Re: draft-ietf-ippcp-lzs-01.txt for comments

Avram Shacham <shacham@cisco.com> Mon, 17 November 1997 11:09 UTC

Return-Path: shacham@cisco.com
Received: from beasley.cisco.com (mailgate-sj-2.cisco.com [171.69.2.135]) by ftp-eng.cisco.com (8.8.5-Cisco.1/8.6.5) with ESMTP id DAA15290 for <ippcp-archive-file@ftp-eng.cisco.com>; Mon, 17 Nov 1997 03:09:32 -0800 (PST)
Received: from pita.cisco.com (pita.cisco.com [161.44.132.3]) by beasley.cisco.com (8.8.4-Cisco.1/CISCO.GATE.1.1) with ESMTP id DAA11036 for <ippcp@external.cisco.com>; Mon, 17 Nov 1997 03:08:46 -0800 (PST)
Received: from shacham-home-pc-4.cisco.com ([144.254.79.252]) by pita.cisco.com (8.8.5-Cisco.1/8.6.5) with SMTP id DAA19248; Mon, 17 Nov 1997 03:08:41 -0800 (PST)
Message-Id: <2.2.32.19971117110640.006cc648@pita.cisco.com>
X-Sender: shacham@pita.cisco.com
X-Mailer: Windows Eudora Pro Version 2.2 (32)
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Date: Mon, 17 Nov 1997 13:06:40 +0200
To: Robert Friend <rfriend@hifn.com>, 'IPPCP' <ippcp@external.cisco.com>
From: Avram Shacham <shacham@cisco.com>
Subject: Re: draft-ietf-ippcp-lzs-01.txt for comments

Robert,

Your draft looks good. Please see my comments in the document.

Regards,
avram

At 03:30 PM 11/14/97 -0800, Robert Friend wrote:
>Abstract
>
>   This document describes a IP compression method based on the LZS
                              ^^
Is 'IP' necessary?

<snip>

>1.2 Background of LZS Compression
>
>   Starting with a sliding window compression history, similar to [LZ1],
>   Hi/fn developed a new, enhanced compression algorithm identified as
>   LZS. The LZS algorithm is optimized to compress all file types as
                                                    ^^^^^^^^^^^^^^
?

>   efficiently as possible.  Even string matches as short as two octets
>   are effectively compressed.

<snip>

>   The efficiency of the LZS algorithm depends on the degree of
>   redundancy in the original data.  A typical compression ratio is 2:1.

What do you define to be "typical"?  Your Appendix A shows that the Calgary
files are compressed at a ratio of 2.04:1 for 4096 bytes datagrams, a very
non common MTU.

<snip>

>2. Compression Process
>
>2.2 Anti-expansion of Payload Data
>
>   The maximum expansion produced by the LZS algorithm is 12.5%.
>
>   If the size of a compressed IP datagram, including whatever overhead
                                                       ^^^^^^^^^^^^^^^^^
?

<snip>

>2.4 Compression Encoding Format
>
>   The input to the payload compression algorithm is an IP datagram
>   payload. The output of the algorithm is a new (and hopefully smaller)
>   payload. The output payload contains the input payload's data in
>   either compressed or uncompressed format. The input and output
>   payloads are each an integral number of bytes in length.
>
>   If the uncompressed form is used, the output payload is identical to
>   the input payload and the IPComp header is omitted.  

IPComp header is added _only_ to compressed payloads.

<snip>

>2.5 Padding
>
>   A datagram payload compressed using LZS always ends with the last
>   compressed data byte (also known as the <end marker>), which is used
>   to disambiguate padding.  This allows trailing bits as well as bytes
>   to be considered padding.

Could you specify compliance with the requirement:
  "The size of a compressed payload MUST be in whole octet units."

<snip>

>4. Security Considerations
>
>   IP payload compression potentially reduces the security of the
>   Internet, similar to the effects of IP encapsulation [RFC-2003].  For
>   example, IPComp makes it difficult for border routers to filter
>   datagrams based on header fields.  In particular, the original value
>   of the Protocol field in the IP header is not located in its normal
>   positions within the datagram, and any transport-layer header fields
>   within the datagram, such as port numbers, are neither located in
>   their normal positions within the datagram nor presented in their
>   original values after compression.  A filtering border router can
>   filter the datagram only if it shares the IPComp Association used for
>   the compression.  To allow this sort of compression in environments in
>   which all packets need to be filtered (or at least accounted for), a
>   mechanism must be in place for the receiving node to securely
>   communicate the IPComp Association to the border router.  This might,
>   more rarely, also apply to the IPComp Association used for outgoing
>   datagrams.
>
>   When IPComp is used in the context of IPSec, it is not believed to
>   have an effect on the underlying security functionality provide by
>   the IPSec protocol; i.e., the use of compression is not known to
>   degrade or alter the nature of the underlying security architecture
>   or the encryption technologies used to implement it.

Do you see the duplication of the "Security Considerations" from
<draft-ietf-ippcp-protocol-01.txt> necessary?
 
>5. References

Are you sure all the references are required?

=== end of comments ===