So...

I've added something at the end, to note agree on the priority...

On 24/01/2022 23:34, David Schinazi wrote:
This thread dates back to 15 months ago, I'm not entirely sure why Gorry
resurrected it without adding any text, but perhaps my email client is confused.

Without going into the vices and virtues of content inspection, let's not increase
the scope of many working groups too soon. The MASQUE WG already has its
plate pretty full getting proxying to work, so let's not add multipath into the mix until we have proxying working. Similarly, the QUIC WG is going to be solving the already hard problem of end-to-end multipath without adding proxying to complicate things. If folks want to work on multipath proxying, I strongly suggest waiting for both multipath and proxying to exist before trying to combine them.

David, MASQUE and QUIC enthusiast

On Mon, Jan 24, 2022 at 12:34 PM Paul Vixie <[email protected]> wrote:



    Christian Huitema wrote on 2022-01-24 12:15:
    > ...
    >
    > Like others, I have mixed feelings about the kind of proxying
    proposed
    > in the 5G design. It does look like a power grab by the telecom
    > companies, force all user traffic through a telco managed proxy,
    getting
    > an observation point to see all the user traffic, do all the
    kind of
    > "statistics" we could expect in these days of surveillance
    capitalism,
    > and be in a position to control how much bandwidth is allocated to
    > specific content providers.

    i think calling it a power grab when it's done by an internet transit
    connectivity provider (such as "the telecom companies") makes
    sense, but
    that without clarification, could connote untenable meanings.

    managed private networks, such as enterprise, government, university,
    small office / home office, and home / family networks, already
    have the
    power you describe, and will preserve the status quo at "whatever
    cost"
    the ietf may impose.

    i pray that we will consistently disambiguate. there will be no wide
    area UDP on most managed private networks. we can either pressure
    these
    networks with endpoint failures (to strong arm them into abandoning
    their historic powers), or we can rely on fallback (which for new
    protocols may be more fragile than for the existing WWW), or we can
    negotiate, in ways approximately alike to the "proxying proposed
    in the
    5G design". those are our choices -- there is no fourth way.

    if the ietf wishes to disintermediate on-path actors, then we
    ought to
    consistently and carefully identify where the power is (managed
    private
    edge networks, and endpoints), and avoid antagonizing those power
    holders.

    > The only good effect is that proxying will
    > hide the actual user location from the content providers, which
    removes
    > a bit of data from the surveillance capitalism dragnet. But
    overall,
    > that's not great, and I would rather not have a feature like
    that on my
    > phone. But hey, that's my opinion, people may differ. And I wonder
    > whether that has much relevance to IETF work.

    if the ietf's mission is to impose societal change, then explicit
    negotiated proxy service may not be relevant. however if the ietf's
    mission is to create technology that supports generally desirable
    work
    flows, then proxy discovery/negotiation is vitally relevant to that.

    several networks i operate and many that i'm aware of will have to do
    content inspection. there will be no free lunch for IoT (which is an
    instance of "surveillance capitalism dragnet"). the ietf has to
    decide
    whether to oppose, or ignore, or cooperate with that reality.

-- P Vixie

I really wanted to be sure the QUIC WG didn't forget that there are other use-cases for the MASQUE work.  When I paused to think about what to ask in my email, my email client "helpfully" just "sent" my pending email.... actually on this occasion that wasn't such a bad thing as it turns out, because it generated some responses!

Other people have now mentioned enterprise networks; 5G (using a variety of sub-IP technologies) and IoT, there are probably more. I expect the future to not be as simple as a transfer of power/trust from operators to content providers for all uses of QUIC. Really, this has potential to help with QUIC performance for some specific deployment scenarios - if the IETF chooses "ignore these use cases" or "design to prevent these use cases" - then my guess is that this will not stop those who operate networks from doing things, things that might be worse - the example of NAT seems a relevant previous use of IETF thinking that if we ignore, it will disappear.

And I agee with David: the plan to first do MASQUE (for the clear use case accepted by the group); and also to better understand "end to end" multipath do seem like a good step in the correct direction. That's all.

Gorry

Reply via email to