 Jun 2021 17:20:00 -0700 (PDT)
Received: from pps.filterd (m0001303.ppops.net [127.0.0.1]) by m0001303.ppops.net (8.16.0.43/8.16.0.43) with SMTP id 1540IvoP028464; Thu, 3 Jun 2021 17:19:57 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=facebook; bh=cwv9rUk8tvDGiEze2OE38nkQmOEIimWRQ7UWoKzwYAQ=; b=LP839KNPifBlyUvmGzPrM7ThPqof6HFL3NL/M4iiVq5hMfZDUIlCqLipJo7bFHruU9H6 3+zJONFyrnklcJMUZaZZj/wJ0nzl9fK0yG23++Kp8jzKycob/JaPhbPEDbn66B5zyrut L1xM/EljFcrEVysp4oJe00T0ktou/Chf9as=
Received: from mail.thefacebook.com ([163.114.132.120]) by m0001303.ppops.net with ESMTP id 38xkj6y8wj-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Thu, 03 Jun 2021 17:19:56 -0700
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (100.104.98.9) by o365-in.thefacebook.com (100.104.94.197) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Thu, 3 Jun 2021 17:19:55 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=g8x+3FHPSG+SJZiUOG6YviUaK4mgS0OjDgiLdWJYVIDLpbdxRL4C92PghiV3k3sWgg8FLg+z4eJ2mTy9gaUwn43kaIzmxv0OTgMk7OthNXYjy0WcOJFe6HHVDPezcsPB10VQOM6YL/VfxtWG1AVydjX61z87UZgnN8GjfAxO0JljCX/ZrGQlsrU3w9Wrt7JMlU80zb6kVWbxAz39ZFr7lQInW1Q1eTPqvqVuGLXUUZMeGB1/rNIF1L+9DzkOQ0I3bwhITHi58emmeQI5iAUx0/bCD0TOcd0CP6evINgIQN3+yv1jWgcM+2wj83r5XANVbDhPjbjS3FNpXhjjCvFDcQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QOdQbhXmAa7BwqJ1DudUzwKeJCyUrmSazCF4lwvzxf8=; b=WZnNIdp47l+pxGvz4jswd6+ZtKnFn8tg2cwnHNZcSvhPBVfhWo+b5EuLsWgOeqAmclCIdLPWLGae2JUfNwOsc+PvxohLwFQrk6rXf9sGa7R6AnNgJzGQwpCeK8gnCusNKd4YH1zOWtsAlRbqu3PaeRYnarMn4v2iMyjchK5ysjCKLSditDSu8MXz7TNvIuxO/CCuit5Lr27MaUGCIItrxT6eRteAViCneXwmHsNeW8fWNeACSU3D7ivD5RJkAdHMZw7TD+zcj2ixG8q8RlsoD30LyHzm4GbyL0+Fz9CQBhQY31LNhOVCb2zcEpM1g0Hh/53+GI1tL5/hEkuWnj+M8g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=fb.com; dmarc=pass action=none header.from=fb.com; dkim=pass header.d=fb.com; arc=none
Received: from MW3PR15MB3772.namprd15.prod.outlook.com (2603:10b6:303:4c::14) by MWHPR15MB1534.namprd15.prod.outlook.com (2603:10b6:300:bf::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.26; Fri, 4 Jun 2021 00:19:54 +0000
Received: from MW3PR15MB3772.namprd15.prod.outlook.com ([fe80::b569:872e:690d:d455]) by MW3PR15MB3772.namprd15.prod.outlook.com ([fe80::b569:872e:690d:d455%7]) with mapi id 15.20.4195.023; Fri, 4 Jun 2021 00:19:53 +0000
From: Alan Frindell <afrind@fb.com>
To: Martin Thomson <mt@lowentropy.net>, Ian Swett <ianswett@google.com>, David Schinazi <dschinazi.ietf@gmail.com>
CC: Victor Vasiliev <vasilvv@google.com>, WebTransport <webtransport@ietf.org>
Thread-Topic: [Webtransport] Confirming consensus calls from today's WebTransport interim
Thread-Index: AQHXWIB4aU8iL3g6o0WCC41EQ6vMvKsCbAiAgAAE7QCAAAj8AIAAA2QAgABgUQD//6qugA==
Date: Fri, 04 Jun 2021 00:19:53 +0000
Message-ID: <7A74149F-B394-43FA-A4D0-BC5A85F2409F@fb.com>
References: <CAPDSy+5s-D7v3jxFmWKD5N-=sVcM_v8ZmB1iVNjZ1ZuHN5n=OQ@mail.gmail.com> <cce29e58-da55-4cc1-b760-4ee1c849c035@www.fastmail.com> <CAAZdMad9hZMutYAWQOO=T+UtV9tuMreHy707JO6qN40k2SVmMQ@mail.gmail.com> <69e2d8c9-b532-4ce3-b558-9fdd11e5fb1a@www.fastmail.com> <304A9399-D211-4463-9245-C2437E318FC3@fb.com> <CAKcm_gOLTXtjf_jQWZ12sKe4L-e5J3jA+Zn5zjd7UJrVYQ1f8w@mail.gmail.com> <CAPDSy+7hBj8EAJcydCGb5iVh3XxFoaBLzKgb=4X7myP-2-ZEZA@mail.gmail.com> <CAKcm_gNnQM5i7hR3V48ETnKX=WiizK7Z27w=cb3N_qLGdoB0LA@mail.gmail.com> <CAPDSy+5V8YhXVjCw1U4KcCcC+pzXZ7dBPJoYNDojEdACfnrO2Q@mail.gmail.com> <CAKcm_gMF3zpGP92tAv7MeKdFR+=Vc6uvGJ2PGFjTgxFWv9eJ7w@mail.gmail.com> <fa051e3c-7075-4bf8-af39-e3692d3360c5@www.fastmail.com>
In-Reply-To: <fa051e3c-7075-4bf8-af39-e3692d3360c5@www.fastmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.49.21050901
authentication-results: lowentropy.net; dkim=none (message not signed) header.d=none;lowentropy.net; dmarc=none action=none header.from=fb.com;
x-originating-ip: [2620:10d:c090:400::5:e3d]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8b65aca8-c75c-4365-f76f-08d926ee79eb
x-ms-traffictypediagnostic: MWHPR15MB1534:
x-microsoft-antispam-prvs: <MWHPR15MB1534B4A546C63A39140E7662A73B9@MWHPR15MB1534.namprd15.prod.outlook.com>
x-fb-source: Internal
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW3PR15MB3772.namprd15.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(346002)(39860400002)(376002)(366004)(396003)(4326008)(38100700002)(66446008)(122000001)(478600001)(91956017)(64756008)(316002)(86362001)(5660300002)(6512007)(110136005)(54906003)(6506007)(6486002)(66946007)(66574015)(36756003)(76116006)(66556008)(71200400001)(66476007)(53546011)(186003)(8936002)(8676002)(2616005)(2906002)(33656002)(966005)(83380400001)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <99381DA5FBB9C44DAB976B5CBF1E8460@namprd15.prod.outlook.com>
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW3PR15MB3772.namprd15.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8b65aca8-c75c-4365-f76f-08d926ee79eb
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jun 2021 00:19:53.7343 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 8ae927fe-1255-47a7-a2af-5f3a069daaa2
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: zzycWYC/Q+pRD91gryHW5OI17EivNaOLclM6+BdNEx+v5S79qkkwYFKbUl9+kFsu
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR15MB1534
X-OriginatorOrg: fb.com
X-Proofpoint-GUID: SBbdBcHLx4I2oZbXYtzcEAtS9maHeL97
X-Proofpoint-ORIG-GUID: SBbdBcHLx4I2oZbXYtzcEAtS9maHeL97
Content-Transfer-Encoding: base64
X-Proofpoint-UnRewURL: 3 URL's were un-rewritten
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761 definitions=2021-06-03_15:2021-06-03, 2021-06-03 signatures=0
X-Proofpoint-Spam-Details: rule=fb_default_notspam policy=fb_default score=0 lowpriorityscore=0 impostorscore=0 mlxlogscore=999 priorityscore=1501 mlxscore=0 phishscore=0 clxscore=1011 suspectscore=0 spamscore=0 malwarescore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104190000 definitions=main-2106040000
X-FB-Internal: deliver
Archived-At: <https://mailarchive.ietf.org/arch/msg/webtransport/cKbV13CjEf34if57Twc8scLyzCg>
Subject: Re: [Webtransport] Confirming consensus calls from today's WebTransport interim
X-BeenThere: webtransport@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <webtransport.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/webtransport>, <mailto:webtransport-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/webtransport/>
List-Post: <mailto:webtransport@ietf.org>
List-Help: <mailto:webtransport-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/webtransport>, <mailto:webtransport-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Jun 2021 00:20:06 -0000


On 6/3/21, 3:25 PM, "Martin Thomson" <mt@lowentropy.net> wrote:

>    I know that this is probably a little too flippant, but I don't see why we can't "just" drop the necessary QUIC frames into the request body.  STREAM, DATAGRAM, MAX_STREAM_DATA, MAX_DATA, and MAX_STREAMS might be sufficient.  Maybe PADDING and even PING.  It is not quite THAT trivial, as you need to engage with prioritization and some other nasty things, but it would still create a more portable and overall simpler design.


+ RST_STREAM and STOP_SENDING.  

I don't disagree that's a workable design that doesn't need a lot of litigation, but I don't see how this won't result duplicating a lot of code to actually implement that design.  I think comparing prototype implementations of both designs could help illuminate the tradeoffs.

> One advantage of not using HTTP/2 streams directly is that you can ship something on top of HTTP/1.1.

This is definitely true, but we should understand if this is a real requirement that's going to get used before we factor it into our decision making.

-Alan


    On Fri, Jun 4, 2021, at 02:40, Ian Swett wrote:
    > Thanks David,
    > 
    > I was thinking of corporate networks with MITMs that inspect HTTP 1.1 
    > in a limited way, but it sounds like those may not be very common, so 
    > there's no way to make WebTransport work anyway.
    > 
    > If so, making WebTransport HTTP/2 specific is fine with me.
    > 
    > I still think apps that want to work close to 100% of the time won't be 
    > able to depend upon WebTransport always working, but maybe that's just 
    > the state of the internet.
    > 
    > Ian
    > 
    > On Thu, Jun 3, 2021 at 12:28 PM David Schinazi <dschinazi.ietf@gmail.com> wrote:
    > > Can you provide an example of a network that would benefit from this scope increase? I've yet to see a network that MITMs TLS but allows all HTTP/1.1 through unmodified. The ones that MITM and downgrade to h1 generally do it because they then inspect and/or modify the request and response, so getting something with WebTransport semantics to work there at all isn't guaranteed to be possible. Perhaps a good step forward is for us to build a version of WebTransport over h2 and then look at deployment data and feedback to decide if another version is needed.
    > > 
    > > David
    > > 
    > > On Thu, Jun 3, 2021 at 8:56 AM Ian Swett <ianswett@google.com> wrote:
    > >> 
    > >> 
    > >> On Thu, Jun 3, 2021 at 11:38 AM David Schinazi <dschinazi.ietf@gmail.com> wrote:
    > >>> Hi Ian,
    > >>> 
    > >>> Can you elaborate on what use-case would be solved by having WebTransport support HTTP/1 ?
    > >>> - We know there are networks that block QUIC and/or UDP, those will be well served by HTTP/2.
    > >>> - We know there are networks that MITM TLS then force a transparent HTTP/1 proxy, those won't allow CONNECT nor any other form of WebTransport anyway.
    > >>> I'm failing to see a use-case where WebTransport over HTTP/1 would be useful. Can you provide an example?
    > >> 
    > >> I think there's evidence that those two sets of networks are very similar today, and over time I expect the set of networks that block QUIC but don't block HTTP/2 to be tiny(ie: <1%).
    > >> 
    > >> But I could be wrong.
    > >>> 
    > >>> Thanks,
    > >>> David
    > >>> 
    > >>> On Thu, Jun 3, 2021 at 6:57 AM Ian Swett <ianswett=40google.com@dmarc.ietf.org> wrote:
    > >>>> I definitely agree with 1a, with the caveat that the TCP version is lower priority than the HTTP/3 version.
    > >>>> 
    > >>>> I'm slightly less concerned about the stream state machine than Martin, but I think it's definitely a real concern and I think it makes sense to have a solution fairly well fleshed out before adopting the direction and document.
    > >>>> 
    > >>>> I'm slightly more concerned about creating a TCP fallback that doesn't work over HTTP/1.  If we're building a fallback, it seems like these people shouldn't be excluded, since that means developers will have to build and maintain a 3rd fallback that's not WebTransport based.  If the dream is to be able to develop apps for WebTransport and not have a non-WebTransport fallback, I don't see how we accomplish that without an option over HTTP/1?
    > >>>> 
    > >>>> Possibly this is a forcing function to convince customers to upgrade their middleboxes to ones which support HTTP/2 and HTTP/3, but if so I'd like to call that out explicitly.
    > >>>> 
    > >>>> Or maybe the physical office with its corp middleboxes is dead and my concern is an unfounded anachronism?
    > >>>> 
    > >>>> Ian
    > >>>> 
    > >>>> On Tue, May 25, 2021 at 5:36 PM Alan Frindell <afrind=40fb.com@dmarc.ietf.org> wrote:
    > >>>>> I think the fundamental discussion here is about whether we want to modify/extend the HTTP/2 state machine to handle WebTransport streams, or whether we should build an entirely separate stream state machine for them, and leave the H2 machinery untouched.
    > >>>>> 
    > >>>>> Martin may be right that there be dragons down the path of modifying the H2 state machine.  The alternative strikes me as an awful lot of duplication -- it's close to implementing H2 again over a single HTTP stream, minus header processing.  That said, I think either approach can be made to work, we just need to choose the tradeoffs we want.  
    > >>>>> 
    > >>>>> I am remiss in not addressing the feedback regarding unidirectional stream resets.  I think that it got lost during the bizarre hours of the last IETF.  I filed an issue in the draft repo to track it (https://github.com/ekinnear/draft-webtransport-http2/issues/17).  I think the right solution is to keep the unidirectional reset functionality, and implement it in the H2 draft using either new frames or messages, depending on the direction we take regarding the state machine.
    > >>>>> 
    > >>>>> During the interim, we expressed our flexibility to adapt the design here as the H3 design evolves (eg: stream limits), new tools become available (eg: CAPSULE) and as we gather implementation experience.
    > >>>>> 
    > >>>>> While I think it is important we address this design decision as soon as possible, I don't know that it needs to block adoption. 
    > >>>>> 
    > >>>>> Thanks
    > >>>>> 
    > >>>>> -Alan
    > >>>>> 
    > >>>>> On 5/23/21, 6:48 PM, "Webtransport on behalf of Martin Thomson" <webtransport-bounces@ietf.org on behalf of mt@lowentropy.net> wrote:
    > >>>>> 
    > >>>>>     On Sat, May 22, 2021, at 02:06, Victor Vasiliev wrote:
    > >>>>>     > On Thu, May 20, 2021 at 9:37 PM Martin Thomson <mt@lowentropy.net> wrote:
    > >>>>>     > > I'm opposed to adoption of this document.  I don't believe that it can be made so due to some fundamental differences in how HTTP/2 and QUIC stream states.
    > >>>>>     > > 
    > >>>>>     > > If this problem was acknowledged, then I have every confidence that the people listed as authors are able to find a solution.  But generally adoption is about the document more than the people.  Adoption means agreeing that the document contains approximately the right shape for a solution.  I can't agree with that in this case.
    > >>>>>     > 
    > >>>>>     > Hi Martin,
    > >>>>>     > 
    > >>>>>     > Could you elaborate on the specific differences between HTTP/2 and QUIC 
    > >>>>>     > stream state machines that you are concerned about?  The only one I am 
    > >>>>>     > aware of is unidirectional versus bidirectional reset, and last time we 
    > >>>>>     > discussed this, the easiest solution was to make HTTP/3 behave like 
    > >>>>>     > HTTP/2, which would mean there's nothing HTTP/2 draft would do to 
    > >>>>>     > address that.
    > >>>>> 
    > >>>>>     That's the one I'm most concerned about, but there is also the whole mess around inventing semantics for unidirectional streams that needs to be worked into the state machines.
    > >>>>> 
    > >>>>>     For reset, sure, you could make the HTTP/3 draft worse to deal with the problem.  Why would you want that?  QUIC has a much better set of semantics here than HTTP/2.
    > >>>>> 
    > >>>>>     There is also the stream state management disconnect for server-initiated streams, which currently is only used for server push.  The draft currently doesn't say anywhere near as much as it would need to in order to specify that part.
    > >>>>> 
    > >>>>>     And managing allocation of stream limits is a little scant on detail in the same way.  I thought we wanted independent limits, which means defining new accounting systems.  (Yes, this is a criticism of the HTTP/3 draft also, but the additional effort required to use QUIC streams is entirely justified in that case, because you are getting something in exchange.)
    > >>>>> 
    > >>>>>     Why bother with all of that when you can just import QUIC frame semantics and then serialize them on the same stream?
    > >>>>> 
    > >>>>>     Yes, this all boils down to a fairly central question: do we build the same thing for HTTP/2 and HTTP/3?  I'm not sure that we want that.  We need to do a whole bunch of stuff to use QUIC (BTW, Roberto gets to say "told you so" again here), but doing that same work for HTTP/2 doesn't make sense unless the changes are minimal.  I'm suggesting that the changes aren't as minimal as the rough sketches of protocols we have might imply.
    > >>>>> 
    > >>>>>     If you conclude that there are more functions needed, as I have done, then you might also conclude that building those same functions into two different protocols is not desirable, especially when there are no benefits to doing so for one of those protocols.
    > >>>>> 
    > >>>>>     -- 
    > >>>>>     Webtransport mailing list
    > >>>>>     Webtransport@ietf.org
    > >>>>>     https://www.ietf.org/mailman/listinfo/webtransport  
    > >>>>> 
    > >>>>> -- 
    > >>>>> Webtransport mailing list
    > >>>>> Webtransport@ietf.org
    > >>>>> https://www.ietf.org/mailman/listinfo/webtransport 
    > >>>> -- 
    > >>>> Webtransport mailing list
    > >>>> Webtransport@ietf.org
    > >>>> https://www.ietf.org/mailman/listinfo/webtransport