RE: TSV-ART review of draft-ietf-core-coap-tcp-tls-07

Brian Raymor <Brian.Raymor@microsoft.com> Fri, 21 April 2017 21:58 UTC

Return-Path: <Brian.Raymor@microsoft.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3AC0128896; Fri, 21 Apr 2017 14:58:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.02
X-Spam-Level:
X-Spam-Status: No, score=-2.02 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v8M7J2GgLu_N; Fri, 21 Apr 2017 14:58:23 -0700 (PDT)
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on0137.outbound.protection.outlook.com [104.47.38.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 786AC127419; Fri, 21 Apr 2017 14:58:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=RCNcGBcpFMFACwUzgRWino9j/YiAC0OIqEzpt7Mk0q8=; b=QlBZJCF597JET/z8/JXFo4r92pAerWliExHW561i1rm6G+hOZCSJeB/ltKB8tpykewXM1KZUiwJjh+oiv273hnehCpsQUPnfPAPzFR3sPW+7Acr7fKqyXwh40MOBm3HiCuxU6OPWyTmVrPXk5C/a0mP0ZZvL01xwApOvKnkv/CA=
Received: from BY2PR21MB0084.namprd21.prod.outlook.com (10.162.78.141) by BY2PR21MB0083.namprd21.prod.outlook.com (10.162.78.140) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1061.1; Fri, 21 Apr 2017 21:57:39 +0000
Received: from BY2PR21MB0084.namprd21.prod.outlook.com ([10.162.78.141]) by BY2PR21MB0084.namprd21.prod.outlook.com ([10.162.78.141]) with mapi id 15.01.1061.003; Fri, 21 Apr 2017 21:57:39 +0000
From: Brian Raymor <Brian.Raymor@microsoft.com>
To: Yoshifumi Nishida <nishida@sfc.wide.ad.jp>
CC: "tsv-art@ietf.org" <tsv-art@ietf.org>, "draft-ietf-core-coap-tcp-tls@ietf.org" <draft-ietf-core-coap-tcp-tls@ietf.org>, "core@ietf.org" <core@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>
Subject: RE: TSV-ART review of draft-ietf-core-coap-tcp-tls-07
Thread-Topic: TSV-ART review of draft-ietf-core-coap-tcp-tls-07
Thread-Index: AQHSsOTWicthTbHq+0Cl6wEpb6SnVKHOtjQAgADZuACAAKJUUIAAMqMAgAADmmA=
Date: Fri, 21 Apr 2017 21:57:38 +0000
Message-ID: <BY2PR21MB008453149ADC1A998FEA56D3831A0@BY2PR21MB0084.namprd21.prod.outlook.com>
References: <CAO249ye7KNdcbQfmOfik7QYFiXS9zcTE5n19pngHLgeur2XFpg@mail.gmail.com> <BY2PR21MB0084E781B2831EBC6A5F4E88831B0@BY2PR21MB0084.namprd21.prod.outlook.com> <CAO249ydcc7k2i5=OSSvvtzU2B1Qa62b3RR3iY0wBfQ2pOYQrkQ@mail.gmail.com> <BY2PR21MB00849DB795086F08F6D7A98A831A0@BY2PR21MB0084.namprd21.prod.outlook.com> <CAO249yeS8sZaJcADuz+bYAJa-CXs4v291Fm=adRouO1R=svPDw@mail.gmail.com>
In-Reply-To: <CAO249yeS8sZaJcADuz+bYAJa-CXs4v291Fm=adRouO1R=svPDw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Brian.Raymor@microsoft.com;
x-originating-ip: [174.61.159.182]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BY2PR21MB0083; 7:SUyyCBTp6tIPDmMkBxW3jAig8ww5pYu2G79NPVVNK1yBkyOowbioy+N+Xf618XodNeWh5DuwyqEAztWNW+TqU+98EWQvilEXXUskZdQych/mntocKRsqi/3jbXi/mYQAYub6rUWyAtmwS2i2vwle8KVWu9rdph0gGWD1tfYyqYTYtggO4NtncBGx5YX0YQECDeeSNIuKHg8zQ0Q/uMvZBjF+uKg6/kDbWzM4I02co41tq9pgyVRf+pDoKw672+xVXFf2MyGqpnpcEP+EXTYeR2LYZTJQEKwMM1EWsj+hCgw1dIF2+pSoIpjGy+zraJSF/FPaho6wFZ+uO4NgyDdmmCFAg4Cts9m1WFVqqi8tUUs=
x-ms-office365-filtering-correlation-id: 76a0f5b2-64ee-453c-8300-08d489016d76
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(48565401081)(201703131423075)(201703031133081)(201702281549075); SRVR:BY2PR21MB0083;
x-forefront-prvs: 02843AA9E0
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(43784003)(51444003)(377454003)(199003)(189002)(24454002)(3660700001)(230783001)(10290500002)(6436002)(189998001)(86612001)(5005710100001)(7696004)(105586002)(6506006)(6246003)(77096006)(4326008)(74316002)(86362001)(3280700002)(5660300001)(110136004)(7736002)(76176999)(54356999)(236005)(50986999)(101416001)(33656002)(7906003)(8990500004)(2900100001)(9686003)(97736004)(229853002)(606005)(55016002)(19609705001)(54906002)(99286003)(8676002)(6916009)(25786009)(68736007)(93886004)(790700001)(10090500001)(6116002)(102836003)(3846002)(81156014)(8936002)(54896002)(6306002)(2950100002)(66066001)(53546009)(122556002)(106356001); DIR:OUT; SFP:1102; SCL:1; SRVR:BY2PR21MB0083; H:BY2PR21MB0084.namprd21.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BY2PR21MB008453149ADC1A998FEA56D3831A0BY2PR21MB0084namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Apr 2017 21:57:38.8246 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR21MB0083
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/1_OnnbVSg_JQUFlLyIye72m6OB0>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Apr 2017 21:58:27 -0000

I think that I understand your perceptions better. Prior to adoption of coap-tcp-tls and before I was active in the WG, I recall discussions related to the confusion over application vs transport reliability in CoAP especially as related to CON and NON. What was intended?

Tim Carey outlined some concerns in:
https://tools.ietf.org/html/draft-carey-core-std-msg-vs-trans-adapt-00#section-2

This topic was presented in detail at IETF 93 - https://www.ietf.org/proceedings/93/slides/slides-93-core-0.pdf - starting on slide 23.

And in a related thread on the mailing list back in 2015 - https://www.ietf.org/mail-archive/web/core/current/msg06280.html - Carsten responded:

> In any case, CON and NON are about message layer semantics, not about application semantics
> -- you gave them a meaning they don't have.

By IETF 94, the authors were reporting – “Most of the Confusion around              CON/NON was resolved”.

Where relevant, I’ve added clarifications - such as the Appendix related to differences in Observe for reliable transports.

Both Carsten and Hannes could probably offer more context if needed.

From: Yoshifumi Nishida [mailto:nishida@sfc.wide.ad.jp]
Sent: Friday, April 21, 2017 2:08 PM
To: Brian Raymor <Brian.Raymor@microsoft.com>
Cc: Yoshifumi Nishida <nishida@sfc.wide.ad.jp>; tsv-art@ietf.org; draft-ietf-core-coap-tcp-tls@ietf.org; core@ietf.org; ietf@ietf.org
Subject: Re: TSV-ART review of draft-ietf-core-coap-tcp-tls-07

Hi Brian,

Just in case,
Reliable transports only provide reliability at transport level. It doesn't provide reliability in application protocol level.

RFC7252 has reliability mechanisms in it since it uses UDP. This means it has abilities to check both transport and app level reliability.
This draft only provides transport level reliability and apps will need to detect app protocol failure by themselves.
This means 7252 and this draft are not totally equivalent from the viewpoint of applications.

I am not saying this is wrong or bad, but I believe app developer should aware this point.
--
Yoshi

On Fri, Apr 21, 2017 at 11:15 AM, Brian Raymor <Brian.Raymor@microsoft.com<mailto:Brian.Raymor@microsoft.com>> wrote:

Hi Yoshi,



> OK. I also think we should state that the protocol should notify the failure events to applications.

> Since errors can happen not only in TCP, but also TLS and websocket level, mentioning only TCP close or reset might not

> be enough.



After reviewing with the authors, an additional clarification was appended to 3.4 Connection Health - https://github.com/core-wg/coap-tcp-tls/pull/140/files



The opinion of the authors (and Gengyu WEI’s recent response - https://www.ietf.org/mail-archive/web/core/current/msg08622.html) is that RFC6455 covers the WebSocket case and does not need to be repeated here.



> When we use 7252, I think applications basically don't need to implement timeouts or retry mechanisms as the protocol

> provides such things.



RFC7252 provides timeouts and retries because it's implementing a TCP-like reliability mechanism over UDP - https://tools.ietf.org/html/rfc7252#section-2.1



> However, when we use this one, it seems applications will need to have such mechanisms. Isn't it a bit confusing? I am thinking that

> there need to be some guidance here.

> BTW, PONG is one example.



For coap-tcp-tls, there are multiple early implementations. This has never been reported as a source of confusion.



>> My sense is that we should treat this as an update to RFC7959 based on the original language:

> I don't have a strong opinion here. Updating 7959 is fine for me if it's clearer to CoAP people.



I've merged the change - https://github.com/core-wg/coap-tcp-tls/pull/138/files


Thanks again for helping us to improve the quality of the draft,

…Brian