Re: [dtn] Mirja Kühlewind's Discuss on draft-ietf-dtn-tcpclv4-18: (with DISCUSS and COMMENT)

Brian Sipos <BSipos@rkf-eng.com> Tue, 02 June 2020 18:31 UTC

Return-Path: <BSipos@rkf-eng.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B682A3A0F54; Tue, 2 Jun 2020 11:31:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rkfeng.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EppGfG03bfWl; Tue, 2 Jun 2020 11:31:17 -0700 (PDT)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2068.outbound.protection.outlook.com [40.107.244.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3CA073A0EE1; Tue, 2 Jun 2020 11:31:15 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Z1i+jHWpKPxJQ2XIOpzgqq4kUV0cNc9Qolr9K9l7mM4yc6ERtniQbG47uEzVW7ID08jLnjJSDsJfxNIlc+mpOenwYB6zqRvOSef9wxpmVxKFDYUXTMQyPmA1niW2uLv1kPHEkEn1f65ggm5rPzP1BxQVsLyfmlL16lvDhY/AIoeum7yBxBrzhv8YhV2Q3TNVWYPpTKPgtU9YmrOdErV/QMuIrpBhHIWYlsh4BTj2fGeSd3JELUAPXPX6u/hCYzhYq7qZ2pY7O6b0iqTIFGSnL4go36NbWCGRvODh/ISKhxdNxYot4oYSiWHkxJkPfL6m6zsSsOmmdtA0Nk96Untb4A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QZYuAHnn46UCGFU9quTy7pqFxgLWWdR9nQWBSD1LPUo=; b=blRYQkbmEi+clTj7mVl7pqj19F6O8ZTzA7QFPK3ESseHPXyqYPfh5M4BmTvRVf45ZXG5gTymm4HEDjIBP7i3MLv2dvDbaQtUApE+Xs4PHHHe2QnaO4S3JjXTOhjyewBxtXkCoFRqJbydDbT/sqfv6POtXA9trj/VQpsPYYC59qUShqhViO+hvTJBsx2kXDtRBXN7yb6XME9UkyrTkxvnaKPZwJQSxQoliaQz8vqsAGzC+3wU/ifH4eSPe+hgTfnwp5yMVPyh+XON6/a37qrhlP4AE5UR5GKN14Gi4oJEEz+iSbubat2jT6S1L6ce6DOfkXvrjP48dh6gpEoScf+c+w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=rkf-eng.com; dmarc=pass action=none header.from=rkf-eng.com; dkim=pass header.d=rkf-eng.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rkfeng.onmicrosoft.com; s=selector2-rkfeng-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QZYuAHnn46UCGFU9quTy7pqFxgLWWdR9nQWBSD1LPUo=; b=FkJu6nRHZdBKl9jRH80vVIMc3nRHc0dGlLghlQZ0C50BBEPr99nTzYAIVi3D2nWjeDcY4cIdgg0sRkShM8U3EtnVIICvdobtG23TKGH2ldBaHnvb6mRCXdajPUJ403RUOfsofeuDESOiv2S6tmahSphaet1PuxHxj09u679beh0=
Received: from CH2PR13MB3575.namprd13.prod.outlook.com (2603:10b6:610:2d::17) by CH2PR13MB3559.namprd13.prod.outlook.com (2603:10b6:610:2e::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.12; Tue, 2 Jun 2020 18:31:12 +0000
Received: from CH2PR13MB3575.namprd13.prod.outlook.com ([fe80::3cda:a9db:55b4:a70]) by CH2PR13MB3575.namprd13.prod.outlook.com ([fe80::3cda:a9db:55b4:a70%7]) with mapi id 15.20.3066.016; Tue, 2 Jun 2020 18:31:12 +0000
From: Brian Sipos <BSipos@rkf-eng.com>
To: Magnus Westerlund <magnus.westerlund@ericsson.com>, "ietf@kuehlewind.net" <ietf@kuehlewind.net>, "iesg@ietf.org" <iesg@ietf.org>
CC: "draft-ietf-dtn-tcpclv4@ietf.org" <draft-ietf-dtn-tcpclv4@ietf.org>, "dtn-chairs@ietf.org" <dtn-chairs@ietf.org>, "dtn@ietf.org" <dtn@ietf.org>, "edward.birrane@jhuapl.edu" <edward.birrane@jhuapl.edu>
Thread-Topic: [dtn] Mirja Kühlewind's Discuss on draft-ietf-dtn-tcpclv4-18: (with DISCUSS and COMMENT)
Thread-Index: AQHV5+6SE1B4R5Lbik+DBe4NsuRTvqg90i2AgH6wi4CACFtCgA==
Date: Tue, 02 Jun 2020 18:31:12 +0000
Message-ID: <5f1189de85d83aa3bc651e4f295c344a09e9928a.camel@rkf-eng.com>
References: <158220398711.12456.13531582672796496258.idtracker@ietfa.amsl.com> <745bfd811b9d3fb03f3e280b15fe9feb41241ba8.camel@rkf-eng.com> <HE1PR0702MB37721BC4C889B6AF96793B8395B10@HE1PR0702MB3772.eurprd07.prod.outlook.com>
In-Reply-To: <HE1PR0702MB37721BC4C889B6AF96793B8395B10@HE1PR0702MB3772.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Evolution 3.32.5 (3.32.5-1.fc30)
authentication-results: ericsson.com; dkim=none (message not signed) header.d=none;ericsson.com; dmarc=none action=none header.from=rkf-eng.com;
x-originating-ip: [108.18.140.127]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: acc6f8f2-162b-4c5e-b671-08d807232094
x-ms-traffictypediagnostic: CH2PR13MB3559:
x-microsoft-antispam-prvs: <CH2PR13MB3559D86C3EB975F3706F4A729F8B0@CH2PR13MB3559.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0422860ED4
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: rIpEGj+JPbfogZWvuhfJ4Vq19AtRH7GOuVDYlnudwtqjcn9NmuowMb2f0W1gxAP2gsSldJf7N9k081Fbtro6fGA2zxaw/mJQD5eosPcv9xxG/XaamzRk1Csrkg9cPM1hSQ7RBaghBwFW4VRcm8DpaFnevBjs6L4zH7j8GW6K7WRaaeXR92ovNZ9p1BCF9C4uDhlw1OeNxvMU+7etG7FAACTbomrEn/9g+9REd+vWlmQHrTidf2iTDMarU6q60yKim+fMMAmfv7wg/liJLs4uo8mqfPjAsrJgOvXeUkasOoUjFObPJqUQBU8fFfHhlobrfDrUCytwqgSqBMeRDrsUv7HWn6RjzV3kzxabuLpbeBfF722R2c7/uVN+i3MpssORzN+YGQlH9/s7PN65OQPw0xtx4omRrzscuMvDqAFmzg63mhnu8BOB9iRTPSBwDkmz
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR13MB3575.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(39840400004)(396003)(136003)(366004)(376002)(346002)(36756003)(508600001)(224303003)(26005)(6512007)(2906002)(6486002)(86362001)(83380400001)(2616005)(6506007)(64756008)(66556008)(8936002)(66946007)(66476007)(66446008)(30864003)(21615005)(966005)(5660300002)(186003)(19627405001)(4326008)(166002)(110136005)(66574014)(76116006)(71200400001)(316002)(54906003)(579004)(559001)(569008); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_5f1189de85d83aa3bc651e4f295c344a09e9928acamelrkfengcom_"
MIME-Version: 1.0
X-OriginatorOrg: rkf-eng.com
X-MS-Exchange-CrossTenant-Network-Message-Id: acc6f8f2-162b-4c5e-b671-08d807232094
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Jun 2020 18:31:12.2443 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4ed8b15b-911f-42bc-8524-d89148858535
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ZOgOmWbvto3Jju4mV4XoHgZSQR+O6FZU92ReyQRRER48U+Wj4rmFODzmwaMYZvIskdFRJs5jQqoLYDpa//9vIA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR13MB3559
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/r0wFDT9z_4SrYh_r4GcioWLhmIA>
Subject: Re: [dtn] Mirja Kühlewind's Discuss on draft-ietf-dtn-tcpclv4-18: (with DISCUSS and COMMENT)
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jun 2020 18:31:32 -0000

Thank you for the further feedback. My responses are below inline with prefix "BS:" I didn't respond to any last comments that you agreed with.
The two changes I have pending for a -21 draft revision. If there is no further feedback, then this can go out quickly.

On Wed, 2020-05-27 at 13:18 +0000, Magnus Westerlund wrote:
> Hi Brian and WG,
>
>
> I have looked into Mirja's discuss and comments to see if I can remove my
> discuss. Please see inline. We are not quite done and do need a  little bit of
> discussion, especially on the first part of the discuss and CL interaction
> with BP agent and how CL retry and reestablishment should work.
>
>
>
>
>
>
>
> On Sat, 2020-03-07 at 22:37 +0000, Brian Sipos wrote:
>
> > > Mirja,
> >
> > > I'm including responses below with prefix "BS: "
> >
> > >
> >
> > > On Thu, 2020-02-20 at 05:06 -0800, Mirja Kühlewind via Datatracker wrote:
> >
> > > > > Mirja Kühlewind has entered the following ballot position for
> > >
> > > > > draft-ietf-dtn-tcpclv4-18: Discuss
> > >
> > > > >
> > >
> > > > > When responding, please keep the subject line intact and reply to all
> > >
> > > > > email addresses included in the To and CC lines. (Feel free to cut
> > > this
> > >
> > > > > introductory paragraph, however.)
> > >
> > > > >
> > >
> > > > >
> > >
> > > > > Please refer to
> > >
> > > > > https://www.ietf.org/iesg/statement/discuss-criteria.html
> > >
> > > > >
> > >
> > > > > for more information about IESG DISCUSS and COMMENT positions.
> > >
> > > > >
> > >
> > > > >
> > >
> > > > > The document, along with other ballot positions, can be found here:
> > >
> > > > > https://datatracker.ietf.org/doc/draft-ietf-dtn-tcpclv4/
> > >
> > > > >
> > >
> > > > >
> > >
> > > > >
> > >
> > > > >
> > >
> > > > > ----------------------------------------------------------------------
> > >
> > > > > DISCUSS:
> > >
> > > > > ----------------------------------------------------------------------
> > >
> > > > >
> > >
> > > > > Thanks for this well-written document. I have a couple of thing in the
> > > > > comment
> > >
> > > > > section below that should be clarified. But there is one point which
> > > does
> > > > > not
> > >
> > > > > seem correct to me and therefore I'm raising it at thee discuss level:
> > >
> > > > >
> > >
> > > > > Sec 5.1.1:
> > >
> > > > > "Both sides SHALL send a KEEPALIVE message whenever the negotiated
> > > interval
> > >
> > > > >    has elapsed with no transmission of any message (KEEPALIVE or
> > > other).
> > >
> > > > >
> > >
> > > > >    If no message (KEEPALIVE or other) has been received in a session
> > >
> > > > >    after some implementation-defined time duration, then the node
> > > SHALL
> > >
> > > > >    terminate the session by transmitting a SESS_TERM message (as
> > >
> > > > >    described in Section 6.1) with reason code "Idle Timeout". "
> > >
> > > > >
> > >
> > > > > It is not necessary that both endpoints send keepalives when TCP is
> > > used
> > >
> > > > > underneath as data is transmitted reliably. If one end sends
> > > keepalives and
> > >
> > > > > transmission fails it will close the TCP connection no matter what.
> > > > > Therefore
> > >
> > > > > the case where no keepalive is received, can only happen if no
> > > keepalive was
> > >
> > > > > send by the application, however, if the own keepalives are send
> > > > > successfully
> > >
> > > > > it is also received and the TCP connection is alive. If this is only
> > > to test
> > >
> > > > > liveness of the TCP connection, why don't you use TCP keepalives
> > > instead?
> > >
> > > > >
> > >
> > > > > Further what happens when a keepalive fails? Should one endpoint try
> > > to
> > >
> > > > > reconnect, immediately or later when new data is available?
> > >
> > > > >
> >
> > >
> >
> > > BS: You are correct that it is not strictly necessary that both sides
> > transmit
> >
> > > KEEPALIVE messages to keep the TCP connection alive. The current KEEPALIVE
> >
> > > behavior is inherited from TCPCLv3 and has not had any (positive or
> > negative)
> >
> > > discussion in the WG so it was just kept as-is.
> >
> > > It's not explicitly stated, but there are no restrictions on when to re-
> >
> > > establish a session to an entity which has lost a session due to Idle
> > Timeout.
> >
> > > Depending on local BP agent policy a preemptive session may be reinstated
> > or
> > > the
> >
> > > agent may wait until a transfer is needed.
>
>
>
> From my perspective I think there are no issue with Section 5.1. The KEEPALIVE
> messages do make sense and avoid the need for having complex interactions with
> the TCP stack to figure out if ones sent data actually was acknowledged or
> not.
>
>
>
> Just to verify the point about reestablishment. To my understanding is that if
> a TCPCLV4 entity do not receive a KEEPALIVE message from the peer it will
> trigger an IDLE timeout. Which will trigger the sending of a SESS_TERM
> message. It will also result in a change of the TCPCL session status to the
> higher layer indicating "ending". Thus, the higher layer can know that its
> link is closing down and can thus do what is appropriate in relation to the
> communication. Does this understanding match the intention?
>
>
>
> What isn't clear to me is if there needs to be recommendation to those higher
> layers for how to handle TCPCL connection terminations and failures. The
> different convergence layer has quite different properties depending of what
> they are. A deep space link that is dependent on when a transmitter can have a
> LOS to the receiver and thus knows it is not worth attempting to establish the
> CL until then is quite different from a TCP CL that given that one have
> bundles to transmit should attempt, and if failing retry after suitable times.
> There is also the issue that some entities may not be capable of receiving any
> bundle unless it contacts out, and in that case that node needs to establish a
> TCPCL connection simply to receive bundles.
>
>
>
> Some discussion of the above issue appears motivated to determine if there
> should be some more discussion of what reestablishment behavior TCPCL should
> have and provide guidance to the higher layer that uses the TCPCL.
>
BS: You are correct that each CL has it's own notion of connectivity and session state. Your interpretation of the idle session termination also looks correct.
Unfortunately, I have less perspective of how the BP Agent implementations to-date may require or expect CL interfaces to behave at an API level. My expectation of TCPCL use falls into two extreme use cases, which agree with your understanding:
1) A permanent physical link with reliable flows between nodes, which is expected to have steady load of transfers occupying the link. In this case the TCPCL would establish a session and keep it up as long as possible. The goal here is total throughput and not wasting any link throughput on TCP handshaking, TLS establishment, etc.
2) An ephemeral link between nodes which may not even have reliable long-term connectivity. In this case the TCPCL only attempts a session when both connectivity is expected and when a bundle transfer is queued (to send) or some polling interval is reached (to receive).

These types of session keeping explanations could be added to the spec, similar to the existing "Transfer Segmentation Policies" examples. Maybe a section "Session Keeping Policies"?

>
>
> > >
> >
> > > > > And one more small thing:
> > >
> > > > > sec 6.1:
> > >
> > > > > "However, an entity MUST always send
> > >
> > > > >    the contact header to its peer before sending a SESS_TERM message."
> > >
> > > > > This normative requirement seems contradicting the way version
> > > failures are
> > >
> > > > > handled earlier on in the doc.
> > >
> > > > >
> >
> > >
> >
> > > BS: The contact header is always the first thing sent from either side of
> > a
> > > new
> >
> > > TCP connection intended to establish a TCPCL session. A passive entity can
> >
> > > choose to close the TCP connection rather than sending a contact header if
> > > some
> >
> > > security policy dictates that, but an entity cannot send anything before a
> >
> > > contact header.
> >
> > > The graceful way to refuse a connection at the start is to send a contact
> > > header
> >
> > > (with some desired version number, but it really doesn't matter) and then
> > > either
> >
> > > close the TCP connection or send a SESS_TERM. This is described in section
> > 4.3
> >
> > > "Contact Validation and Negotiation". I don't see the discrepancy between
> > > these
> >
> > > sections.
> >
> > >
>
>
>
> On Section 6.1:
>    A session termination MAY occur immediately after transmission of a
>    Contact Header (and prior to any further message transmit).  This
>    can, for example, be used to notify that the entity is currently not
>    able or willing to communicate.  However, an entity MUST always send
>    the Contact Header to its peer before sending a SESS_TERM message.
>
> I do see Mirja's issue. The text is a bit contradictory and unclear on which
> session is referenced. So if the passive part receives a CONTACT header and
> then sends a SESS_TERM I interpret this as you consider a TCPCL session is
> crated through only Contact exchange. Secondly, as Mirja states it is
> allowable to terminate the TCP session per Section 4.1 prior to this.
>
>
>
> If the passive entity does not receive a Contact Header
>
>    after some implementation-defined time duration after TCP connection
>
>    is established, the entity SHALL close the TCP connection.
>
>
>
> Thus, maybe a clarification that context of the normative text statement is in
> relation to the TCPCL session. And note that TCP connection termination may
> occur prior to the CONTACT exchange.
>
>
>
> Maybe:
>
>
>
>  A TCPCL session termination MAY occur immediately after transmission of a
>
> ^^^^^
>
>    Contact Header (and prior to any further message transmit).  This
>
>    can, for example, be used to notify that the entity is currently not
>
>    able or willing to communicate.  However, an entity MUST always send
>
>    the Contact Header to its peer before sending a SESS_TERM message.
>
> Termination of the TCP connection can occur prior to receiving the Contact
>
> header as discussed in Section 4.1.
>
>
>
> Feedback on this?
>
>
BS: The key distinction here is between a "TCP connection being closed" vs. a "TCPCL session being terminated". TCPCL messaging isn't possible until after contact header exchange and contact negotiation "[PCH]" in Section 3.3, and TCPCL session isn't actually established until SESS_INIT exchange and parameter negotiation "[PSI]", so until that occurs there is not actually a TCPCL session to terminate.
I used your suggested text to update the text in Section 6.1 to refer back to Section 4.1.

>
>
>
>
>
> > > > >
> > >
> > > > > ----------------------------------------------------------------------
> > >
> > > > > COMMENT:
> > >
> > > > > ----------------------------------------------------------------------
> > >
> > > > >
> > >
> > > > > 1) Sec 4.1:
> > >
> > > > > "Therefore, the entity MUST retry the
> > >
> > > > >    connection setup no earlier than some delay time from the last
> > >
> > > > >    attempt."
> > >
> > > > > It would be good to provide a recommended value or at least a minimum
> > > value.
> > >
> > > > >
> >
> > >
> >
> > > BS: This would seem to be quite network dependent. I can see making a
> >
> > > recommendation for a minimum initial delay of 1 second, but that's quite
> >
> > > arbitrary.
>
>
>
> I think this is fine.
>
>
>
> > >
> >
> > > > > 2) Similar here in sec 4.1:
> > >
> > > > > " If the
> > >
> > > > >    passive entity does not receive a Contact Header after some
> > >
> > > > >    implementation-defined time duration after TCP connection is
> > >
> > > > >    established, the entity SHALL close the TCP connection."
> > >
> > > > > It would be good to provide some default value or at least some more
> > >
> > > > > discussion
> > >
> > > > > about ranges of values. In any case this value should be larger than X
> > > times
> > >
> > > > > the RTT as TCP segments can get lost any might need to be transmitted.
> > > I
> > > > > guess
> > >
> > > > > something in the order of second would be appropriate?
> > >
> > > > >
> >
> > >
> >
> > > BS: For an earlier comment I added a very wide bound for this:
> >
> > > Entities SHOULD choose a Contact Header reception timeout interval no
> >
> > > longer than 10 minutes (600 seconds).
>
>
>
> The only concern I have with 600 seconds is that it leaves the passive side
> open for resource attacks. If the server actually opens and creates states and
> hold on to it for 600 seconds before closing it. An bot-net attacker could
> potentially manage to create quite a lot of state. I would think that with the
> basic protection this has each IP address could use 63000 different source
> ports and simply leave state hanging. That is 63 million TCP connections for
> just 1000 nodes. Managing to generate 63000 TCP connections in 10 minutes is
> something a toaster most likely can manage, probably also a lot of smaller IoT
> devices.
>
>
>
> So maybe a shorter interval of 30 or 60 seconds and a resource exhaustion
> warning.
>
BS: I don't have strong feelings about recommended timeout durations, so 60 seconds seems fine.

>
>
> > >
> >
> > > > > 3) Sec 4.3:
> > >
> > > > > " To prevent a flood
> > >
> > > > >    of repeated connections from a misconfigured application, an entity
> > >
> > > > >    MAY elect to hold an invalid connection open and idle for some time
> > >
> > > > >    before ending it."
> > >
> > > > > Not sure why you need to hold it open...? All you need is to not
> > > accept but
> > >
> > > > > ignore new connections from that peer/IP address for some time. And
> > > more
> > >
> > > > > questions:
> > >
> > > > >   - When kept open and you suddenly received a valid message, should
> > > you
> > >
> > > > >   process it? - And when  you finally decide to close the connection,
> > > how do
> > >
> > > > >   you do that? TCP RST, or FIN? - Do you send (TCP) keepalives?
> > >
> > > > >
> >
> > >
> >
> > > BS: This requirement was a hold over from TCPCLv3 and I'm not exactly sure
> > the
> >
> > > rationale either. It does make sense to handle this as a firewall-type
> > rule to
> >
> > > disallow new connections from that peer. I don't know that this warrants a
> > > TCPCL requirement though, that seems more generic firewall activity.
>
>
> I think the new text is fine.
>
>
>
>
> > >
> >
> > > > > 4) Also 4.3:
> > >
> > > > > "   The first negotiation is on the TCPCL protocol version to
> > > use.  The
> > >
> > > > >    active entity always sends its Contact Header first and waits for a
> > >
> > > > >    response from the passive entity.  The active entity can repeatedly
> > >
> > > > >    attempt different protocol versions..."
> > >
> > > > > If you read on in this section it seems like the receiver always sends
> > > a
> > >
> > > > > SESS_TERM if the version is not compatible. So I assume you mean the
> > > active
> > >
> > > > > entity can open a TCP and try again. And I assume it should do it
> > > > > immediately
> > >
> > > > > after the SESS_TERM is received. I believe that's what the following
> > >
> > > > > paragraphs
> > >
> > > > > say but this part confused me a bit. So might be only an editorial
> > > issue.
> > >
> > > > > Please clarify! However, if there would be any attempt to send another
> > > CH on
> > >
> > > > > the same TCP connection, that could lead to ambiguity and would need
> > > to be
> > >
> > > > > further specified. Also more point, the text does not specify what the
> > >
> > > > > receiver's response to the CH is. The figure shows that it will also
> > > send a
> > >
> > > > > CH,
> > >
> > > > > however, that should also be spelled out in the text!
> > >
> > > > >
> >
> > >
> >
> > > BS: I edited this paragraph from an earlier comment and clarified that a
> > > contact
> >
> > > header send is one-for-one with a TCP connection. The Section 4.1 was also
> >
> > > updated to have specific sequencing SHALL statements.
> >
> > > Here is the new Section 4.3 text for reference:
> >
> > >
> >
> > > The first negotiation is on the TCPCL protocol version to use.
> >
> > > The active entity always sends its Contact Header first and waits for
> >
> > > a response from the passive entity.
> >
> > > During contact initiation, the active TCPCL node SHALL send the highest
> > TCPCL
> >
> > > protocol
> >
> > > version on a first session attempt for a TCPCL peer.
> >
> > > If the active entity receives a Contact Header with a lower
> >
> > > protocol version than the one sent earlier on the TCP connection,
> >
> > > the TCP connection SHALL be closed.
> >
> > > If the active entity receives a SESS_TERM message with reason of
> >
> > > "Version Mismatch", that node MAY attempt further TCPCL sessions with the
> >
> > > peer using earlier protocol version numbers in decreasing order.
> >
> > > Managing multi-TCPCL-session state such as this is an implementation
> > matter..
> >
> > >
> >
> > I think this is fine.
> >
> > > > > 5) sec 4.4.1:
> > >
> > > > > "When present, the SNI SHALL contain the same host name
> > >
> > > > >       used to establish the TCP connection."
> > >
> > > > > Not sure what this means... how do you use an host name in an TCP
> > > > > connection?
> > >
> > > > > Do you mean the same host name that has been used in name resolution
> > > to get
> > >
> > > > > the
> > >
> > > > > IP address that is used to establish the TCP connection? Or something
> > > else?
> > >
> > > > >
> >
> > >
> >
> > > BS: Yes, I've combined the two requirements here to read:
> >
> > >
> >
> > > When a resolved host name was used to establish the TCP connection, the
> > TLS
> >
> > > ClientHello SHOULD include a Server Name Indication (SNI) in accordance
> > with
> >
> > > [RFC6066] containing that host name (of the passive entity) which was
> > > resolved.
> >
> > >
> >
> > So if I understand the current text the active part could know that the
> > Node-ID-1 that it want to reach is at hostname1. It will include the
> > hostname1 in the SNI. The server certificate will then list the node-IDs
> > that are available to be served by TCPCLv4 on that hostname. So even if I
> > know the node-ID will not include that as SNI? And the security model here
> > is that the TCPCLv4 will identify those NODEIDs it is a representative of
> > and where it can forward the Bundles after CL depacketization.
> >
> > Isn’t actually a huge weakness here is that the CA is unlikely to know which
> > NodeIDs that are owned by a particular entity. For normal hierarchical DNS
> > names neither consumers would allow sub-domain names that are for another
> > domain. Thus, impersonation is hard. Here with NodeIDs the same checking is
> > difficult?
> >
> >
> >
> > > > > 6) sec 5.1.2:
> > >
> > > > > What is the entity receiving the MSG_REJECT supposed to do?
> > >
> > > > >
> >
> > >
> >
> > > BS: The intent of this message is for troubleshooting only. A likely use
> > of
> >
> > > MSG_REJECT is that the message type was unknown to the peer and the reject
> >
> > > sender has already closed the TCP connection.
> >
> > Ok. Clarification looks good.
> >
> >
> > > > > 7) sec 5.2.3: General question on the ACK mechanism: As you say
> > > correctly
> > > > > the
> > >
> > > > > fact that you don't get a notification is not a TCP protocol matter
> > > but only
> > >
> > > > > an
> > >
> > > > > interface matter. E.g. if taps would be used, this information would
> > > be
> > >
> > > > > available. Was it considered to make the ACK mechanism optional, e.g.
> > > by
> > > > > using
> > >
> > > > > a flag in the XFER_SEGMENT to request an ACK per segment? Also more
> > > > > questions:
> > >
> > > > >  - Why are the message flags reflected?
> > >
> > > > >  - Why is the Acknowledged length field needed if there needs to be
> > > one ACK
> > >
> > > > >  (send in order) for each segment anyway?
> > >
> > > > >
> >
> > >
> >
> > > BS: The use of XFER_ACK is supposed to indicate a stronger state than just
> > > "the
> >
> > > peer received these messages on the TCP stream. It's supposed to indicate
> > that
> >
> > > the segment of data has been fully processed, which includes indication to
> > the
> >
> > > BP agent (and potentially persistence in the agent for reactive
> > fragmentation
> >
> > > purposes).
> >
> > >
> >
> > > There was some discussion about negotiating the use of ACK or similar
> > > parameters
> >
> > > but the WG consensus was to keep the protocol with as few negotiated
> > behaviors
> >
> > > as possible. The Segment MRU parameter and associated XFER_SEGMENT data
> > size
> >
> > > determine how much data each XFER_ACK covers so that is in a way
> > negotiation
> > > of
> >
> > > "when to use XFER_ACK". As stated elsewhere in the document, it is
> > possible to
> >
> > > send an entire transfer in a single segment which is the least overhead
> > for
> >
> > > XFER_SEGMENT and the least number of XFER_ACK per transfer (exactly one).
> >
> > >
> >
> > > The repetition of the flags is not strictly necessary but is a holdover
> > from
> >
> > > TCPCLv3. The ACK length is also a holdover and is redundant as you
> > mention,
> > > but
> >
> > > it is helpful from a troubleshooting perspective.
> >
> > >
> >
> > I think the clarification of  “… fully processed”  improves this aspect.
> >
> >
> > > > > 8) sec 5.2.4: Can you maybe explain why the XFER_REFUSE is a
> > > message/feature
> > >
> > > > > of
> > >
> > > > > the CL and not the BP?
> > >
> > > > >
> >
> > >
> >
> > > BS: It's really just to allow interrupting a transfer at a lower layer
> > than
> > > the
> >
> > > BP agent for data handling issues like insufficient storage. It also
> > allows a
> >
> > > large bundle transfer to be interrupted if the receiver won't accept it
> > for
> >
> > > routing or other reasons after the bundle header is received and decoded
> > (but
> >
> > > the rest of the bundle payload is not yet received).
> >
> > >
> >
> > Ok.
> >
> >
> > > > > 9) sec 5.2.4:
> > >
> > > > > "If a sender receives a XFER_REFUSE message, the sender
> > >
> > > > >    MUST complete the transmission of any partially sent XFER_SEGMENT
> > >
> > > > >    message.  There is no way to interrupt an individual TCPCL message
> > >
> > > > >    partway through sending it."
> > >
> > > > > Not sure if use of normative language is appropriate here, because I
> > > believe
> > >
> > > > > what you mean is that as soon as the data/message is given to the TCP
> > >
> > > > > connection, you can't call it back. That's just a fact and nothing the
> > > > > sender
> > >
> > > > > may or can enforce. However, it could reset the TCP connection
> > > effectively
> > > > > but
> > >
> > > > > that probably not what is desired. Please clarify or remove normative
> > >
> > > > > language!
> > >
> > > > >
> >
> > >
> >
> > > BS: This text was a holdover from earlier TCPCLv3. I agree that this is
> > not
> >
> > > strictly a protocol requirement, but it is an important implementation
> > concern
> >
> > > that once the header portion of a message is sent the entire message needs
> > to
> >
> > > follow so that the receiver can properly decode the subsequent messages.
> >
> > > Would simply replacing the "MUST" with a "has to" be reasonable?
> >
> > >
> >
> > I have no issue with leaving the RFC2119 language in place.
> >
> >
> >
> > > > > 10) sec 5.2.5.1: Can you further explain what the use case ifs for the
> > >
> > > > > Transfer
> > >
> > > > > Length Extension? When do you expect the actual length to be
> > > different?
> > >
> > > > >
> >
> > >
> >
> > > BS: The purpose is not to provide redundant data but to indicate the total
> >
> > > length to the receiver at the start of transfer so that the receiver may
> >
> > > validate or pre-allocate storage for the transfer.
> >
> > > In a trivial implementation each transfer is a single segment and the
> > total
> >
> > > length is implied by the segment data length.
> >
> > > This was made into an optional extension because there are some uses of
> > TCPCL
> >
> > > which either use single-segment transfers or which don't need to pre-
> > allocate
> >
> > > storage.
> >
> > >
> >
> > Ok.
> >
> > > > > 11) sec 6.1:
> > >
> > > > > "   After sending a SESS_TERM message, an entity MAY continue a
> > > possible
> > >
> > > > >    in-progress transfer in either direction."
> > >
> > > > > Why is this necessary? Why can the entity not just send the SESS_TERM
> > > after
> > >
> > > > > the
> > >
> > > > > end of the transfer? Please clarify in the doc!
> > >
> > > > >
> >
> > >
> >
> > > BS: I'm adding text to Section 6 to clarify, but here is the paragraph:
> >
> > >
> >
> > > This section describes the procedures for terminating a TCPCL session.
> >
> > > The purpose of terminating a session is to allow transfers to complete
> >
> > > before the session is closed but not allow any new transfers to start.
> >
> > > A session state change is necessary for this to happen because transfers
> >
> > > can be in-progress in either direction (transfer stream) within a session.
> >
> > > Waiting for a transfer to complete in one direction does not control
> >
> > > or influence the possibility of a transfer in the other direction.
> >
> > > Either peer of a session can terminate an established session at any time.
> >
> > >
> >
> > I think this text looks ok.
> >
> >
> > > > > 12) 6.1:
> > >
> > > > > " When performing an unclean shutdown, a receiving node
> > >
> > > > >    SHOULD acknowledge all received data segments before closing the
> > > TCP
> > >
> > > > >    connection."
> > >
> > > > > What do you mean here? TCP acknowledgements? If so, this should not be
> > >
> > > > > normative as TCP will do that not matter what. However, you can not
> > > send any
> > >
> > > > > new application data/CL ACK after a TCP FIN was sent. Please clarify!
> > >
> > > > >
> >
> > >
> >
> > > BS: I clarified this to "... SHOULD acknowledge all received XFER_SEGMENTs
> > > with
> >
> > > an XFER_ACK ..." Does this make sense?
> >
> > >
> >
> > Yes, I think it works. I had to think a little bit about the roles here.
> >
> >
> > > > > 13) sec 6.1:
> > >
> > > > > "   If a session is to be terminated before a protocol message has
> > >
> > > > >    completed being sent, then the node MUST NOT transmit the SESS_TERM
> > >
> > > > >    message but still SHALL close the TCP connection. "
> > >
> > > > > Not sure how this case is supposed to happen. When give a message to
> > > your
> > > > > TCP
> > >
> > > > > stack it will send it. If sending fails on the TCP level, the
> > > connection
> > > > > will
> > >
> > > > > be closed automatically. Or do I misunderstand the intended scenario
> > > here?
> > >
> > > > >
> >
> > >
> >
> > > BS: This requirement really applies to a situation where an entity really
> > > really
> >
> > > needs to end a session promptly and doesn't have time to wait for an
> > earlier
> >
> > > message to complete and the SESS_TERM handshake to finish. Maybe the word
> >
> > > "terminated" here needs to be replaced by some other term? "closed"?
> >
> > Ok.
> >
> >
>
> --
> Cheers
>
>
>
> Magnus Westerlund
>
>
>
>
>
> ----------------------------------------------------------------------
>
> Networks, Ericsson Research
>
> ----------------------------------------------------------------------
>
> Ericsson AB                 | Phone  +46 10 7148287
>
> Torshamnsgatan 23           | Mobile +46 73 0949079
>
> SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com<mailto:magnus.westerlund@ericsson.com>
>
> ----------------------------------------------------------------------
>
>
>