Re: [dtn] Alexey Melnikov's No Objection on draft-ietf-dtn-tcpclv4-18: (with COMMENT)

Brian Sipos <BSipos@rkf-eng.com> Sun, 01 March 2020 18:48 UTC

Return-Path: <BSipos@rkf-eng.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 157093A0B52; Sun, 1 Mar 2020 10:48:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rkfeng.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id syhxjjO9_iOI; Sun, 1 Mar 2020 10:48:00 -0800 (PST)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2061.outbound.protection.outlook.com [40.107.244.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3735A3A0B53; Sun, 1 Mar 2020 10:48:00 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WKoNVA0pYKusP3bkZ+q68hz0qoqe0tKaXj2KmNAGMpPqBhpE/v0fnKDV7iMxYd0XCZcjrMtJNPvfJubKZQiTVMfhxUQXhRE8SffOaeHZpAzU2GfW/rSusLGvudOck4XYnShsKixSyL3vpMFYWGPAPgm9U9LGrKO+wrczwyYCc7EM9rbbxYWFD4SLURJ12DiyOoWHUbF0rHDZmSOsq0X2qa1Vbyk49uQ7p9RlSgPZCa+Q4s++m1F2T1N7ZANfYus25JvBicoDr2mDhz6C99XnjFFIpfRYfgBotMdNBBG5eup+iPiFB6KAYDsMGA9OYrdf5JcXaHgHiExUsoMxdCvrYw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;bh=mncHooGu9NZYl9ffikSE1F7UjxpHC2YqqPZS1dcGgRw=; b=U48GZUPCzu+s9KZ+rna1zIZyWlG5ZUly2/pCM6+meTQ+eQ2Rx8UUq3bS+K8rO9/tPP9xZxwx5yBmDafbS52QywWn0EYxJpHvyjTJdviImC4xfas0Q5AsZ0qz2QrXt8WWZDthsM+5sGRXTloKGhGoW1rbK0vxokfNUFRvaxIBKms7Znt7xX4jIvAs+xT/PR8+JoIjI1P4Ps9NfVz5h4DKXYgykqTHtmtb5eWnTdzDmWyeufnliTOP4S+NDhw+TEZqERHBXu8nvG+HBNvM7BtPRWJiJz77CynLSTygYUBLq1YOSBCy4lLI60YHwBUP2kcztTiKKEflbq4mjde5iejHBg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=rkf-eng.com; dmarc=pass action=none header.from=rkf-eng.com; dkim=pass header.d=rkf-eng.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rkfeng.onmicrosoft.com; s=selector2-rkfeng-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;bh=mncHooGu9NZYl9ffikSE1F7UjxpHC2YqqPZS1dcGgRw=; b=qM/m2HFFAiKzl/vuBkvmDQvYjZs6rP9qc3GSXAwVtyYO1IwQQnFUyFrVEkWHztL94qCMy8bYkqobJCL6C4pYWHJ4vojk1yYWLsb0+CKGMvA1/ArtrEOQ/hg8Ah5P+l5I80VLaBvdv9V8e8tZ5/0OYr7UbdRF0UbOKJSfUqCIwDY=
Received: from MN2PR13MB3520.namprd13.prod.outlook.com (2603:10b6:208:16c::29) by MN2PR13MB3359.namprd13.prod.outlook.com (2603:10b6:208:16c::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2793.5; Sun, 1 Mar 2020 18:47:57 +0000
Received: from MN2PR13MB3520.namprd13.prod.outlook.com ([fe80::69eb:6eb6:b373:f292]) by MN2PR13MB3520.namprd13.prod.outlook.com ([fe80::69eb:6eb6:b373:f292%2]) with mapi id 15.20.2793.011; Sun, 1 Mar 2020 18:47:57 +0000
From: Brian Sipos <BSipos@rkf-eng.com>
To: "aamelnikov@fastmail.fm" <aamelnikov@fastmail.fm>, "iesg@ietf.org" <iesg@ietf.org>
CC: "dtn-chairs@ietf.org" <dtn-chairs@ietf.org>, "draft-ietf-dtn-tcpclv4@ietf.org" <draft-ietf-dtn-tcpclv4@ietf.org>, "dtn@ietf.org" <dtn@ietf.org>, "edward.birrane@jhuapl.edu" <edward.birrane@jhuapl.edu>
Thread-Topic: Alexey Melnikov's No Objection on draft-ietf-dtn-tcpclv4-18: (with COMMENT)
Thread-Index: AQHV5zpibtYw1DLEYUqLdE2A1D7GQ6g0JWAA
Date: Sun, 01 Mar 2020 18:47:56 +0000
Message-ID: <fb9d272690f62f250fb8dada325c109f63e9e98a.camel@rkf-eng.com>
References: <158212659797.17775.13591249415088938667.idtracker@ietfa.amsl.com>
In-Reply-To: <158212659797.17775.13591249415088938667.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Evolution 3.32.5 (3.32.5-1.fc30)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=BSipos@rkf-eng.com;
x-originating-ip: [108.18.140.127]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c0cd9c87-713d-4934-89b5-08d7be110ef4
x-ms-traffictypediagnostic: MN2PR13MB3359:
x-microsoft-antispam-prvs: <MN2PR13MB3359DF0592CADE2A23EA29589FE60@MN2PR13MB3359.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6430;
x-forefront-prvs: 0329B15C8A
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(376002)(346002)(396003)(366004)(39830400003)(199004)(189003)(6506007)(2616005)(6512007)(86362001)(76116006)(6486002)(66556008)(66446008)(66946007)(64756008)(71200400001)(186003)(2906002)(66476007)(66616009)(81156014)(81166006)(316002)(54906003)(5660300002)(8676002)(26005)(4326008)(8936002)(508600001)(966005)(36756003)(110136005); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR13MB3359; H:MN2PR13MB3520.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: rkf-eng.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: qVVkCFKq4QRN7ooDFXbNVbp7LHUeCUb8B3r/v1uV+a/9tlR1RX6/hvCF2qhESY2+q6bmaMAkAiWXMZoOEVP3PGYjL6EbY2TQzgba0WnllIjuyijuKCUAEKvWmAJC56QyPhxbPwkmtFoRo91OJcrExg==
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; micalg="sha-256"; protocol="application/x-pkcs7-signature"; boundary="=-CtTag2uAgAAIrcfmdhbn"
MIME-Version: 1.0
X-OriginatorOrg: rkf-eng.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c0cd9c87-713d-4934-89b5-08d7be110ef4
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2020 18:47:56.8284 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4ed8b15b-911f-42bc-8524-d89148858535
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 0OMt9Km89tlq0pvgizZSjizhC0toqigLZdHMRIfllgSTFSc8SVf6n7gFH8FIgI6Z0mZf9jVp8vticjiwjjNcsw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR13MB3359
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/SBSGnsGbkTpoUhgjYumB-7-oDSg>
Subject: Re: [dtn] Alexey Melnikov's No Objection on draft-ietf-dtn-tcpclv4-18: (with COMMENT)
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Mar 2020 18:48:04 -0000

Alexey,
I'm including responses below with prefix "BS: "

On Wed, 2020-02-19 at 07:36 -0800, Alexey Melnikov via Datatracker wrote:
> Alexey Melnikov has entered the following ballot position for
> draft-ietf-dtn-tcpclv4-18: No Objection
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to 
> https://www.ietf.org/iesg/statement/discuss-criteria.html
> 
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-dtn-tcpclv4/
> 
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> Thank you for this well written document. It was a pleasure to read!
> 
> I agree with Suresh, text about TLS 1.2 compatibility looks dodgy.
> 
BS: As in the earlier reply to Suresh, I am clarifying that the ClientHello
message is the compatibility need and that TLS 1.3 will be the proper baseline
version (which is unchanged in ClientHello from 1.2).

> I also have some comments I would really like to see replies to:
> 
> The document never states byte order for 16/32/64 bit fields. As you are not
> using CBOR (or any other format), this can't be presumed to be known.
> 
BS: You are correct and this is an important overall requirement to be added to
Section 2.

> 4.7.  Session Parameter Negotiation
> 
>    Enable TLS:  Negotiation of the Enable TLS parameter is performed by
>       taking the logical AND of the two contact headers' CAN_TLS flags.
>       A local security policy is then applied to determine of the
>       negotiated value of Enable TLS is acceptable.  It can be a
>       reasonable security policy to both require or disallow the use of
>       TLS depending upon the desired network flows.  Because this state
>       is negotiated over an unsecured medium, there is a risk of a TLS
>       Stripping as described in Section 8.  If the Enable TLS state is
>       unacceptable, the node SHALL terminate the session with a reason
>       code of "Contact Failure".  Note that this contact failure reason
>       is different than a failure of TLS handshake or TLS authentication
>       after an agreed-upon and acceptable Enable TLS state.  If the
>       negotiated Enable TLS value is true and acceptable then TLS
>       negotiation feature (described in Section 4.4) begins immediately
>       following the contact header exchange.
> 
> While this text is not wrong, I think it is in a wrong section. The rest of
> Section 4.7 talks about SESS_INIT message, while the TLS flag was sent in
> Contact Header and was already negotiated by this point.
> 
BS: This was an error in earlier editing and this block will be moved up to
section "Contact Validation and Negotiation".

> 9.1.  Port Number
> 
>    Within the port registry of [IANA-PORTS], TCP port number 4556 has
>    been previously assigned as the default port for the TCP convergence
>    layer in [RFC7242].  This assignment is unchanged by TCPCL version 4,
>    but the assignment reference is updated to this specification.  Each
>    TCPCL entity identifies its TCPCL protocol version in its initial
>    contact (see Section 9.2), so there is no ambiguity about what
>    protocol is being used.  The related assignments for UDP and DCCP
>    port 4556 (both registered by [RFC7122]) are unchanged.
> 
>           +------------------------+----------------------------+
>           | Parameter              | Value                      |
>           +------------------------+----------------------------+
>           | Service Name:          | dtn-bundle                 |
>           |                        |                            |
>           | Transport Protocol(s): | TCP                        |
> 
> Is there another document that will define use over DCCP?
> 
BS: The DCCP use is loosely defined in RFC 7122 and not being touched by this
change. That is an IRTF assignment.

> 9.6.  XFER_REFUSE Reason Codes
> 9.7.  SESS_TERM Reason Codes
> 
> In both of these sections: I don't think the document say anywhere how
> recipients of unrecognized reason codes should handle them. I think the
> document should say that they must be treated as "Unknown".
> 
BS: This spec doesn't define any CL- or BP-level logic about how to deal with
most. I did add statements to clarify this and requirements for how a BP agent
should handle undecodable reason codes.