Re: [core] Fw: New Version Notification for draft-tcs-coap-no-response-option-15.txt
Klaus Hartke <hartke@tzi.org> Tue, 05 April 2016 20:04 UTC
Return-Path: <hartke@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EF1212D7FC for <core@ietfa.amsl.com>; Tue, 5 Apr 2016 13:04:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EtWyYtTlZZZu for <core@ietfa.amsl.com>; Tue, 5 Apr 2016 13:04:46 -0700 (PDT)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B56712D86D for <core@ietf.org>; Tue, 5 Apr 2016 13:04:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::b]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id u35K4cPh027671 for <core@ietf.org>; Tue, 5 Apr 2016 22:04:38 +0200 (CEST)
Received: from mail-wm0-f49.google.com (mail-wm0-f49.google.com [74.125.82.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3qffvp53Nxz385s for <core@ietf.org>; Tue, 5 Apr 2016 22:04:38 +0200 (CEST)
Received: by mail-wm0-f49.google.com with SMTP id 191so35947872wmq.0 for <core@ietf.org>; Tue, 05 Apr 2016 13:04:38 -0700 (PDT)
X-Gm-Message-State: AD7BkJL1i2SZ20t/crzsuSTd4b81n/F0QAIzZr1Od/va6OjHydqB9yjUn93Eoz/cg9LQCSLPsGfz8XqLvKt8pw==
X-Received: by 10.28.128.88 with SMTP id b85mr20611722wmd.46.1459886678185; Tue, 05 Apr 2016 13:04:38 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.194.47.167 with HTTP; Tue, 5 Apr 2016 13:03:58 -0700 (PDT)
In-Reply-To: <OF4891E172.E728883C-ON65257F8C.0064E7F4-65257F8C.0067AA65@tcs.com>
References: <OF0DBE139D.396C10DC-ON65257F8B.004137DA-65257F8B.00419458@tcs.com> <CAAzbHvat1xyHxRLpYOn_hmhGL3V7wJ9aK8R3T8tiQqG5naq=xA@mail.gmail.com> <OF4891E172.E728883C-ON65257F8C.0064E7F4-65257F8C.0067AA65@tcs.com>
From: Klaus Hartke <hartke@tzi.org>
Date: Tue, 05 Apr 2016 22:03:58 +0200
X-Gmail-Original-Message-ID: <CAAzbHvaQ7eOWiiPYpr6Tnn2LZhWQsouoj_x84Y_f0gtBirfF4Q@mail.gmail.com>
Message-ID: <CAAzbHvaQ7eOWiiPYpr6Tnn2LZhWQsouoj_x84Y_f0gtBirfF4Q@mail.gmail.com>
To: Abhijan Bhattacharyya <abhijan.bhattacharyya@tcs.com>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/core/X00OZOjL8mcnyzZy6dSqlGO2LuQ>
Cc: Nevil Brownlee <rfc-ise@rfc-editor.org>, "core@ietf.org WG" <core@ietf.org>
Subject: Re: [core] Fw: New Version Notification for draft-tcs-coap-no-response-option-15.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Apr 2016 20:04:49 -0000
Abhijan Bhattacharyya wrote: > The option should be Unsafe-to-forward. The option definition has been > modified as below: > > "[...] This > option is Unsafe-to-forward as the intermediary MUST know how to interpret > this option. [...]" Unsafe-to-forward does not mean that every intermediary has the requirement to implement your option. Unsafe-to-forward determines the behaviour of intermediaries that do *not* implement an option. If an intermediary receives a request with an unrecognised option that is unsafe-to-forward, then it must not include that option in its request towards the origin server. > Now regarding the other two points: (Note that these points need to be addressed in the document, not just on the mailing list.) >>> What's the impact of the No-Response option on a chain of > CoAP-to-CoAP proxies? > > Since, this option is unsafe-to-forward, the intermediaries must have > knowledge about the option. No. See above. > So, the intermediaries should not wait for any > responses if the option value is 127. What do you mean? If an intermediary receives a request with the No-Response option, should it include the option in its request towards the origin server? That's a bad idea. See below. And a client should probably listen to responses even if it suppresses all responses because a server might still want to send a response, e.g., to slow down the client. See below. >>> What's the impact of the No-Response option on caches? > > Since the cacheability of the CoAP responses depends on the Response Code so > the No-Response option should not have any effect on the cacheability. If a server returns a 4.04 response (or any other cacheable error response) with Max-Age != 0, then a cache will return that response as long as Max-Age has not elapsed instead of making a request towards the origin server. So the caching of error responses protects a server a bit from clients repeatedly triggering the same error. The No-Response option destroys this protection. To limit the damage, I would say that intermediaries MUST NOT include the No-Response option in their requests. How does the No-Response option interact with the 4.29 response code [1]? I would expect that a server is permitted to send this response even if the client suppresses this response code. An unrelated nit: Section 2.1 says "To suppress all possible responses: The maximum reserved response code for CoAP is 7.31". The range 6.00 to 7.31 is reserved, but not for response codes. The maximum response code is 5.31. Klaus [1] https://tools.ietf.org/html/draft-koster-core-coap-pubsub-04#section-9.3
- [core] Fw: New Version Notification for draft-tcs… Abhijan Bhattacharyya
- Re: [core] Fw: New Version Notification for draft… Klaus Hartke
- Re: [core] Fw: New Version Notification for draft… Abhijan Bhattacharyya
- Re: [core] Fw: New Version Notification for draft… Klaus Hartke