Re: [core] Fw: New Version Notification for draft-tcs-coap-no-response-option-15.txt

Klaus Hartke <hartke@tzi.org> Tue, 05 April 2016 20:04 UTC

Return-Path: <hartke@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EF1212D7FC for <core@ietfa.amsl.com>; Tue, 5 Apr 2016 13:04:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EtWyYtTlZZZu for <core@ietfa.amsl.com>; Tue, 5 Apr 2016 13:04:46 -0700 (PDT)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B56712D86D for <core@ietf.org>; Tue, 5 Apr 2016 13:04:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::b]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id u35K4cPh027671 for <core@ietf.org>; Tue, 5 Apr 2016 22:04:38 +0200 (CEST)
Received: from mail-wm0-f49.google.com (mail-wm0-f49.google.com [74.125.82.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3qffvp53Nxz385s for <core@ietf.org>; Tue, 5 Apr 2016 22:04:38 +0200 (CEST)
Received: by mail-wm0-f49.google.com with SMTP id 191so35947872wmq.0 for <core@ietf.org>; Tue, 05 Apr 2016 13:04:38 -0700 (PDT)
X-Gm-Message-State: AD7BkJL1i2SZ20t/crzsuSTd4b81n/F0QAIzZr1Od/va6OjHydqB9yjUn93Eoz/cg9LQCSLPsGfz8XqLvKt8pw==
X-Received: by 10.28.128.88 with SMTP id b85mr20611722wmd.46.1459886678185; Tue, 05 Apr 2016 13:04:38 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.194.47.167 with HTTP; Tue, 5 Apr 2016 13:03:58 -0700 (PDT)
In-Reply-To: <OF4891E172.E728883C-ON65257F8C.0064E7F4-65257F8C.0067AA65@tcs.com>
References: <OF0DBE139D.396C10DC-ON65257F8B.004137DA-65257F8B.00419458@tcs.com> <CAAzbHvat1xyHxRLpYOn_hmhGL3V7wJ9aK8R3T8tiQqG5naq=xA@mail.gmail.com> <OF4891E172.E728883C-ON65257F8C.0064E7F4-65257F8C.0067AA65@tcs.com>
From: Klaus Hartke <hartke@tzi.org>
Date: Tue, 05 Apr 2016 22:03:58 +0200
X-Gmail-Original-Message-ID: <CAAzbHvaQ7eOWiiPYpr6Tnn2LZhWQsouoj_x84Y_f0gtBirfF4Q@mail.gmail.com>
Message-ID: <CAAzbHvaQ7eOWiiPYpr6Tnn2LZhWQsouoj_x84Y_f0gtBirfF4Q@mail.gmail.com>
To: Abhijan Bhattacharyya <abhijan.bhattacharyya@tcs.com>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/core/X00OZOjL8mcnyzZy6dSqlGO2LuQ>
Cc: Nevil Brownlee <rfc-ise@rfc-editor.org>, "core@ietf.org WG" <core@ietf.org>
Subject: Re: [core] Fw: New Version Notification for draft-tcs-coap-no-response-option-15.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Apr 2016 20:04:49 -0000

Abhijan Bhattacharyya wrote:
> The option should be Unsafe-to-forward. The option definition has been
> modified as below:
>
> "[...] This
> option is Unsafe-to-forward as the intermediary MUST know how to interpret
> this option. [...]"

Unsafe-to-forward does not mean that every intermediary has the
requirement to implement your option. Unsafe-to-forward determines the
behaviour of intermediaries that do *not* implement an option. If an
intermediary receives a request with an unrecognised option that is
unsafe-to-forward, then it must not include that option in its request
towards the origin server.

> Now regarding the other two points:

(Note that these points need to be addressed in the document, not just
on the mailing list.)

>>> What's the impact of the No-Response option on a chain of
> CoAP-to-CoAP proxies?
>
> Since, this option is unsafe-to-forward, the intermediaries must have
> knowledge about the option.

No. See above.

> So, the intermediaries should not wait for any
> responses if the option value is 127.

What do you mean? If an intermediary receives a request with the
No-Response option, should it include the option in its request
towards the origin server? That's a bad idea. See below.

And a client should probably listen to responses even if it suppresses
all responses because a server might still want to send a response,
e.g., to slow down the client. See below.

>>> What's the impact of the No-Response option on caches?
>
> Since the cacheability of the CoAP responses depends on the Response Code so
> the No-Response option should not have any effect on the cacheability.

If a server returns a 4.04 response (or any other cacheable error
response) with Max-Age != 0, then a cache will return that response as
long as Max-Age has not elapsed instead of making a request towards
the origin server. So the caching of error responses protects a server
a bit from clients repeatedly triggering the same error. The
No-Response option destroys this protection. To limit the damage, I
would say that intermediaries MUST NOT include the No-Response option
in their requests.

How does the No-Response option interact with the 4.29 response code
[1]? I would expect that a server is permitted to send this response
even if the client suppresses this response code.

An unrelated nit: Section 2.1 says "To suppress all possible
responses: The maximum reserved response code for CoAP is 7.31". The
range 6.00 to 7.31 is reserved, but not for response codes. The
maximum response code is 5.31.

Klaus

[1] https://tools.ietf.org/html/draft-koster-core-coap-pubsub-04#section-9.3