Re: TSV-ART review of draft-ietf-core-coap-tcp-tls-07

Yoshifumi Nishida <nishida@sfc.wide.ad.jp> Sun, 30 April 2017 04:26 UTC

Return-Path: <nishida@sfc.wide.ad.jp>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D408012420B; Sat, 29 Apr 2017 21:26:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.401
X-Spam-Level:
X-Spam-Status: No, score=-1.401 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_SORBS_SPAM=0.5, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Smy9Vbl3vhCc; Sat, 29 Apr 2017 21:26:52 -0700 (PDT)
Received: from mail.sfc.wide.ad.jp (shonan.sfc.wide.ad.jp [IPv6:2001:200:0:8803::53]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 73CC61292D3; Sat, 29 Apr 2017 21:24:41 -0700 (PDT)
Received: from mail-oi0-f48.google.com (mail-oi0-f48.google.com [209.85.218.48]) by mail.sfc.wide.ad.jp (Postfix) with ESMTPSA id A9DF229CA6F; Sun, 30 Apr 2017 13:24:39 +0900 (JST)
Received: by mail-oi0-f48.google.com with SMTP id x184so62464533oia.1; Sat, 29 Apr 2017 21:24:39 -0700 (PDT)
X-Gm-Message-State: AN3rC/4S76KihGisreuTUda46+/nmDsyZ+fOmaHMXgHkrb1wmykvWYxA HEyCq0PMAfUS5IBnuPIG5G+NO2p0SA==
X-Received: by 10.157.2.101 with SMTP id 92mr7246001otb.211.1493526278364; Sat, 29 Apr 2017 21:24:38 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.157.4.55 with HTTP; Sat, 29 Apr 2017 21:24:37 -0700 (PDT)
In-Reply-To: <BY2PR21MB008453149ADC1A998FEA56D3831A0@BY2PR21MB0084.namprd21.prod.outlook.com>
References: <CAO249ye7KNdcbQfmOfik7QYFiXS9zcTE5n19pngHLgeur2XFpg@mail.gmail.com> <BY2PR21MB0084E781B2831EBC6A5F4E88831B0@BY2PR21MB0084.namprd21.prod.outlook.com> <CAO249ydcc7k2i5=OSSvvtzU2B1Qa62b3RR3iY0wBfQ2pOYQrkQ@mail.gmail.com> <BY2PR21MB00849DB795086F08F6D7A98A831A0@BY2PR21MB0084.namprd21.prod.outlook.com> <CAO249yeS8sZaJcADuz+bYAJa-CXs4v291Fm=adRouO1R=svPDw@mail.gmail.com> <BY2PR21MB008453149ADC1A998FEA56D3831A0@BY2PR21MB0084.namprd21.prod.outlook.com>
From: Yoshifumi Nishida <nishida@sfc.wide.ad.jp>
Date: Sat, 29 Apr 2017 21:24:37 -0700
X-Gmail-Original-Message-ID: <CAO249ydRLFpG=yHYvaZvPBiQuW5x=4HZqCZyTAb2HHeDuP+wAA@mail.gmail.com>
Message-ID: <CAO249ydRLFpG=yHYvaZvPBiQuW5x=4HZqCZyTAb2HHeDuP+wAA@mail.gmail.com>
Subject: Re: TSV-ART review of draft-ietf-core-coap-tcp-tls-07
To: Brian Raymor <Brian.Raymor@microsoft.com>
Cc: Yoshifumi Nishida <nishida@sfc.wide.ad.jp>, "tsv-art@ietf.org" <tsv-art@ietf.org>, "draft-ietf-core-coap-tcp-tls@ietf.org" <draft-ietf-core-coap-tcp-tls@ietf.org>, "core@ietf.org" <core@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c03918c48e9d8054e5aaf1a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/mRGlKf3BBlhmobMfropaquMg74w>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Apr 2017 04:26:56 -0000

Hello,
As far as I've read -08 draft, I think this point has not been addressed
yet. I hope some folks could elaborate a bit more if they think this is not
an important point for the draft.
--
Yoshi

On Fri, Apr 21, 2017 at 2:57 PM, Brian Raymor <Brian.Raymor@microsoft.com>
wrote:

> I think that I understand your perceptions better. Prior to adoption of
> coap-tcp-tls and before I was active in the WG, I recall discussions
> related to the confusion over application vs transport reliability in CoAP
> especially as related to CON and NON. What was intended?
>
>
>
> Tim Carey outlined some concerns in:
>
> https://tools.ietf.org/html/draft-carey-core-std-msg-vs-tran
> s-adapt-00#section-2
>
>
>
> This topic was presented in detail at IETF 93 -
> https://www.ietf.org/proceedings/93/slides/slides-93-core-0.pdf -
> starting on slide 23.
>
>
>
> And in a related thread on the mailing list back in 2015 -
> https://www.ietf.org/mail-archive/web/core/current/msg06280.html -
> Carsten responded:
>
>
>
> > In any case, CON and NON are about message layer semantics, not about
> application semantics
>
> > -- you gave them a meaning they don't have.
>
>
>
> By IETF 94, the authors were reporting – “Most of the Confusion
> around              CON/NON was resolved”.
>
>
>
> Where relevant, I’ve added clarifications - such as the Appendix related
> to differences in Observe for reliable transports.
>
>
>
> Both Carsten and Hannes could probably offer more context if needed.
>
>
>
> *From:* Yoshifumi Nishida [mailto:nishida@sfc.wide.ad.jp]
> *Sent:* Friday, April 21, 2017 2:08 PM
> *To:* Brian Raymor <Brian.Raymor@microsoft.com>
> *Cc:* Yoshifumi Nishida <nishida@sfc.wide.ad.jp>; tsv-art@ietf.org;
> draft-ietf-core-coap-tcp-tls@ietf.org; core@ietf.org; ietf@ietf.org
> *Subject:* Re: TSV-ART review of draft-ietf-core-coap-tcp-tls-07
>
>
>
> Hi Brian,
>
>
>
> Just in case,
>
> Reliable transports only provide reliability at transport level. It
> doesn't provide reliability in application protocol level.
>
>
>
> RFC7252 has reliability mechanisms in it since it uses UDP. This means it
> has abilities to check both transport and app level reliability.
>
> This draft only provides transport level reliability and apps will need to
> detect app protocol failure by themselves.
>
> This means 7252 and this draft are not totally equivalent from the
> viewpoint of applications.
>
>
>
> I am not saying this is wrong or bad, but I believe app developer should
> aware this point.
>
> --
>
> Yoshi
>
>
>
> On Fri, Apr 21, 2017 at 11:15 AM, Brian Raymor <Brian.Raymor@microsoft.com>
> wrote:
>
> Hi Yoshi,
>
>
>
> > OK. I also think we should state that the protocol should notify the
> failure events to applications.
>
> > Since errors can happen not only in TCP, but also TLS and websocket
> level, mentioning only TCP close or reset might not
>
> > be enough.
>
>
>
> After reviewing with the authors, an additional clarification was appended
> to 3.4 Connection Health - https://github.com/core-wg/coa
> p-tcp-tls/pull/140/files
>
>
>
> The opinion of the authors (and Gengyu WEI’s recent response -
> https://www.ietf.org/mail-archive/web/core/current/msg08622.html) is that
> RFC6455 covers the WebSocket case and does not need to be repeated here.
>
>
>
> > When we use 7252, I think applications basically don't need to implement
> timeouts or retry mechanisms as the protocol
>
> > provides such things.
>
>
>
> RFC7252 provides timeouts and retries because it's implementing a TCP-like
> reliability mechanism over UDP - https://tools.ietf.org/html/rf
> c7252#section-2.1
>
>
>
> > However, when we use this one, it seems applications will need to have
> such mechanisms. Isn't it a bit confusing? I am thinking that
>
> > there need to be some guidance here.
>
> > BTW, PONG is one example.
>
>
>
> For coap-tcp-tls, there are multiple early implementations. This has never
> been reported as a source of confusion.
>
>
>
> >> My sense is that we should treat this as an update to RFC7959 based on
> the original language:
>
> > I don't have a strong opinion here. Updating 7959 is fine for me if it's
> clearer to CoAP people.
>
>
>
> I've merged the change - https://github.com/core-wg/coa
> p-tcp-tls/pull/138/files
>
>
>
> Thanks again for helping us to improve the quality of the draft,
>
>
>
> …Brian
>
>
>