On 6/25/2024 10:13 AM, Lucas Pardue wrote:
On Tue, Jun 25, 2024, at 17:39, Paul Vixie wrote:
On Jun 25, 2024 09:00, Lucas Pardue<[email protected]> wrote:
<<As others have noted, some folks are risk averse and are happy enough with the
status quo. If there are performance wins to be had, they'll likely be wanting to see case
studies before the CTO signs off on turning something on that might even have the slightest
hint of beung able to cause some regression in performance or stability.>>
I know that the designated topic is performance, but please give a thought to
the CISO's sign off. In a secure private network, a protocol designed to
prohibit monitoring is a nonstarter. We could get further faster with QUIC
deployment to these networks if there was support for secure proxy discovery
with connection annealing after the proxy had applied its policies to a flow.
Secure proxy discovery and configuration would be useful for a number of use
cases beyond just QUIC. I totally support the idea of people working on that in
the appropriate IETF venue.
Many QUIC (and TLS) implementations support the "key log file" facility
designed for debugging QUIC using wireshark (see
https://datatracker.ietf.org/doc/draft-ietf-tls-keylogfile/). I have
heard reports of on-device "host firewalls" using that API to get the
encryption keys of QUIC connections and inspect their traffic. I have
mixed feelings about that, but it is clearly an "emerging behavior".
-- Christian Huitema