Re: WGLC: p2 MUSTs

Amos Jeffries <squid3@treenet.co.nz> Sun, 04 August 2013 02:52 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 634B721E8084 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sat, 3 Aug 2013 19:52:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.561
X-Spam-Level:
X-Spam-Status: No, score=-10.561 tagged_above=-999 required=5 tests=[AWL=0.038, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kXPLDVsDbBQQ for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sat, 3 Aug 2013 19:52:08 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) by ietfa.amsl.com (Postfix) with ESMTP id D37E521F9DDB for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sat, 3 Aug 2013 19:52:07 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1V5oP4-0007m1-0N for ietf-http-wg-dist@listhub.w3.org; Sun, 04 Aug 2013 02:50:42 +0000
Resent-Date: Sun, 04 Aug 2013 02:50:42 +0000
Resent-Message-Id: <E1V5oP4-0007m1-0N@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <squid3@treenet.co.nz>) id 1V5oOs-0007lE-LN for ietf-http-wg@listhub.w3.org; Sun, 04 Aug 2013 02:50:30 +0000
Received: from ip-58-28-153-233.static-xdsl.xnet.co.nz ([58.28.153.233] helo=treenet.co.nz) by lisa.w3.org with esmtp (Exim 4.72) (envelope-from <squid3@treenet.co.nz>) id 1V5oOq-0004FL-FU for ietf-http-wg@w3.org; Sun, 04 Aug 2013 02:50:29 +0000
Received: from [192.168.1.218] (ip202-27-218-168.satlan.co.nz [202.27.218.168]) by treenet.co.nz (Postfix) with ESMTP id 14C5EE6F85 for <ietf-http-wg@w3.org>; Sun, 4 Aug 2013 14:50:03 +1200 (NZST)
Message-ID: <51FDC15B.9070101@treenet.co.nz>
Date: Sun, 04 Aug 2013 14:50:03 +1200
From: Amos Jeffries <squid3@treenet.co.nz>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130620 Thunderbird/17.0.7
MIME-Version: 1.0
To: ietf-http-wg@w3.org
References: <D69329FD-7456-46C5-BE24-6E7EE7E48C39@mnot.net> <51802D89.6000001@measurement-factory.com> <6DAAF751-4C18-4A71-AD54-B8338B9B1B47@gbiv.com>
In-Reply-To: <6DAAF751-4C18-4A71-AD54-B8338B9B1B47@gbiv.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Received-SPF: pass client-ip=58.28.153.233; envelope-from=squid3@treenet.co.nz; helo=treenet.co.nz
X-W3C-Hub-Spam-Status: No, score=-0.0
X-W3C-Hub-Spam-Report: SPF_HELO_PASS=-0.001, SPF_PASS=-0.001
X-W3C-Scan-Sig: lisa.w3.org 1V5oOq-0004FL-FU 28fa1500e5eb508ee40b637a5b2e60e4
X-Original-To: ietf-http-wg@w3.org
Subject: Re: WGLC: p2 MUSTs
Archived-At: <http://www.w3.org/mid/51FDC15B.9070101@treenet.co.nz>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/19051
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On 4/08/2013 1:48 p.m., Roy T. Fielding wrote:
> On Apr 30, 2013, at 1:46 PM, Alex Rousskov wrote:
>
>>> The CONNECT method requests that the recipient establish a tunnel to
>>> the destination origin server [...], until the connection is closed.
>> The "until the connection is closed" part is misleading and inaccurate.
>>
>> There are two connections in a CONNECT tunnel: (a) between a CONNECT
>> sender and CONNECT recipient and (2) between CONNECT recipient the the
>> next HTTP hop. The tunnel termination condition is rather complex and is
>> detailed later in the same section. It may be a good idea to drop the
>> "until..." part. At least I cannot suggest a way to describe it
>> correctly as an ending of an already long sentence :-).
> Changed to "until the tunnel is closed".
>
>>> When a tunnel intermediary detects that either side has closed its
>>> connection, any outstanding data that came from that side will first
>>> be sent to the other side and then the intermediary will close both
>>> connections. If there is outstanding data left undelivered, that data
>>> will be discarded.
>> These "will"s should be rephrased as intermediary MUSTs IMO. I also
>> suggest moving them higher, before the informal risk discussion.
> Moved, fixed, and rephrased to "A tunnel is closed when ..."
>
>>> A client MUST NOT send header fields in a TRACE request containing
>>> sensitive data
>> The above rule seems too onerous to proxies. Replace "MUST NOT send"
>> with "MUST NOT generate"?
> Fixed.
>
>>> 5.1.1.1 Use of the 100 (Continue) Status
>>> Requirements for HTTP/1.1 clients:
>>> ...
>>> Requirements for HTTP/1.1 proxies:
>> Should we explicitly exclude proxies from the first group of
>> requirements by saying "Requirements for user agents" instead of
>> "Requirements for clients"?
> No, the first set applies to proxies that want to use 100-continue
> for their own reasons.
>
>>> MUST contain an updated Max-Forwards field with a value decremented by one (1).
>> A lot of proxies violate this MUST because they cannot grok and, hence,
>> cannot decrement large integer values. Interoperability problems might
>> happen when a client generates Max-Forwards with a maximum value it can
>> store (e.g., to count the number of hops to the origin server) but the
>> proxy cannot store such a large value (e.g., 64bit vs 32bit).
>>
>> Perhaps we can relax this rule by allowing proxies to decrement by "at
>> least one", so that a huge value can be replaced with the maximum value
>> the proxy can represent?
> Changed to
>
>    If the received Max-Forwards value is greater than zero,
>    the intermediary MUST generate an updated Max-Forwards field
>    in the forwarded message with a field-value that is the lesser of:
>    a) the received value decremented by one (1), or
>    b) the recipient's maximum supported value for Max-Forwards.

Isn't Max-Forwards used for sending OPTIONS and such to a specific hop?

I know these limits are theoretically supposed to be absurdly high. But 
if the implementation decided that the limit would be 2 or something the 
above rules would break tracing. For example the client would get back a 
constant response gnenerated from hop X+2 when it was querying hop X+3 
to X+N.

I think an error response would be better if Max-Forwards is bigger than 
the implementation can support.

FWIW: there are big-math tricks that can be implemented to increment or 
decrement arbitrarily large numeric values using a counter counter as 
small as 8-bit if neccesary so while the speed issue is relevant the 
X-bit overflow shodul not be. The old Co-Advisor test for this was to 
send a 72-bit numeric value in the header and expect successful decrement.

Amos