Re: [dtn] draft-ietf-dtn-tcpclv4-02 comments

Brian Sipos <BSipos@rkf-eng.com> Wed, 09 August 2017 13:33 UTC

Return-Path: <BSipos@rkf-eng.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCB37131D2F for <dtn@ietfa.amsl.com>; Wed, 9 Aug 2017 06:33:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.7
X-Spam-Level:
X-Spam-Status: No, score=-4.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rkfeng.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 78VQITw8f7JC for <dtn@ietfa.amsl.com>; Wed, 9 Aug 2017 06:33:44 -0700 (PDT)
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0057.outbound.protection.outlook.com [104.47.42.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 808311320B5 for <dtn@ietf.org>; Wed, 9 Aug 2017 06:33:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rkfeng.onmicrosoft.com; s=selector1-rkfeng-com0i; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=/f0oOfmkP9ol2Ki0rVuynUUMjNFxva+KJo7xcBNbjIM=; b=gasKc8kEl5j1YysN8nTMlLYSraFxBtvUn/S3QjWkSWug0CwZLfS4MyblVeRDbHeGIgK77fv9/CGt8MPyOOx7GE3DtK0jvoILbT080UMjVsZbMzK3SNAQqkToMh15tf8NL0xHqXI0B8TJU4c+ex/ZoHyxTARXYVr++Aojj/FTUZA=
Received: from BN6PR05MB3634.namprd05.prod.outlook.com (10.174.235.18) by BN6PR05MB3635.namprd05.prod.outlook.com (10.174.235.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1341.9; Wed, 9 Aug 2017 13:33:43 +0000
Received: from BN6PR05MB3634.namprd05.prod.outlook.com ([10.174.235.18]) by BN6PR05MB3634.namprd05.prod.outlook.com ([10.174.235.18]) with mapi id 15.01.1341.013; Wed, 9 Aug 2017 13:33:42 +0000
From: Brian Sipos <BSipos@rkf-eng.com>
To: Matt Wronkiewicz <wronkiew@gmail.com>
CC: "dtn@ietf.org" <dtn@ietf.org>
Thread-Topic: draft-ietf-dtn-tcpclv4-02 comments
Thread-Index: AQHS/5dzyMsPiqxEMU2y//mA1VnTiKJbG/GAgAK7TgCAHlAKjg==
Date: Wed, 09 Aug 2017 13:33:42 +0000
Message-ID: <BN6PR05MB36347CFD831534ED1A315CAF9F8B0@BN6PR05MB3634.namprd05.prod.outlook.com>
References: <CAGQjfBoyDo_Jw5o1dkRF59CBtuVX+QhGAU+tmVFH-CFVL254tw@mail.gmail.com> <1500468613.27258.19.camel@rkf-eng.com>, <CAGQjfBo4VvOhTvb5aGzg=af_M-K4zi6HhhQmVT92bBMFu_6z5g@mail.gmail.com>
In-Reply-To: <CAGQjfBo4VvOhTvb5aGzg=af_M-K4zi6HhhQmVT92bBMFu_6z5g@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=BSipos@rkf-eng.com;
x-originating-ip: [38.100.63.114]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BN6PR05MB3635; 6:hlrYugZLRIx1Oy3FWZ3RAPtaU786DBPViuA2dEOHUpvYQkW7Usd/OGw0hTwoodhlqLuoI9BQ6N858LFb84997ufYCO3rTKSdRCUVpeaUm2gFVQcQSDKXrHswuvOzdyzwJxJU92flGs1DG+whyDlbS7JKHaotaatkF46zbQezoHfKmRg5I6L1T7BcgKIQx9i1tQjnyUGe8QFFA6qEHa27NopjPwS7CvRh0NuApTwR6mpsv59Xb5ZkEUbDkSASqeQ4dMe0/mgyCdC5o0j20QPevfaLhei3w20SOoI9GbCiS/7Rc3dAlbCcq4Ukjcz7/6chJor+VxkgYnJU4xnFh3sRJQ==; 5:EqGl5tMWFQxE2HohnvVU6rzuyoAYCMBKeGWyNx7vVpAYF041Pz1USYjo1NSmiCnEWm/xhx4+0hM/d4fCJM17oTpnwYhAHhXFy6CAflWYe7O+javXSJFQ9YqA3Kj1qf9VnQrRXsZFt5D7GdlwC5cfaA==; 24:+CoivPROfs9l4ccd+XMzL+dc2L0/SgkRMZs5+zW+hAc/pgwhgcUwPExezKlQ/0SSWVXDEM92CXgDI1ztyVm6vbp+Jv3OhuCl4whd0u7heX0=; 7:f/u3/WyhQXX+TahFkX4FHR4DtkjOq5E2Yx/FnSIRPv67Abju28aHfJgDYW0ebQvZ3bsNEJmMoG44wGWsCw/f2OI8ILFw53at2KfpqPR0Lf5KfyB59C7R98r29gf7XeE1RbRA8RYJ34QPU8gGUgKFPBmPxEpBZyvmiBSU9zavF/lFzDN9kO+1YrVOzZGbtaw4xXoj7gdC4oswGkBxk+RjpKmc+tgFOxdJHiCK7HxKCQ8=
x-ms-office365-filtering-correlation-id: 97ded52f-d950-43dd-48db-08d4df2b40c5
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BN6PR05MB3635;
x-ms-traffictypediagnostic: BN6PR05MB3635:
x-exchange-antispam-report-test: UriScan:(158342451672863);
x-microsoft-antispam-prvs: <BN6PR05MB363540E9D99EC0F965A212619F8B0@BN6PR05MB3635.namprd05.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(100000703101)(100105400095)(6041248)(20161123562025)(20161123564025)(20161123555025)(20161123560025)(20161123558100)(201703131423075)(201703061421075)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BN6PR05MB3635; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BN6PR05MB3635;
x-forefront-prvs: 0394259C80
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39450400003)(39400400002)(199003)(377424004)(24454002)(377454003)(189002)(106356001)(3846002)(33656002)(508600001)(6116002)(101416001)(102836003)(230783001)(236005)(6436002)(4326008)(25786009)(229853002)(2950100002)(76176999)(74316002)(6916009)(105586002)(38730400002)(39060400002)(50986999)(54896002)(7696004)(9686003)(6246003)(6306002)(5660300001)(68736007)(99286003)(110136004)(55016002)(54356999)(189998001)(86362001)(53936002)(81156014)(2906002)(66066001)(1411001)(8676002)(8936002)(345774005)(606006)(53546010)(14454004)(3660700001)(2900100001)(72206003)(80792005)(81166006)(7736002)(6506006)(3280700002)(77096006)(97736004); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR05MB3635; H:BN6PR05MB3634.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: rkf-eng.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BN6PR05MB36347CFD831534ED1A315CAF9F8B0BN6PR05MB3634namp_"
MIME-Version: 1.0
X-OriginatorOrg: rkf-eng.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Aug 2017 13:33:42.8403 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4ed8b15b-911f-42bc-8524-d89148858535
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR05MB3635
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/v1akT9ACy2yANzykFAk3IwM2zoQ>
Subject: Re: [dtn] draft-ietf-dtn-tcpclv4-02 comments
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Aug 2017 13:33:48 -0000

Matt,

I plan on adding some concrete requirements regarding protocol version negotation, e.g. "A connecting TCPCL endpoint shall always provide the highest TCPCL protocol version on a first session attempt for a listing peer. If a connecting endpoint receives a Version Mismatch shutdown reason, that endpoint may attempt further TCPCL sessions for earlier protocol version numbers in decreasing order."


Do you think this would be sufficient to cover these kinds of situations. Currently, the protocol does not define a unit of connectivity larger than a single session, so there is no concept of a single endpoint memorizing the supported version(s) of its peers and using those memorized versions for later sessions. To me this is starting to get into neighbor discovery territory, which I would like to avoid.

________________________________
From: Matt Wronkiewicz <wronkiew@gmail.com>
Sent: Friday, July 21, 2017 2:33:08 AM
To: Brian Sipos
Cc: dtn@ietf.org
Subject: Re: draft-ietf-dtn-tcpclv4-02 comments

Brian,

Regarding version mismatch, the reconnection mechanism you described
provides backward compatibility for TCPCLv3. I haven't thought of
anything better for that scenario. Reconnecting with assumptions about
the data sent by the listener could fail in certain, admittedly
pathological, cases.

If the header length is the next field after the version byte and this
part of the structure is maintained across versions, there is another
method for allowing version negotiation post-v4. Each side can send
"dtn!", a header block for every version it supports, and an end tag
(0xff?). Both sides are able to skip incompatible headers because they
can at least determine the header length. Then the session begins
using the highest version that both support. TCPCLv4-only
implementations would just need to skip incompatible header blocks
until they hit the end tag.

Matt

On Wed, Jul 19, 2017 at 5:50 AM, Brian Sipos <BSipos@rkf-eng.com> wrote:
> Matt,
> This is some great feedback, I've in-lined responses below and also
> copied the DTN mailing list for their consideration.
>
> On Tue, 2017-07-18 at 00:28 -0700, Matt Wronkiewicz wrote:
>> DTN WG team,
>>
>> I read your draft for TCPCLv4 and look forward to implementing it.
>> Listed are some comments on the version at
>> <https://tools.ietf.org/html/draft-ietf-dtn-tcpclv4-02>:
>>
>>
>> 1. The contact header does not specify its total length. This may
>> cause a problem with header extensions because it is unclear at what
>> point a node should stop waiting for additional data, set the session
>> parameters, and start sending messages or upgrade security. The
>> contact header should include a length field that counts the
>> remaining
>> bytes including extensions.
>>
>> If it does not include a length field, there are some additional
>> ambiguities.
>
> This was definitely an oversight and needs to be added in. The contact
> header is supposed to be fully self-contained data, which right now it
> is not. We could add in an extension item count or an all-extension
> octet size. The size may be more helpful.
> I also didn't catch this earlier because I added extension handling to
> the spec but did not include this in the test implementation; oops!
>
>>
>> 1.a. A critical header extension with no other flags could be
>> misinterpreted as a XFER_SEGMENT message, and vice versa. An
>> implementation must reject XFER_SEGMENT messages that do not follow
>> XFER_INIT with the same transfer id. It must not send them before
>> sending XFER_INIT. This should be clarified in 5.4.3. Data
>> Transmission (XFER_SEGMENT).
>>
>> 1.b. In Table 2: Header Extension Item Flags, several reserved bits
>> must be zero, or the header extension would collide with other
>> message
>> types that are allowed after the session is established.
>>
>>
>> 2. In Section 4.2. Validation and Parameter Negotiation, 3rd
>> paragraph, if two nodes send different version numbers in the contact
>> header, it is specified that one of the nodes must send a SHUTDOWN
>> with a version mismatch. There is no opportunity for the other side
>> to
>> downgrade to the older version. There is also no way for the older
>> version to negotiate a session, because it has not received the
>> connection flags and cannot interpret the remote EID.
>>
> I can add some guidance to this section. There is no mechanism for in-
> TCP-connection downgrade, so the recommended behavior is to re-connect
> on the same TCP port but then provide a TCPCLv3 contact header and see
> if the listening agent accepts that instead. A similar procedure could
> be use to try TCPCLv3 first then v4 after. The listener (TCP server)
> has discretion to look at the start of the contact header before
> sending its only reply header.
>
>>
>> 3. The inability for two nodes supporting multiple TCPCL versions to
>> handshake is concerning. There are very few TCPCLv3 installations, so
>> backward compatibility is less of a worry. But if TCPCLv4 is
>> successful it will be widely deployed when there is a need for a new
>> version. It would be good to provide some mechanism for nodes that
>> implement both TCPCLv4 and v5 to establish a connection with a node
>> that only implements v4.
>>
>> One way to allow forward compatibility would be to require v4 nodes
>> to
>> send a VERSION_MISMATCH in response to a newer version, after which
>> the newer node may send a compatible contact header or disconnect.
>>
> Similar to above, do you think the one-version-per-connection-attempt
> is acceptable? Some additional informational language could be added to
> explain this situation.
>
>>
>> 4. Nodes implementing TCPCLv4 will presumably already have functions
>> for CBOR encoding and decoding. Restructuring the messages to use it
>> would remove a lot of padding. It would also provide more flexibility
>> and robustness for adding header extensions and new protocol
>> versions.
>> I recognize this is a drastic change that you have probably already
>> discussed.
>>
> We definitely had discussed the original proposed SDNV vs. CBOR vs.
> fixed-length-fields and settled on current fixed-length due to the
> convergence layer being a lower-level protocol than BP itself. This was
> due to concern about complexity in a TCPCL implementation. There is
> also the possibility, I believe, of a pure bundle forwarder which
> speaks TCPCL but does not actually examine the bundle contents and
> simply forwards bundle, as opaque data, to some actual BP node.
>
>>
>> 5. Table 13: SHUTDOWN Reason Codes is missing "Resource Exhaustion",
>> listed in Table 8: SHUTDOWN Reason Codes.
>>
>>
>> 6. In Table 8: SHUTDOWN Reason Codes, in the description for Resource
>> Exhaustion, the word "resource" is misspelled.
>>
> These will be corrected.
>
>>
>> 7. The shutdown procedure is not specified when one node requires TLS
>> and the other does not set USE_TLS. It is unclear whether the
>> strict-TLS node should send SHUTDOWN with "Contact Failure" or "TLS
>> Failure". A more descriptive "TLS Required" failure code could be
>> added.
>>
> I agree that we should distinguish between "TLS Agreement Failure" when
> the endpoint policy disallows the agreed Enable TLS state, and "TLS
> Handshake Failure" where TLS is enabled and attempted but the handshake
> itself fails.
>
>>
>> 8. In section 4.1.1. Header Extension Items, in the entry for Flags,
>> the word "unknown" is misspelled.
>>
> This will be corrected.
>
>>
>> Thank you for your work on the DTN WG, and for considering my
>> feedback.
>>
>> Matt Wronkiewicz