Re: [core] Adam Roach's No Objection on draft-ietf-core-hop-limit-06: (with COMMENT)

<mohamed.boucadair@orange.com> Thu, 17 October 2019 07:28 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA90E12083E; Thu, 17 Oct 2019 00:28:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OcOguDrJrSKn; Thu, 17 Oct 2019 00:28:50 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.39]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A642512083D; Thu, 17 Oct 2019 00:28:49 -0700 (PDT)
Received: from opfedar05.francetelecom.fr (unknown [xx.xx.xx.7]) by opfedar24.francetelecom.fr (ESMTP service) with ESMTP id 46v14J2bt5z5vsP; Thu, 17 Oct 2019 09:28:48 +0200 (CEST)
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.82]) by opfedar05.francetelecom.fr (ESMTP service) with ESMTP id 46v14J199bz2xCF; Thu, 17 Oct 2019 09:28:48 +0200 (CEST)
Received: from OPEXCAUBMA2.corporate.adroot.infra.ftgroup ([fe80::e878:bd0:c89e:5b42]) by OPEXCAUBM5E.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.03.0468.000; Thu, 17 Oct 2019 09:28:48 +0200
From: mohamed.boucadair@orange.com
To: Adam Roach <adam@nostrum.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-core-hop-limit@ietf.org" <draft-ietf-core-hop-limit@ietf.org>, Jaime Jimenez <jaime@iki.fi>, "core-chairs@ietf.org" <core-chairs@ietf.org>, "core@ietf.org" <core@ietf.org>
Thread-Topic: Adam Roach's No Objection on draft-ietf-core-hop-limit-06: (with COMMENT)
Thread-Index: AQHVg9aSRhktMVOwWku35CdY8YVATqdeUwaw
Date: Thu, 17 Oct 2019 07:28:47 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933031340642@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <157119856571.27890.17758374211784702820.idtracker@ietfa.amsl.com>
In-Reply-To: <157119856571.27890.17758374211784702820.idtracker@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.245]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/QwwVE26XZoS_fZPVRCan_tgUSlw>
Subject: Re: [core] Adam Roach's No Objection on draft-ietf-core-hop-limit-06: (with COMMENT)
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Oct 2019 07:28:52 -0000

Hi Adam, 

It was raised in the WG whether we want to fix this or only record the issue. I'm not convinced it is worth to request a new HTTP header to address a specific case, e.g., two COAP realms connected via an HTTP leg. For such loop to happen, this means that CoAP nodes are able to communicate natively using CoAP without crossing the proxies. The natural question is why then these proxies are deployed. 

I do think that the current approach in the draft is the right one: record a potential issue without speculating on how the issue is critical given that we don't have arguments.

Please note also that Section 10 of RFC7252 only discusses CoAP-to-HTTP proxy and vice-versa, and does not discuss CoAP-to-HTTP-to-CoAP schemes. May be an item to clarify in 7252-bis.

Thank you. 

Cheers,
Med

> -----Message d'origine-----
> De : Adam Roach via Datatracker [mailto:noreply@ietf.org]
> Envoyé : mercredi 16 octobre 2019 06:03
> À : The IESG
> Cc : draft-ietf-core-hop-limit@ietf.org; Jaime Jimenez; core-
> chairs@ietf.org; jaime@iki.fi; core@ietf.org
> Objet : Adam Roach's No Objection on draft-ietf-core-hop-limit-06: (with
> COMMENT)
> 
> Adam Roach has entered the following ballot position for
> draft-ietf-core-hop-limit-06: No Objection
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-core-hop-limit/
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> Thanks to everyone who worked on this document.
> 
> I'm a little surprised that the treatment of loops that go between HTTP and
> CoAP networks involves a simple observation that detection of such cases
> simply
> won't work, without any attempt at mitigation.
> 
> I'm sympathetic to the observation during WGLC that directly interworking
> with
> RFC 8586 isn't feasible, but surprised that more primitive approaches to at
> least preserving the CoAP Hop-Count as it crossed the HTTP network weren't
> considered. There are aesthetic discussions to be had around, e.g.,
> defining an
> HTTP "Hop-Count" header field (which isn't acted on by the HTTP network,
> but
> serves the purpose of preserving the value during transit) or overloading
> the
> semantics (but not really the meaning) of the HTTP "Max-Forwards" header
> field,
> or (in extremis) squirreling the Hop-Count away in the `pseudonym` portion
> of
> the inserted HTTP Via header field.  But I think the high order bit here is
> that preserving the Hop-Count value through the HTTP network would be
> trivial,
> and would prevent the identified shortcoming of the current mechanism.
>