Re: [arch-d] [Edm] Call for Comment: <draft-iab-use-it-or-lose-it-02> (Long-term Viability of Protocol Extension Mechanisms)

Christian Huitema <huitema@huitema.net> Thu, 26 August 2021 00:57 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B15AC3A07BC for <architecture-discuss@ietfa.amsl.com>; Wed, 25 Aug 2021 17:57:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.89
X-Spam-Level:
X-Spam-Status: No, score=-1.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u1FkDNHjFTTk for <architecture-discuss@ietfa.amsl.com>; Wed, 25 Aug 2021 17:57:09 -0700 (PDT)
Received: from mx36-out10.antispamcloud.com (mx36-out10.antispamcloud.com [209.126.121.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 290DA3A07B6 for <architecture-discuss@ietf.org>; Wed, 25 Aug 2021 17:57:08 -0700 (PDT)
Received: from [66.113.192.7] (helo=xse.mail2web.com) by mx135.antispamcloud.com with esmtp (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1mJ3hY-00027j-AW for architecture-discuss@ietf.org; Thu, 26 Aug 2021 02:57:07 +0200
Received: from xsmtp22.mail2web.com (unknown [10.100.68.61]) by xse.mail2web.com (Postfix) with ESMTPS id 4Gw4Dv2FFKz9rN for <architecture-discuss@ietf.org>; Wed, 25 Aug 2021 17:57:03 -0700 (PDT)
Received: from [10.5.2.17] (helo=xmail07.myhosting.com) by xsmtp22.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1mJ3hX-0003Jn-6K for architecture-discuss@ietf.org; Wed, 25 Aug 2021 17:57:03 -0700
Received: (qmail 9273 invoked from network); 26 Aug 2021 00:57:02 -0000
Received: from unknown (HELO [192.168.1.104]) (Authenticated-user:_huitema@huitema.net@[172.58.43.180]) (envelope-sender <huitema@huitema.net>) by xmail07.myhosting.com (qmail-ldap-1.03) with ESMTPA for <edm@iab.org>; 26 Aug 2021 00:57:01 -0000
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, architecture-discuss@ietf.org
Cc: edm@iab.org
References: <162991703946.25379.3009360954932586670@ietfa.amsl.com> <078f0246-6e3f-1a49-38e7-cfdae1539c93@joelhalpern.com> <d12b1bf0-e120-f686-d1af-3f63fea15f56@gmail.com>
From: Christian Huitema <huitema@huitema.net>
Message-ID: <b2d2f62f-255c-62e9-9d82-55210f696b35@huitema.net>
Date: Wed, 25 Aug 2021 17:57:00 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.13.0
MIME-Version: 1.0
In-Reply-To: <d12b1bf0-e120-f686-d1af-3f63fea15f56@gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US
X-Originating-IP: 66.113.192.7
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 66.113.192.0/27
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=66.113.192.0/27@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.15)
X-Recommended-Action: accept
X-Filter-ID: Pt3MvcO5N4iKaDQ5O6lkdGlMVN6RH8bjRMzItlySaT9WLQux0N3HQm8ltz8rnu+BPUtbdvnXkggZ 3YnVId/Y5jcf0yeVQAvfjHznO7+bT5yLNgi2F4M0RbknB3BDmsRxyINTMb4kYMD15j85Ktbckyo/ xMM0hxORRmMMI7DUTwhGgel0/oyMrBoGq8a3IQof5g+sHZmT3CLVmxntdIVybVy+BbGrglZA45nG CXVN8lqeyrhzWminYO4gRGXn3bDVBVisGv8MyVI5ms3guyJnGi29tDN7TnI2x7IBaKSOuvAUOled bu+r9+W9cDXvzL3S/4V4qyO46SwNzbTSta25A9vifT4GqBfEkB7aN5XuM7B02nkLZSrmz+olE44+ sjwESum7gC1WgO/NiysYOr0Zp4PDdWi4V6nXPowtUXJ1bnedw+XGlIW1bb6iLQaqIs5BQ1iZnKhy rLCsWspRWpmlfm/bWfgucjnNmABpGhD9TTvsHevH1oPDPw6jSZ8sSu5nHQrtppYmxMktfUX7kfB+ UdezYqxGMqsKjARq8PBC4qjsg+1MbTjLihY8yuc7IlaITAas0edmB2q/yBRqnQY9WuiLqQuUai4/ 5Ov8Jofs7uvDx9dgYfO2muGH2bNdOKfOzon1aL1KuwjoHteKIt8tLa0jiD6XqsJZtjQxlyCdsexL XpEofGYcf2LRESm1jfBO+fSm4BF+A3ChntjgOu2gUk0H05ZK1nTUAYUIqABTytnCHhquEUYeTO5y w9BKmKqdwLB/KAXjVuMSC9eDy1a6LffQsJMjVuaCfq+S2F3DJOIRFZ4oobg8BBg3Jq+ntzj0UNvG Y+ukg+KdzZlxZ8eCn3NEzUw/6s75dIZcUImgiWlmGz36eUCK1+RLviVqtw6eRGPJvnbyaJRHV44/ pEFIT9jWHOPW6QbwnO2ZGzCl/bG9d6hWUqvBcfvaLZ9Gqo2vFSj6qXbJJOS8QUf/bdczDJHbuv0d hTPOJMWERUrwtSA4NQUVu4c6fMN4h3DsG1bbJln50BhorOBL20d417CNBEl8IQVNocLfydfAvh8o CZf4xM5tUrEfL92iWzfzWX2vKR4R2s/hz2tBwIBMeLFgxQ==
X-Report-Abuse-To: spam@quarantine11.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/Cj3sfxVMpg_XPc_FMggV6uRh5iw>
Subject: Re: [arch-d] [Edm] Call for Comment: <draft-iab-use-it-or-lose-it-02> (Long-term Viability of Protocol Extension Mechanisms)
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Aug 2021 00:57:13 -0000

On 8/25/2021 4:17 PM, Brian E Carpenter wrote:
> I support Joel's point, but here are two more.
>
> (1) At least for the Internet layer, we have a major problem in deploying new extensions, especially IPv6 extension headers, but this problem goes back 25 years as far as new IPv4 options are concerned. I hoped that section 2.3 "Multi-Party Interactions and Middleboxes" would touch on this, but it doesn't.

In the IP case, I found that using the example of the 4 bit version 
number is a bit weak. "The version field in IP was rendered useless when 
encapsulated over Ethernet" -- AFAIK, that's not just Ethernet. And I 
don't think anyone seriously considered using the same encapsulation for 
v4 and v6, or using the version number for anything besides debugging...

The really big example at the IP level would be the IP options (IPv4) or 
the IPV6 extension headers. Neither of those really works as intended, 
pretty much because of the implementation issues that Joel mentions. 
There is a reason why QUIC runs on top of UDP, not on top of 
"payload-type = QUIC" -- and that's very much in line with the central 
point in the draft.

> Looking back in the draft, I see that it intentionally ducks the question: "This document largely assumes that extensions are not deliberately blocked." But what if they are? That's what firewalls do for a living and it's a major block on innovation. In my world, it's much more significant than the concerns in this draft, and none of the suggested techniques help, as far as I can see.
> I'm not suggesting that this document can solve the problem, but can we have a more complete acknowledgement of it than the sentence quoted above?

I have some sympathy for the assumption in the draft that features are 
not deliberately blocked. For me, the big issue partial blockage, such 
as intermediaries allowing some configuration of an e2e protocol but not 
others. For e2e deployments, that translates into random failures for 
obscure reasons. Discussing that will require a fair bit of text, much 
more than the current section 4.3. I can see why this would be better 
addressed in a different draft -- like the wire-image draft. But yes, 
this draft could explicitly point to wire-image for that discussion.

-- Christian Huitema