Re: [Int-area] Alissa Cooper's Discuss on draft-ietf-intarea-frag-fragile-15: (with DISCUSS and COMMENT)

"Joel M. Halpern" <jmh@joelhalpern.com> Wed, 07 August 2019 00:49 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF58E1200B2; Tue, 6 Aug 2019 17:49:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N0Wvtb9I2BGw; Tue, 6 Aug 2019 17:49:09 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 06FB612009C; Tue, 6 Aug 2019 17:49:09 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 463CYw6lTxz1Z791; Tue, 6 Aug 2019 17:49:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1565138948; bh=WUtJyt5ryv+o66I4qRGOMP4J8PQh2sWDoV6sqWq8Dls=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=F10p7pDxzP3jHdeMA0su8Z9uKv5gKC7ie0h+8ZpFm8m7hn62GH1om7HGlrTNE7vCY LQhxhFdYYeBdFbxnMFU4OMcmZEbn2GLmzJvSAQhuEWl9U684SQydmiZ5HU99M73SbA OkzcBR6C1j5QijuAZFM6wumD9dIqyoP+BT5w8i0E=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from [172.20.7.244] (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 463CYv6xCjz1Z78y; Tue, 6 Aug 2019 17:49:07 -0700 (PDT)
To: Alissa Cooper <alissa@cooperw.in>, Tom Herbert <tom@herbertland.com>
Cc: draft-ietf-intarea-frag-fragile@ietf.org, int-area <int-area@ietf.org>, IESG <iesg@ietf.org>, intarea-chairs <intarea-chairs@ietf.org>
References: <156512344887.27340.5761295053779083959.idtracker@ietfa.amsl.com> <CALx6S35f9eH1SCFqWZoBtnFrqvdoXrhiPoPQTh2_w-LjwBzRSQ@mail.gmail.com> <6B2DA394-E11A-46C1-8A45-76D59BAF0783@cooperw.in>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <2bb76c0c-35ef-48ad-5e82-7d6c9867859b@joelhalpern.com>
Date: Tue, 06 Aug 2019 20:49:06 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0
MIME-Version: 1.0
In-Reply-To: <6B2DA394-E11A-46C1-8A45-76D59BAF0783@cooperw.in>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/BVwykmIRo5Czpomhu28NniKAjWY>
Subject: Re: [Int-area] Alissa Cooper's Discuss on draft-ietf-intarea-frag-fragile-15: (with DISCUSS and COMMENT)
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Aug 2019 00:49:11 -0000

As far as I can tell (as a mostly observer who is now shepherding this 
document) the working group seemed very reluctant to get too specific 
about what were or were not constrained environments where fragmentation 
might (reasonably?) be expected (or not expected) to work.

I fear that trying to get more specific would open a complex discussion 
which might well never converge.

Yours,
Joel

On 8/6/2019 8:11 PM, Alissa Cooper wrote:
> Hi Tom,
> 
>> On Aug 6, 2019, at 5:41 PM, Tom Herbert <tom@herbertland.com> wrote:
>>
>> On Tue, Aug 6, 2019 at 1:30 PM Alissa Cooper via Datatracker
>> <noreply@ietf.org> wrote:
>>>
>>> Alissa Cooper has entered the following ballot position for
>>> draft-ietf-intarea-frag-fragile-15: Discuss
>>>
>>> When responding, please keep the subject line intact and reply to all
>>> email addresses included in the To and CC lines. (Feel free to cut this
>>> introductory paragraph, however.)
>>>
>>>
>>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
>>> for more information about IESG DISCUSS and COMMENT positions.
>>>
>>>
>>> The document, along with other ballot positions, can be found here:
>>> https://datatracker.ietf.org/doc/draft-ietf-intarea-frag-fragile/
>>>
>>>
>>>
>>> ----------------------------------------------------------------------
>>> DISCUSS:
>>> ----------------------------------------------------------------------
>>>
>>> Thanks for writing this document.
>>>
>>> Section 6.1 says:
>>>
>>> "Developers MAY develop new protocols or applications that rely on IP
>>>    fragmentation if the protocol or application is to be run only in
>>>    environments where IP fragmentation is known to be supported."
>>>
>>> I'm wondering if there should be a bit more nuance here to make the
>>> recommendation clearer. Do we think there is a case where an application
>>> protocol developed in the IETF will be known to only run in environments where
>>> fragmentation is supported? If we don't think developing such a protocol would
>>> be in scope for the IETF, then I'm wondering if that case should be called out
>>> explicitly with a stronger normative requirement.
>>>
>> Alissa,
>>
>> Are you distinguishing between protocol development and application
>> development?
> 
> I’m specifically wondering about application protocols (as distinct from other protocols) developed in the IETF (as distinct from developed elsewhere). Sometimes we use BCPs to guide future work in the IETF specifically, and it seemed to me that in that specific slice — IETF-developed application protocols — we may be able to make a stronger recommendation since we can’t be sure of the environment in which any given application protocol would be deployed (I think, but would be open to arguments otherwise).
> 
> Thanks,
> Alissa
> 
> 
>> For instance, as written the requirements would allow a
>> UDP application developer to send 64K datagrams which might work
>> perfectly fine and be the best solution in their environment that they
>> know properly supports fragmentation.
>>
>> Tom
>>
>>>
>>> ----------------------------------------------------------------------
>>> COMMENT:
>>> ----------------------------------------------------------------------
>>>
>>> Section 3.8.2: If there is any chance we think this situation might improve
>>> before this RFC-to-be gets obsoleted one day, I might suggest:
>>>
>>> s/The security policy described above is implemented incorrectly on
>>>    many consumer CPE routers./The security policy described above has been
>>>    implemented incorrectly on many consumer CPE routers./
>>>
>>> Section 3.9: s/Another recent study/Another study/
>>>
>>>
>>> _______________________________________________
>>> Int-area mailing list
>>> Int-area@ietf.org
>>> https://www.ietf.org/mailman/listinfo/int-area
> 
> _______________________________________________
> Int-area mailing list
> Int-area@ietf.org
> https://www.ietf.org/mailman/listinfo/int-area
>