Re: [dtn] I-D Action: draft-ietf-dtn-tcpclv4-09.txt

"R. Atkinson" <rja.lists@gmail.com> Tue, 21 August 2018 17:36 UTC

Return-Path: <rja.lists@gmail.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA056130E4F for <dtn@ietfa.amsl.com>; Tue, 21 Aug 2018 10:36:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uq0dkcnAotva for <dtn@ietfa.amsl.com>; Tue, 21 Aug 2018 10:36:51 -0700 (PDT)
Received: from mail-qt0-x235.google.com (mail-qt0-x235.google.com [IPv6:2607:f8b0:400d:c0d::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 38BF6130DF0 for <dtn@ietf.org>; Tue, 21 Aug 2018 10:36:51 -0700 (PDT)
Received: by mail-qt0-x235.google.com with SMTP id r21-v6so21161064qtm.2 for <dtn@ietf.org>; Tue, 21 Aug 2018 10:36:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:content-transfer-encoding:mime-version:subject:date:references :to:in-reply-to:message-id; bh=G5gXj8w9z1iX9O47kQoGBEv3xrYFMOVybJOR4lkwjUU=; b=dzit25JGgo9tzMZyOD0zcSr0bX7pgHDR7axLMpzmgWcZ/Z69o6wvB0nAssoxt3xTPh iLWks+smD4xrfhNzCp9nh0N4xoqLctsqPoDizEKB0+1CSh+qmKznGwkkXIa7M0NdeHBh pnrbCFFIFWOVYwGTkf5CpKEz8Amq4Xe5JoPd3WLiq1M3jhNxFKArsDaVwfDJHN3zdcOf iTlBkmzgP04nfsS1ZLdrY+aIV/jGDk+XGHd0BAHIC/8CQDbDijbH62XTmCO2c7mHmv8i fPCG5he68yerlpiE2LvepXeVwlI1xx7dE78Ekw8xgF23yRE/8Lz88hCkBREUh90IcTzH Rz9A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:content-transfer-encoding:mime-version :subject:date:references:to:in-reply-to:message-id; bh=G5gXj8w9z1iX9O47kQoGBEv3xrYFMOVybJOR4lkwjUU=; b=E/uFr34cXcACbzsWCe5ETP58SHVpS2T6A+KDE3qSuVFCFnIrYg1/3CcdbiWMNNyoXu 0qG1L/EtWCiRYh8+Jr/ePILCysFmVhAWYLxos2d4QnryzpkcIZNHFpvfRTajwvAcTaqg Tben+AXEgurfCOqmdem1nZrNzhbD7ZGDXsFxEKdic2u1lVL+tiMK6lUj/NzBPY4YCBn+ OVoUMiDyWipTNUFgtHIrBfOkjqRosRz+6LexojUhV9hgDUJ9BUehLEU5vpG+rmXTZwsI 4uC3MhnVgjPcTadTHDvAY3AWq+EmyIsAWqP624hNjWGvj0ZZos6sxAqGZnMI76BZ7hge joDA==
X-Gm-Message-State: APzg51AN8BHG5bQgfz3vwR3fIzSoYg47RY6ZF4iDrZPXCmbazzyFYF39 rMJascD3aXUUwLGWNn6Ax/Gzhc19
X-Google-Smtp-Source: ANB0Vda4AmsIy06090p8DXjx3q0i1mjJrYgwCit5th4A3lO4VZEto8jEvDW91KElS9Pty5jV672X9w==
X-Received: by 2002:ac8:76c4:: with SMTP id q4-v6mr15527777qtr.95.1534873010082; Tue, 21 Aug 2018 10:36:50 -0700 (PDT)
Received: from [10.30.20.18] (pool-108-18-149-37.washdc.fios.verizon.net. [108.18.149.37]) by smtp.gmail.com with ESMTPSA id c184-v6sm6964034qkd.43.2018.08.21.10.36.49 for <dtn@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 21 Aug 2018 10:36:49 -0700 (PDT)
From: "R. Atkinson" <rja.lists@gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Tue, 21 Aug 2018 13:36:48 -0400
References: <152987559341.21620.2355609223308009940@ietfa.amsl.com> <21a3a812-a874-245f-18de-b19ba02e28db@netlab.tkk.fi>
To: dtn@ietf.org
In-Reply-To: <21a3a812-a874-245f-18de-b19ba02e28db@netlab.tkk.fi>
Message-Id: <3FA80717-95E4-4086-906A-A786716E6FD3@gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/jshPQIohDUuXAPNlyQSjjm0TvUI>
Subject: Re: [dtn] I-D Action: draft-ietf-dtn-tcpclv4-09.txt
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Aug 2018 17:36:53 -0000

My comments below are all non-blocking from a process perspective.

That noted, there do seem to be practical issues that should be 
addressed before this document goes to RFC.  

> On Aug 13, 2018, at 16:36, Joerg Ott <jo@netlab.tkk.fi> wrote:
> 
> 1. Section 4.3 seems to suggest on p21 (a node may adapt its operation
>   to an older version of the protocol) the two endpoints might choose
>   using different protocols versions, which is surely problematic.
>   The outcome of this negotiation must be unambiguous.

This seems like a significant interoperability problem that
ought to be resolved prior to publication as an RFC.

> 2. Section 4.4 discusses TLS but this isn't enough.  TLS has lots of
>   parameters, TLS clients may and servers must have certificates.
>   All this interaction needs to be spelled out.  What about the APN
>   to be used for TLS connection setup.  And, of course, we should use
>   TLS 1.3.

Q: Might a compromise be to spell out at least one deployable “profile”
     of TLS for use with this specification, while not precluding folks using
     some other set of TLS parameters if they choose ??

Concur about TLS 1.3.  In fact, I doubt very much the Security Area will
approve any TLS version less than 1.3 — given known/published issues
with previous versions of TLS.

> 4. Section 5.1.1 Keep alive has lost its function.  According to the
>   current text, a keep-alive should be transmitted when the timer
>   expires.  Fine, but this too late because the other entity will
>   time out the connection.  The earlier guidance was that the session
>   timeout occurs if no data was received for _twice_ the keep alive
>   interval.  But this part seems to have gone.  The text would need
>   to be explicit about when to schedule sending keep-alive messages
>   and when to time out.

This sounds like a serious interoperability issue that ought to be resolved
prior to publication.

> 6. Echoing the SESS_TERM message as an ACK is a good idea.  Should
>   we include a nonce here to make sure that an ACK is different from
>   an independently issued SESS_TERM?

I concur that a nonce would be good to add here.

> 7. Session termination in section 6.1 got more complicated.  The text
>   now alllows sending even more segments, whereas the v3 spec
>   essentially said that no data must follow afterwards.  If I receive
>   a SESS_TERM, I should be sure that I can release data processing
>   resources.

This also seems like a problem worth fixing.

> 8. Why not always have the reason code and define one to be unpsecified
>   in SESS_TERM rather than having two-stage processing?

No opinion about the specific issue.  In general, it ought to simplify implementation
and improve interoperability to always have a reason code.  

I would not want to use anything that isn’t specified in an applicable IANA
Registry, but I might specify one in that Registry that means “some other reason”.

Yours,

Ran