Hi Mark, On 5/1/17 5:45 AM, Mark Nottingham
wrote:
What I'm becoming concerned about is us not talking about what we're talking about. If encryption presents challenges in some deployments, certainly one should say so. One should also say what workarounds are available, and maybe even what challenges or complexities those workarounds themselves introduce.Sorry for the late review; on the plus side, I'm coming to it with fresh eyes. Overall, this document reads as if it was originally written to highlight the downsides of increased use of encryption, and then rewritten to be more neutral in tone. Unfortunately, some of the original intent posited there still seeps through. And so for instance: Section 2.3.2.2 motivates DPI as "Input for Differential Treatment", but fails to note the developing efforts to coordinate client and server behaviour to adapt to network conditions, without the need for stripping encryption. There are two key issues to DPI is intended to tackle:
The trust relationships have to be in place for options 1 or 2 to work, and for the mobile operator use case that might be quite tricky. Option 2 presents a state management issue, and may or may not incur a latency penalty during setup. Both 1 and 2 have attendant complexity of additional communication paths, but as they say, there ain't no such thing as a free lunch, and that really is or should be the point of the draft. It may not be feasible to go into even this much detail in each case, and we shouldn't require that, so long as the problem statement is well supported. This seems to be what you're looking for in the context of caching: Section 2.3.2.1 points out that "Web proxies are widely used", but fails to note that the vast bulk of caching is done by endpoints -- browsers, CDNs and reverse proxies, thereby sidestepping the issues of encryption (although they have their own unique challenges). Discussing why this form of caching has become prevalent might help inform network operators as to why getting the economics and trust relationships of intermediation right is important. I like the idea of examining the economic relationships between, say, the end user's service provider and the end user, versus the end user service provider and the content provider, etc., and where value might be had with regard to those who have business relationships and those who don't. Note the case where the user is an employee is different than when the user is a service provider customer, the former of which is discussed in Section 4. One caution: this document risks turning into a tome if the discussion goes too long. Better to be succinct and reference where one can. Eliot |
Attachment:
signature.asc
Description: OpenPGP digital signature