Re: [hybi] method of allocation of reserved bits to extensions

Bruce Atherton <bruce@callenish.com> Wed, 01 June 2011 20:15 UTC

Return-Path: <bruce@callenish.com>
X-Original-To: hybi@ietfa.amsl.com
Delivered-To: hybi@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EAAAE0833 for <hybi@ietfa.amsl.com>; Wed, 1 Jun 2011 13:15:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level:
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_21=0.6]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FraQuE76wIdr for <hybi@ietfa.amsl.com>; Wed, 1 Jun 2011 13:15:08 -0700 (PDT)
Received: from biz82.inmotionhosting.com (biz82.inmotionhosting.com [74.124.202.87]) by ietfa.amsl.com (Postfix) with ESMTP id E8CDBE06E9 for <hybi@ietf.org>; Wed, 1 Jun 2011 13:15:08 -0700 (PDT)
Received: from [24.108.133.142] (helo=[192.168.145.101]) by biz82.inmotionhosting.com with esmtpa (Exim 4.69) (envelope-from <bruce@callenish.com>) id 1QRroo-0006tw-MK; Wed, 01 Jun 2011 13:15:06 -0700
Message-ID: <4DE69DBF.7010501@callenish.com>
Date: Wed, 01 Jun 2011 13:14:55 -0700
From: Bruce Atherton <bruce@callenish.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.2.17) Gecko/20110414 Lightning/1.0b2 Thunderbird/3.1.10
MIME-Version: 1.0
To: hybi@ietf.org
References: <BANLkTinqQiMQ4N1vWjyCe682BmdisW-=KA@mail.gmail.com> <BANLkTik1a6CEA8LiiLgsnBt9qHCaybmWfg@mail.gmail.com> <4DBA3809.4010004@oracle.com> <CA566BAEAD6B3F4E8B5C5C4F61710C11402DB23F@TK5EX14MBXW603.wingroup.windeploy.ntdev.microsoft.com> <cbutt65hgt3ujdbi9jqa3v9a42iigglldk@hive.bjoern.hoehrmann.de> <CA566BAEAD6B3F4E8B5C5C4F61710C11402F796C@TK5EX14MBXW603.wingroup.windeploy.ntdev.microsoft.com> <BANLkTimT=hgop617WmhC+iijqWg80Q2ucw@mail.gmail.com> <BANLkTimn3vcjuk3fSW=zY6ZpAfRMt1c0vw@mail.gmail.com> <BANLkTimNrSVhZicjwz4pGiS6aufaTzbRfw@mail.gmail.com> <BANLkTim3PYcTZra_Qr-3hshS1nWJxXvB2A@mail.gmail.com> <BANLkTikaYiX+weYHiQb_T7Sz6QNX-jkTBA@mail.gmail.com>
In-Reply-To: <BANLkTikaYiX+weYHiQb_T7Sz6QNX-jkTBA@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz82.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - callenish.com
Cc: Greg Wilkins <gregw@intalio.com>
Subject: Re: [hybi] method of allocation of reserved bits to extensions
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jun 2011 20:15:09 -0000

On 31/05/2011 5:53 PM, Greg Wilkins wrote:
>
> So if you have extensions A, B and C, each wanting to have opcodes and
> flags then you might see a payload like:
>
>   <A opcode><A flags>  <B opcode>  <B flags>  <C opcode>  <C flags>  <payload>
>
> Except that in reality the semantics of that is actually
>
>   <A opcode><A flags>  <A payload  of<B opcode>  <B flags>   <  B
> payload of<C opcode>  <C flags>  <  payload>>>
>
> Which essentially means that on the wire all you would see is
>
>   <A opcode><A flags>  <A payload>
>

I understand your concerns about squatting on bits, but I don't follow 
your reasons for wanting this scheme. If A wants its own opcode and 
bits, why not let it put that into its extension data? Why not have 
something like:

<Standard Opcode><Standard Flags><A Payload>

where <A Payload> is composed of:

<A Opcode><A Flags><B Payload>

and <B Payload> is:

<B Opcode><B Flags><C Payload>

and so on. A's crypto/compression/muxing could apply only after it had 
retrieved its opcode and flags. What is the benefit of popping the 
opcode and flag requirements up a level?