Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Guidance for port number use #26

Closed
MikeBishop opened this issue Feb 6, 2018 · 6 comments
Closed

Guidance for port number use #26

MikeBishop opened this issue Feb 6, 2018 · 6 comments

Comments

@MikeBishop
Copy link
Contributor

Copying from quicwg/base-drafts#495

There's no requirement that servers use a particular UDP port for HTTP/QUIC or any other QUIC traffic. Using Alt-Svc, the server is able to pick and advertise any port number and a compliant client will handle it just fine. That's already the case, and isn't part of this issue. #424 updates the HTTP draft to highlight this, increasing the odds that implementations will test and support that case.

This issue is to track that it might actually be desirable from a privacy standpoint for servers to pick arbitrary port numbers and perhaps even rotate them periodically (though that requires coordination with their Alt-Svc advertisements and lifetimes, which could be challenging) in order to make it more difficult for a network observer to classify traffic (and therefore more difficult to ossify).

On the other hand, as we're wrestling with in each of these privacy/manageability debates, removing easy network visibility into the likely protocol by using arbitrary port numbers means that middleboxes will probably resort to other means of attempting to identify protocols and potentially doing it badly, which could result in even worse ossification. (E.g. indexing into the TLS ClientHello to find the ALPN list, then panicking on a different handshake protocol.)

There's further discussion on the original issue, but this belongs in the ops drafts, not the protocol drafts.

@britram
Copy link
Contributor

britram commented Feb 6, 2018

this kind-of-but-not-really-duplicates #10, which I'll go ahead and close.

@MikeBishop
Copy link
Contributor Author

Actually, it's an exact duplicate, given that it points to the same issue. ;-) My bad.

mirjak added a commit that referenced this issue Oct 17, 2018
hopefully addresses issue #26
@mirjak
Copy link
Contributor

mirjak commented Oct 17, 2018

@MikeBishop can you check if PR #43 addresses this issue sufficiently? At least for the applicability doc...

mirjak added a commit that referenced this issue Oct 17, 2018
also to address issue #26
@mirjak
Copy link
Contributor

mirjak commented Oct 17, 2018

Now also PR #44 for the manageability statement.

@britram
Copy link
Contributor

britram commented Oct 22, 2018

#43 and #44 are a (ready for -03) treatment of this; however, we should consider if we want to say more, e.g. such as general guidance / recommendations for using ALPN in QUIC mappings, for instance? Keeping this open to track.

@mirjak
Copy link
Contributor

mirjak commented Jul 4, 2019

created new issue #79 for ALPN

@mirjak mirjak closed this as completed Jul 4, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants