Re: [quicwg/base-drafts] renamed max_packet_size to max_udp_size (#3473)

Kazuho Oku <notifications@github.com> Thu, 20 February 2020 23:49 UTC

Return-Path: <noreply@github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61FF31200F5 for <quic-issues@ietfa.amsl.com>; Thu, 20 Feb 2020 15:49:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8
X-Spam-Level:
X-Spam-Status: No, score=-8 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iDCEXMUSDzSx for <quic-issues@ietfa.amsl.com>; Thu, 20 Feb 2020 15:49:53 -0800 (PST)
Received: from out-25.smtp.github.com (out-25.smtp.github.com [192.30.252.208]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B97A8120289 for <quic-issues@ietf.org>; Thu, 20 Feb 2020 15:49:53 -0800 (PST)
Date: Thu, 20 Feb 2020 15:49:52 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1582242592; bh=10N5EFS3I9bX25axTtxgwRH1TdSZfVuDyOg5+0ji8I8=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=gBy7Rjm4XQXAVL0pRsILOLltWaFBm9dtqFIIpkJlTXQx/UW1V3CScrHO+dlzkcHXS ZfywSzkXjEUX1x3RiQzVI18Uo3R4LAlcSnGiuh6z3ekBEE9mqH9uclW591zaL7jh6F NH3rs1r4HR69tRn5YGtzC3ntU2PvNxW/WpzZUc8A=
From: Kazuho Oku <notifications@github.com>
Reply-To: quicwg/base-drafts <reply+AFTOJK6R2EQJ5A4NW4IHUSF4LRG2BEVBNHHCDZCX6I@reply.github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <quicwg/base-drafts/pull/3473/review/362317074@github.com>
In-Reply-To: <quicwg/base-drafts/pull/3473@github.com>
References: <quicwg/base-drafts/pull/3473@github.com>
Subject: Re: [quicwg/base-drafts] renamed max_packet_size to max_udp_size (#3473)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5e4f1b20cd4a9_6db53fbe632cd95c183594"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: kazuho
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/5H5NnHGJpejNYPvX6BjoX7Ev2c8>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Feb 2020 23:49:58 -0000

kazuho commented on this pull request.



>  
-: The maximum packet size parameter is an integer value that limits the size of
-  packets that the endpoint is willing to receive.  This indicates that packets
-  larger than this limit will be dropped.  The default for this parameter is the
-  maximum permitted UDP payload of 65527.  Values below 1200 are invalid.  This
-  limit only applies to protected packets ({{packet-protected}}).
+: The maximum udp size parameter is an integer value that limits the size of
+  UDP payloads that the endpoint is willing to receive.  This indicates that
+  packets larger than this limit are likely not to be processed by the receiver.

I think we need to talk about both UDP payload size and QUIC packet size, because they are different things.

I would assume that we'd all agree that an endpoint is allowed to process UDP datagrams that are larger than the advertised maximum. The endpoint cannot consider that as a protocol violation, because UDP datagrams are not authenticated.

Contrary to that, certain QUIC packets are "protected," and an endpoint _can_ report a protocol violation if it receives a protected QUIC packet that can be decrypted, but is larger than the advertised maximum. If such check needs to be done (or should not be done) is under debate in #3447.

The new text says that "packets larger than this limit are likely not to be processed."

I'd interpret this as "a receiver MAY process packets larger than this limit", and therefore would consider that this PR at the moment is trying to also close #3447, by implying that "a receiver MUST NOT close the connection when it receives a QUIC packet that is greater than the advertised limit."

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/quicwg/base-drafts/pull/3473#discussion_r382324193