[pcp] Comments on draft-ietf-pcp-port-set-04.txt

Dave Thaler <dthaler@microsoft.com> Tue, 25 February 2014 01:51 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 120EC1A0235 for <pcp@ietfa.amsl.com>; Mon, 24 Feb 2014 17:51:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.703
X-Spam-Level:
X-Spam-Status: No, score=-100.703 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6gaDUFvNMr3N for <pcp@ietfa.amsl.com>; Mon, 24 Feb 2014 17:51:32 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2lp0204.outbound.protection.outlook.com [207.46.163.204]) by ietfa.amsl.com (Postfix) with ESMTP id 014891A0393 for <pcp@ietf.org>; Mon, 24 Feb 2014 17:51:31 -0800 (PST)
Received: from BY2PR03MB412.namprd03.prod.outlook.com (10.141.141.25) by BY2PR03MB596.namprd03.prod.outlook.com (10.255.93.36) with Microsoft SMTP Server (TLS) id 15.0.883.10; Tue, 25 Feb 2014 01:51:23 +0000
Received: from BY2PR03MB412.namprd03.prod.outlook.com ([10.141.141.25]) by BY2PR03MB412.namprd03.prod.outlook.com ([10.141.141.25]) with mapi id 15.00.0883.010; Tue, 25 Feb 2014 01:51:23 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: Simon Perreault <simon.perreault@viagenie.ca>, "pcp@ietf.org" <pcp@ietf.org>
Thread-Topic: Comments on draft-ietf-pcp-port-set-04.txt
Thread-Index: Ac8xy+Mq/8nkmFJKT/e9FgA8BKMzaA==
Date: Tue, 25 Feb 2014 01:51:12 +0000
Message-ID: <8c6c79ff7a7a4886bca7e9b5e2ed4bce@BY2PR03MB412.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [2001:4898:80e0:ed43::2]
x-forefront-prvs: 01334458E5
x-forefront-antispam-report: SFV:NSPM; SFS:(10009001)(6009001)(189002)(199002)(51704005)(24454002)(377424004)(74366001)(74316001)(93136001)(76786001)(76796001)(76576001)(76176001)(74876001)(74706001)(86362001)(81542001)(81342001)(93516002)(94946001)(94316002)(92566001)(80022001)(95416001)(86612001)(69226001)(33646001)(85306002)(87936001)(2656002)(87266001)(81816001)(80976001)(83322001)(85852003)(56816005)(90146001)(81686001)(79102001)(83072002)(47446002)(63696002)(4396001)(54356001)(76482001)(77982001)(59766001)(53806001)(54316002)(56776001)(51856001)(65816001)(46102001)(74502001)(50986001)(47976001)(49866001)(31966008)(74662001)(47736001)(24736002)(3826001); DIR:OUT; SFP:1101; SCL:1; SRVR:BY2PR03MB596; H:BY2PR03MB412.namprd03.prod.outlook.com; CLIP:2001:4898:80e0:ed43::2; FPR:EE21D0D5.9AC253D5.F0D2317B.5EE4D141.20692; MLV:sfv; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
Content-Type: text/plain; charset="windows-1257"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
Archived-At: http://mailarchive.ietf.org/arch/msg/pcp/Wuqf3VelAAe59MtjyH4rIsQrkRA
Subject: [pcp] Comments on draft-ietf-pcp-port-set-04.txt
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp/>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2014 01:51:35 -0000

Reviewing -04 and comparing it with the thread below... see inline.

Simon Perreault wrote:
> Thanks a lot for the review! I'll be sure to incorporate your comments into a
> new revision shortly after the gates reopen.
> 
> Le 2013-10-30 18:33, Dave Thaler a écrit :
> > 1) The claim that a port set makes code simpler needs an explanation to
> justify it.
> > E.g., if an app really needs 16 ports, and it fails to get 16 back in
> > its first request, it still has to handle that and say make multiple separate
> requests.
> 
> Two observations:
> 
> - Wouldn't that behaviour be a tiny bit evil? It reminds me of applications that
> create multiple flows in an attempt to trick an SFQ-based QoS into allocating
> them more bandwidth.
> 
> - Often, apps that ask for N ports don't really need N ports. Ideally they
> would like to get N ports, but they can live with <N ports. No need for single-
> port fallback in that case.
> 
> > So if it already has to have
> > code to deal with multiple separate requests, why is it simpler to add
> > port set functionality to and implement both?  This seems counter-intuitive
> to a reader.
> 
> That would only apply to apps that absolutely need N ports to function, and
> don't need them to be contiguous. Those apps need to fall back on single-
> port requests as you describe. But I would argue that these apps are really
> quite rare.
> 
> We can add text describing these concerns in the next revision.

Sure, but the claim in section 2 is that the client side logic *is* simpler.
Not "often" simpler, or "may be simpler".   You can’t assert this when 
sections 6.4 and 6.3 both leave some major questions up to the 
implementation.  So it might be more complicated not simpler.  Suggest 
just deleting the "Client-side simplicity" bullet.

The text added in section 6.4 looks fine to me, except for one editorial
suggestion on this text:
> Suppose a PCP client asks for 16 ports and receives 8.  What should
>   it do?  Should it consider this a final answer?  Should it try a
>   second request, asking for 8 more ports?  Should it fall back to 8
>   individual MAP requests?  This document does not try to answer those
>   questions , but describes issues to be considered when doing so.

Suggest changing last sentence to
"This document leaves the answers to be implementation-specific,
but describes issues to be considered when answering them."

That is, it answers them by saying it's implementation-specific.


> > 2) Text on overlapping ranges needs more detail.  Is it legal for a
> > client to send requests for overlapping ranges in parallel or not?  I
> > ask because this was an attack vector for IP reassembly so can imagine
> > we need the precision here to avoid similar attacks.  This might have an
> impact on the Security Considerations section.
> 
> Hmmm... interesting. I see now that those requests would not be
> idempotent, contrary to single-port MAP requests. The first one to be
> processed by the server would "win". Responses to each request would
> depend on which one has won.
> 
> I don't see an attack here, but the lack of idempotence bugs me. I don't quite
> know what action to take here except describe the situation in the next
> revision.

Yes, Section 6.3 now looks fine to me, except for a typo:
> which port set mapping requests would be arbitrated,  Alternatively,

Change first comma to period.

> > 3) The unstated assumption in section 5.3 seems to be that the client
> > can reuse the same mapping nonce in all independent requests that it
> wants to refresh as a block, is that right?
> 
> Right.
> 
> > Let's say internal port 100 and 110 both have the same mapping nonce,
> > and internal port 105 has a different mapping nonce (e.g., from a different
> PCP client on the same host).
> > If the first PCP client sends a refresh for port 100, Port Set Size =
> > 11, what would the effect be at the PCP server?
> 
> Assuming the request nonce matches the nonce of the mapping at port 100,
> then:
> 
> - The mapping at port 100 would be refreshed.
> 
> - The mapping at port 110 would not be refreshed, but its remaining lifetime
> would be returned by the server, as described in draft-cheshire-pcp-unsupp-
> family. The response's nonce would be copied from the request's nonce.
> 
> If you agree that this is how it should be, I'll add this to the example section.
> However, that would depend on keeping the normative reference to
> unsupp-family (see point 5 below).

We agreed to not have a normative reference to unsupp-family, but I don't
want this to get lost.  Was any change to the port-set document made?
Should there be an example in the unsupp-family draft, or what?


> > 4) Section 4.1 says if the response does not include a PORT_SET, in a
> > response it assumes the server doesn't support it, and sends individual
> MAP requests for the rest of the ports it needs.
> > But section 4.2 says if the server does support PORT_SET but can only
> > return 1 in its first response, It must omit the PORT_SET option.  I think
> that's wrong since it will confuse the client as noted above.
> > If it's included with a Port Set Size of 1, the client knows it can
> > keep trying using PORT_SET for subsequent blocks, which might get more
> than 1 port in each response.
> 
> Agreed. I'll modify the draft accordingly unless others disagree.

I expected the draft to be modified accordingly as I didn't see any disagreement
on the list or in the meeting notes (let me know if I missed something).
However a different change was made to the draft which I think isn't as good.

Specifically, per the "Agreed" above, I expected it to say the server will
return a port set option with size of 1, and the client then knows the server
supports port-sets and can choose to ask for another port-set if it wants.
And if the response has no port-set option, then it knows the server doesn't
support it and can send other requests accordingly.

Instead, -04 changed to keep the statement:
>   If the PCP server ends up mapping only a single port, for any reason,
>   the PORT_SET option MUST NOT be present in the response.

And instead added this text:
> If no PORT_SET option is present in the response, the PCP client
>   cannot conclude that the PCP server does not support the PORT_SET
>   option.  It may just be that the PCP server does support PORT_SET but
>   decided to allocate only a single port, for reasons that are its own.
>   If the client wishes to obtain more ports, it MAY send additional MAP
>   requests (see Section 6.4),

I didn't see it explained why this is better than what I thought we agreed
to on the list.

 
> > 5) If we want this to go to RFC soon, we need to remove normative
> > references to non-RFCs (and this is easy, I suggested text), but I
> > think we should also remove informative references to individual
> > drafts (i.e., drafts that aren't currently WG drafts in any WG), and instead
> only reference in the reverse direction; those other drafts should reference
> this one instead of the other way around.
> 
> AFAIK, informative references don't prevent publishing as an RFC. So I'll
> focus on normative references.
> 
> I'll remove the reference to draft-boucadair-pcp-failure unless others
> disagree.
> 
> About draft-cheshire-pcp-unsupp-family: we could remove the reference
> and let the document stand on its own. The new example showing the effect
> of nonce checking multiple mappings with differing nonces would be added
> to draft-cheshire.
> 
> As an aside: the example in section "5.2 Stateless Mapping Discovery" is not
> specific to draft-tsou-stateless-nat44. It is intended to illustrate how
> discovery is done generically without the client knowing the kind of stateless
> NAT it is speaking to. In fact, if the NAT in that example had been one
> implementing draft-tsou, the numbers would have been different.
> Therefore I suggest keeping the example.

I'm fine with that part, thanks.

-Dave