Re: [Int-area] I-D Action: draft-shen-traceroute-ping-ext-04.txt

Joe Touch <touch@isi.edu> Thu, 08 March 2012 01:30 UTC

Return-Path: <touch@isi.edu>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57E9821E8014 for <int-area@ietfa.amsl.com>; Wed, 7 Mar 2012 17:30:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.948
X-Spam-Level:
X-Spam-Status: No, score=-102.948 tagged_above=-999 required=5 tests=[AWL=-0.349, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k3E0QaGk69ac for <int-area@ietfa.amsl.com>; Wed, 7 Mar 2012 17:30:45 -0800 (PST)
Received: from darkstar.isi.edu (darkstar.isi.edu [128.9.128.127]) by ietfa.amsl.com (Postfix) with ESMTP id D6AD421E8011 for <int-area@ietf.org>; Wed, 7 Mar 2012 17:30:45 -0800 (PST)
Received: from [128.9.160.252] (pen.isi.edu [128.9.160.252]) (authenticated bits=0) by darkstar.isi.edu (8.13.8/8.13.8) with ESMTP id q281Tx6E022759 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Wed, 7 Mar 2012 17:29:59 -0800 (PST)
Message-ID: <4F580B97.1070401@isi.edu>
Date: Wed, 07 Mar 2012 17:29:59 -0800
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:10.0.1) Gecko/20120208 Thunderbird/10.0.1
MIME-Version: 1.0
To: Naiming Shen <naiming@cisco.com>
References: <20120227213938.20370.68711.idtracker@ietfa.amsl.com> <9C0C873C-D52F-4EC8-939C-FD2373FDC9ED@cisco.com> <709D93F8-C6C0-4F7D-A823-35540D683EE6@netapp.com> <4705AE0F-CAE1-46D9-84D5-AF6D11BD35BC@cisco.com> <2C2F2761-E2BD-4E55-97F3-4E5B3155A3BB@netapp.com> <CFF1327F-D62D-4DDD-9382-7D083DBB6E65@cisco.com>
In-Reply-To: <CFF1327F-D62D-4DDD-9382-7D083DBB6E65@cisco.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: "int-area@ietf.org" <int-area@ietf.org>
Subject: Re: [Int-area] I-D Action: draft-shen-traceroute-ping-ext-04.txt
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/int-area>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Mar 2012 01:30:46 -0000

Hi, all,

On 3/5/2012 11:46 PM, Naiming Shen wrote:
...
> The previous version of this draft didn't have this well-known port defined, and we got
> many comments on how to distinguish the packets with new features from the general
> traceroute/ping packets on the Internet, as you mentioned below, it needs more deeper
> packet inspection. With this well-known port, a provider's internal use of certain feature with
> this extension can be more easily sort out from normal trace/ping packets (before the deeper
> packet inspection).

A ping (ICMP echo request) message has no port. It has an Identifier 
field that is used "like a port in TCP or UDP to identify a session" 
[RFC792], but it identifies a session not a protocol. I.e., it should 
change for subsequent echo requests, so this should not be fixed at a 
specific value.

Traceroute uses ICMP with varying TTLs, so a port number is equally 
meaningless there.

Sec 5 of this doc redefines how ping works - when it reaches the valid 
destination, an echo response is sent back. That's how ping knows it 
works, and how traceroute knows to stop.

If you intend on using these inside UDP or TCP segments, you need to be 
much more specific about what you mean by 'traceroute/ping' - notably, 
citing an RFC or other spec on the variant you're using. However, it 
would be important to first make the case that this information is 
relevant for those protocols.

However, why would you then want to limit those protocols to a specific 
UDP or TCP port number? their value is in being used to test various 
port numbers that are blocked (or not) along various paths - e.g., to 
find out that HTTP isn't blocked all the way to a destination, or if so 
on what hop.

Joe