I agree with Tommy here. If network advertised proxies can be used in multiple kinds of networks it makes sense to have a common discovery method.
IPv6 RAs are extensively used in 3GPP networks and have a broader applicability than PCOs, so it does seem like a good fit. BR Marcus From: Int-area <int-area-boun...@ietf.org> On Behalf Of mohamed.boucad...@orange.com Sent: Wednesday, 26 July 2023 18:53 To: Tommy Pauly <tpa...@apple.com> Cc: int-area@ietf.org; mas...@ietf.org Subject: Re: [Int-area] [Masque] draft-pauly-intarea-proxy-config-pvd Re-, Not sure why using PvD would be “cleaner” vs. what they are doing with PCO IEs. There are plenty proxies that are enabled in cellular networks and being discovered by UEs already (CSCFs, etc.). Cheers, Med De : Tommy Pauly <tpa...@apple.com<mailto:tpa...@apple.com>> Envoyé : mercredi 26 juillet 2023 09:17 À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucad...@orange.com<mailto:mohamed.boucad...@orange.com>> Cc : Marc Blanchet <marc.blanc...@viagenie.ca<mailto:marc.blanc...@viagenie.ca>>; int-area@ietf.org<mailto:int-area@ietf.org>; mas...@ietf.org<mailto:mas...@ietf.org> Objet : Re: [Int-area] [Masque] draft-pauly-intarea-proxy-config-pvd Indeed, I don’t think 8801 is currently deployed by the carriers, but the target of this document is to have a standard, cross-network way to bootstrap the discovery of these proxies. Using IPv6 RAs and related information to advertise proxies would allow 3GPP to provide this as a clean discovery option, and one that will work on any network attachment as well. This makes the incentive for clients to adopt higher since it will work across all networks. Tommy On Jul 26, 2023, at 7:48 AM, mohamed.boucad...@orange.com<mailto:mohamed.boucad...@orange.com> wrote: Hi Tommy, - ... on cellular carrier networks, which is one of the main deployment targets here. Unless I'm mistaken 8801 is not required/supported in 3GPP specs. Typically, PCO IEs are used there. FWIW, the network already provides the following to a UE (excerpt from 23501): == (0-RTT Converter) iii) The network shall send MPTCP proxy information to UE, i.e. the IP address, a port number and the type of the MPTCP proxy. The following type of MPTCP proxy shall be supported in this release: - Type 1: Transport Converter, as defined in IETF RFC 8803 [82]. The MPTCP proxy information is retrieved by the SMF from the UPF during N4 session establishment. The UE shall support the client extensions specified in IETF RFC 8803 [82]. == And == (MPQUIC Proxy) The network shall send MPQUIC proxy information to UE, i.e. one IP address of UPF, one UDP port number and the proxy type (e.g. "connect-udp"). This information is used by the UE for establishing multipath QUIC connections with the UPF, which implements the MPQUIC Proxy functionality. = Cheers, Med -----Message d'origine----- De : Int-area <int-area-boun...@ietf.org<mailto:int-area-boun...@ietf.org>> De la part de Tommy Pauly Envoyé : mardi 25 juillet 2023 23:34 À : Marc Blanchet <marc.blanc...@viagenie.ca<mailto:marc.blanc...@viagenie.ca>> Cc : int-area@ietf.org<mailto:int-area@ietf.org>; mas...@ietf.org<mailto:mas...@ietf.org> Objet : Re: [Int-area] [Masque] draft-pauly-intarea-proxy-config- pvd Hi Marc, To start — I have no objection to there being some mechanism to discover a proxy using dns-sd / bonjour! If someone has a good use case for that, that certainly is a possibility. I do think it would be a different use case than the one for this network-provided proxy provisioning, however. A couple salient points to consider: - While the local router may be able to point you to the appropriate proxies to use, the proxies themselves are likely not on the local link or multicast area. Instead, they would likely be some infrastructure associated with the network operator, deeper in the network. - A dns-sd solution would allow many parties to advertise such capabilities on the network. The case we’re concerned with here is knowing the one that comes from a network operator, not other peers. - While I can’t rule it out categorically, I’m not aware of many cases where we’d be able to use multicast dns-sd on cellular carrier networks, which is one of the main deployment targets here. Thanks, Tommy On Jul 25, 2023, at 3:57 PM, Marc Blanchet <marc.blanc...@viagenie.ca<mailto:marc.blanc...@viagenie.ca>> wrote: Hello, Saw your presentation yesterday at masque and now read your draft. Fine by the overall approach, but I was wondering if you have considered to use DNS-SD (aka Bonjour)? I could see a proxy on the local network advertising its proxy service and the client « finding » the proxy by the DNS-SD/Bonjour mechanism. Seems straightforward to me. Also enables multiple proxies to « offer » their service, so redundancy right out of the box. In other words, I’m looking at this as a service discovery not provisioning. I am surely missing something? Regards, Marc. -- ____________________________________________________________________________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and delete this message and its attachments. As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. Thank you. ____________________________________________________________________________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and delete this message and its attachments. As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. Thank you.
_______________________________________________ Int-area mailing list Int-area@ietf.org https://www.ietf.org/mailman/listinfo/int-area