From mboxrd@z Thu Jan 1 00:00:00 1970
Return-Path:
Received: from smtp84.iad3a.emailsrvr.com (smtp84.iad3a.emailsrvr.com
[173.203.187.84])
(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
(No client certificate requested)
by lists.bufferbloat.net (Postfix) with ESMTPS id 9E9063B2A4
for ; Mon, 15 Nov 2021 13:45:38 -0500 (EST)
Received: from app6.wa-webapps.iad3a (relay-webapps.rsapps.net
[172.27.255.140])
by smtp19.relay.iad3a.emailsrvr.com (SMTP Server) with ESMTP id F3D6E4FF5;
Mon, 15 Nov 2021 13:45:37 -0500 (EST)
Received: from deepplum.com (localhost.localdomain [127.0.0.1])
by app6.wa-webapps.iad3a (Postfix) with ESMTP id D6D8EE0064;
Mon, 15 Nov 2021 13:45:37 -0500 (EST)
Received: by apps.rackspace.com
(Authenticated sender: dpreed@deepplum.com, from: dpreed@deepplum.com)
with HTTP; Mon, 15 Nov 2021 13:45:37 -0500 (EST)
X-Auth-ID: dpreed@deepplum.com
Date: Mon, 15 Nov 2021 13:45:37 -0500 (EST)
From: "David P. Reed"
To: "Livingood, Jason"
Cc: "starlink@lists.bufferbloat.net"
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----=_20211115134537000000_71729"
Importance: Normal
X-Priority: 3 (Normal)
X-Type: html
In-Reply-To: <523DB564-9E11-4845-8072-003D9E1863AC@cable.comcast.com>
References:
<1636655426.376728690@apps.rackspace.com>
<523DB564-9E11-4845-8072-003D9E1863AC@cable.comcast.com>
X-Client-IP: 209.6.168.128
Message-ID: <1637001937.876717373@apps.rackspace.com>
X-Mailer: webmail/19.0.13-RC
X-Classification-ID: 9803426c-5983-4ed5-8bd2-1eba6039c92a-1-1
Subject: Re: [Starlink] something of a step backwards
X-BeenThere: starlink@lists.bufferbloat.net
X-Mailman-Version: 2.1.20
Precedence: list
List-Id: "Starlink has bufferbloat. Bad."
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 15 Nov 2021 18:45:38 -0000
------=_20211115134537000000_71729
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
=0A>> They may start MITM's https connections to read traffic=0A =0A> Unles=
s they install certs on client devices how are they going to attack the TLS=
connections?=0AI don't know what is the current state of practice, but las=
t time I looked, GoGo Internet was MITM'ing with packet content inspection =
in order to block "streaming" from passenger seats. This was justified by G=
oGo claiming that it was the ONLY way to manage traffic that dealt with str=
eaming. In fact, merely fixing their bufferbloat would have completely elim=
inated the whole class of "overload" real-time services, and would have mad=
e response snappy as hell for all passengers sharing the connection. (And s=
treaming would have had to run at very long latencies due to "fairness", es=
sentially making Netflix impossible.=0A =0AI don't know if this was ignoran=
ce on GoGo's part, or intent to continue to act as a MITM.=0A =0AThe mechan=
ism for MITM'ing HTTPS connections is well known. I don't intend to detail =
it here, but it is based on the fact that certs aren't properly validated b=
y client-end software and server-end software.=0A =0A> FWIW, that was not w=
hy P2P connections were reset way back when. It was at root a bufferbloat i=
ssue, confounded by a lot of bad responses to & misunderstandings of the is=
sue at that time. ;-)=0A =0ABy stating it was "bad responses" this covers u=
p the entire Comcast fiasco, which led me to testify before an FCC En Banc =
on Network Management.=0AIn fact, Comcast did have a bufferbloat *problem* =
technically. But it did not know it. Instead, their top management, includi=
ng technical management *made up* a story to justify use of Sandvine DPI cl=
assification and packet insertion gear at all CMTS's owned by Comcast, whic=
h inspected content and inserted TCP packets to break connections. Comcast =
top management also attempted to get me, personally, fired from MIT or disc=
iplined, by contacting several MIT executives who had the power to do just =
that! This personal attack is all thoroughly witnessed, including by a Sr. =
VP at Comcast at the time (whom Jason worked for).=0A =0AComcast PR made up=
a story that the "real problem" was BitTorrent use, because BitTorrent cou=
ld, in fact, generate lots of upstream traffic. Which smelled funny, becaus=
e if there was congestion, BitTorrent actually responded to TCP congestion =
control metrics. What was happening was, instead, that DOCSIS 2.0 had the a=
bility to turn off packet drops entirely, instead allowing a single home to=
fill the entire outbound traffic path.=0A =0AThus, I ended up having to de=
al with a) Comcast claiming that "network management" required packet disss=
assembly, and required Comcast to inspect the content of *every* packet. It=
also boosted lies being told by Sandvine and Ellacoya about the virtues of=
their gear, developed by Israeli intelligence services to spy on internet =
traffic in real time, for network management. They began marketing their eq=
uipment to ALL ISPs in the world; and b) a push by all ISPs to claim that n=
etwork management by surveillance gear (DPI) was within the norms of the In=
ternet; and c) a push for companies like NebuAd and Phorm to argue that ISP=
s should have the right to read all traffic from all subscribers to collect=
data about the content of each subscriber's Internet to emulate what would=
become the "surveillance capitalist" model at the Internet Access level.=
=0A =0AAnd beyond those global issues, having my personal technical ability=
and integrity attacked in public by well funded lobbyists in DC.=0A =0ASo,=
Jason, since you brought it up, these are the stakes that were, and remain=
, in creating an Open, Neutral Internet access model.=0A =0A =0AOn Monday, =
November 15, 2021 9:21am, "Livingood, Jason" =
said:=0A=0A=0A=0A=0A> They may start MITM's https connections to read traff=
ic =0A =0AUnless they install certs on client devices how are they going to=
attack the TLS connections?=0A =0A> They may start blocking bittorrent bec=
ause they claim it's all "piracy" and theft.=0A =0AFWIW, that was not why P=
2P connections were reset way back when. It was at root a bufferbloat issue=
, confounded by a lot of bad responses to & misunderstandings of the issue =
at that time. ;-) =0A =0ABut you do raise an interesting point that what=E2=
=80=99s considered a reasonable network management practice differs by type=
of access network =E2=80=93 which we can see in the US between wired and w=
ireless access network practices. What may become standard practice in LEO =
access networks is still emerging I suppose.=0A =0A> This always comes with=
some argument that "bundling" a provider-controlled service =0A =0AI=E2=80=
=99d guess the fastest path to deploy a MVP was to keep the edge access dev=
ice as simple as possible and not worry about testing lots of permutations.=
So getting to market with 1 device makes sense IMO. What the future holds =
is anyone=E2=80=99s guess =E2=80=93 but ISTM they are still fairly early in=
deployment. =0A =0AJL=0A
------=_20211115134537000000_71729
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
>> They may start MITM's https c=
onnections to read traffic
=0A
=0A>=
; Unless they install certs on client devices how are they going to attack =
the TLS connections?
=0AI don't know what is=
the current state of practice, but last time I looked, GoGo Internet was M=
ITM'ing with packet content inspection in order to block "streaming" from p=
assenger seats. This was justified by GoGo claiming that it was the ONLY wa=
y to manage traffic that dealt with streaming. In fact, merely fixing their=
bufferbloat would have completely eliminated the whole class of "overload"=
real-time services, and would have made response snappy as hell for all pa=
ssengers sharing the connection. (And streaming would have had to run at ve=
ry long latencies due to "fairness", essentially making Netflix impossible.=
=0A
=0AI don't know =
if this was ignorance on GoGo's part, or intent to continue to act as a MIT=
M.
=0A
=0AThe mechani=
sm for MITM'ing HTTPS connections is well known. I don't intend to detail i=
t here, but it is based on the fact that certs aren't properly validated by=
client-end software and server-end software.
=0A&n=
bsp;
=0A> FWIW, that was not why P2P connections were reset w=
ay back when. It was at root a bufferbloat issue, confounded by a lot of ba=
d responses to & misunderstandings of the issue at that time. ;-)
=0A
=0ABy stating it was "bad r=
esponses" this covers up the entire Comcast fiasco, which led me to testify=
before an FCC En Banc on Network Management.
=0AIn fact,=
Comcast did have a bufferbloat *problem* technically. But it did not know =
it. Instead, their top management, including technical management *made up*=
a story to justify use of Sandvine DPI classification and packet insertion=
gear at all CMTS's owned by Comcast, which inspected content and inserted =
TCP packets to break connections. Comcast top management also attempted to =
get me, personally, fired from MIT or disciplined, by contacting several MI=
T executives who had the power to do just that! This personal attack is all=
thoroughly witnessed, including by a Sr. VP at Comcast at the time (whom J=
ason worked for).
=0A
=0A=
Comcast PR made up a story that the "real problem" was BitTorrent use, beca=
use BitTorrent could, in fact, generate lots of upstream traffic. Which sme=
lled funny, because if there was congestion, BitTorrent actually responded =
to TCP congestion control metrics. What was happening was, instead, that DO=
CSIS 2.0 had the ability to turn off packet drops entirely, instead allowin=
g a single home to fill the entire outbound traffic path.
=0A
=0AThus, I ended up having to deal with =
a) Comcast claiming that "network management" required packet disssassembly=
, and required Comcast to inspect the content of *every* packet. It also bo=
osted lies being told by Sandvine and Ellacoya about the virtues of their g=
ear, developed by Israeli intelligence services to spy on internet traffic =
in real time, for network management. They began marketing their equipment =
to ALL ISPs in the world; and b) a push by all ISPs to claim that network m=
anagement by surveillance gear (DPI) was within the norms of the Internet; =
and c) a push for companies like NebuAd and Phorm to argue that ISPs should=
have the right to read all traffic from all subscribers to collect data ab=
out the content of each subscriber's Internet to emulate what would become =
the "surveillance capitalist" model at the Internet Access level.
=0A
=0AAnd beyond those global issue=
s, having my personal technical ability and integrity attacked in public by=
well funded lobbyists in DC.
=0A
=
=0ASo, Jason, since you brought it up, these are the stakes that we=
re, and remain, in creating an Open, Neutral Internet access model.<=
/p>=0A
=0A
=0A<=
p style=3D"margin:0;padding:0;font-family: arial; font-size: 10pt; overflow=
-wrap: break-word;">On Monday, November 15, 2021 9:21am, "Livingood, Jason"=
<Jason_Livingood@comcast.com> said:
=0A=0A=0A
=0A
> They may start MITM's https connections to read tr=
affic
=0A
=0A
Unless they install certs=
on client devices how are they going to attack the TLS connections?=
=0A
=0A
> They m=
ay start blocking bittorrent because they claim it's all "piracy" and theft=
.
=0A
=0A
FWIW, that was not why P2P con=
nections were reset way back when. It was at root a bufferbloat issue, conf=
ounded by a lot of bad responses to & misunderstandings of the issue at=
that time. ;-)
=0A
=
=0A
But you do rais=
e an interesting point that what=E2=80=99s considered a reasonable network =
management practice differs by type of access network =E2=80=93 which we ca=
n see in the US between wired and wireless access network practices. What m=
ay become standard practice in LEO access networks is still emerging I supp=
ose.
=0A
=0A
> This always comes wit=
h some argument that "bundling" a provider-controlled service
=
=0A
=0A
I=E2=80=99d guess the fastest path to depl=
oy a MVP was to keep the edge access device as simple as possible and not w=
orry about testing lots of permutations. So getting to market with 1 device=
makes sense IMO. What the future holds is anyone=E2=80=99s guess =E2=80=93=
but ISTM they are still fairly early in deployment.
=0A
&nb=
sp;
=0A
JL
=0A
=0A
=0A<=
/div>
------=_20211115134537000000_71729--