Re: [core] CORECONF k parameter encoding

Koen Zandberg <koen.zandberg@inria.fr> Fri, 16 September 2022 12:54 UTC

Return-Path: <koen.zandberg@inria.fr>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A218C1524D1 for <core@ietfa.amsl.com>; Fri, 16 Sep 2022 05:54:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.409
X-Spam-Level:
X-Spam-Status: No, score=-4.409 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=inria.fr
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KExD75nHif1s for <core@ietfa.amsl.com>; Fri, 16 Sep 2022 05:54:19 -0700 (PDT)
Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E2198C180A90 for <core@ietf.org>; Fri, 16 Sep 2022 05:54:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=inria.fr; s=dc; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to; bh=aIzg2o8ysmTqACazSsFMcPA6NuAhKVdO+lv3TNecsfY=; b=f/AgyyzXqxDhlE353rhs/76Om4pV1iB5UecFN1PZR797hAjC3o+1jDHW P9KC8GsAz+rQRdIfZ7LKUvb7pFNUN7FcZIOus9eTtoTofU2D/ah71MNqc frPyivH/gFFF1DB8xLvu22tnjta6yEdZDzMEIyGnKbzVhNs19bZGAdkBk c=;
Authentication-Results: mail2-relais-roc.national.inria.fr; dkim=none (message not signed) header.i=none; spf=SoftFail smtp.mailfrom=koen.zandberg@inria.fr; dmarc=fail (p=none dis=none) d=inria.fr
X-IronPort-AV: E=Sophos;i="5.93,320,1654552800"; d="scan'208";a="53147529"
Received: from 185-227-75-229.dsl.cambrium.nl (HELO [10.1.7.20]) ([185.227.75.229]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Sep 2022 14:54:14 +0200
Message-ID: <386b29da-ef75-e550-3a62-b1a3a08fd3c0@inria.fr>
Date: Fri, 16 Sep 2022 14:53:57 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.13.0
Content-Language: en-US
To: Carsten Bormann <cabo@tzi.org>
Cc: core@ietf.org
References: <4e9673fa-f1cb-a36a-50d2-b2583f144164@inria.fr> <A18B1037-365A-4578-8558-5029899ED847@tzi.org>
From: Koen Zandberg <koen.zandberg@inria.fr>
In-Reply-To: <A18B1037-365A-4578-8558-5029899ED847@tzi.org>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------afM3WJfcpF0ivGSlcugaIAVo"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/cJm34zgYJ000teokINTB1jmhWlE>
Subject: Re: [core] CORECONF k parameter encoding
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Sep 2022 12:54:23 -0000

Hi Carsten,

On 15-09-2022 18:41, Carsten Bormann wrote:
> The irregularity of the table at Section 4.1 of draft-ietf-core-comi [1] was exactly what I tried to bring up in [2].
> I tried to find out reasons why it is so irregular and came up empty.
I see.
> I like your suggestion for resolving this (except that I would maybe encode an RFC 8742 CBOR sequence, saving a byte or 4/3 characters in the base64url encoding).

Fully agree with using RFC8742 as the number of items is implicit and 
can be derived from the length of the query string and some CBOR decoding.

As far as I can see, the main downside of my proposal is that it would 
increase the size of the query string in one of the common scenarios 
(key values being strings). Usually I'm in favor of decreasing the 
packet sizes at the cost of increasing processing on the device side, 
I'd be happy to accept a third alternative for encoding if anyone has a 
proposal. In this case though I prefer a base64 encoded CBOR sequence 
over the current draft proposal.

> It is late for this change, but possibly not too late.

That's great to hear.

Best regards,

Koen Zandberg