On 9/30/2022 12:38 PM, Phillip Hallam-Baker wrote:
On Fri, Sep 30, 2022 at 3:04 PM Christian Huitema<[email protected]>
wrote:

See RFC 9250 for an example of transaction based application using QUIC.

-- Christian Huitema

DNS is an example of an information retrieval service which is the class of
services that HTTP works for.

What I am looking at are transactions of the form:

Post <EncyclopediaBritannica>
Analyze <HardProblem>
Stream <temperatureProbe>

The problem with HTTP for the first is that the receiver doesn't get to
know how big the data is until the buffer is filled unless Content-Length
is specified. And that has to be an exact length which kinda makes
streaming compression hard.

RFC 9250 does not use HTTP. It uses a simple RPC-style interface, mapping each RPC transaction to a QUIC stream.

The content length requirement that you cite is entirely an application issue. If an application defines its own application level protocol on top of QUIC, it can specify messages any which way, including requiring explicit message length up front, or in advance.

Of course, this has nothing to do with the claimed requirement to expose messages from individual devices to third parties. On that part, the use of a Wireshark-style solution appears the most practical, as Martin and Lucas pointed out already.

And yes, solutions in which the device being monitored cooperates with the monitor don't work if the device does not cooperate. That's a generic problem. A compromised device might claim to cooperate, and then use some form of steganography to infiltrate or exfiltrate information. It could do that even if the transmissions were in clear text. Monitoring, in practice, requires cooperation from the monitored device.

-- Christian Huitema

Reply via email to