Re: [quicwg/base-drafts] Clarify path validation and connection migration (#4102)

Jana Iyengar <notifications@github.com> Tue, 22 September 2020 22:02 UTC

Return-Path: <noreply@github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D537E3A1A28 for <quic-issues@ietfa.amsl.com>; Tue, 22 Sep 2020 15:02:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.795
X-Spam-Level:
X-Spam-Status: No, score=-4.795 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.695, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4jWX7tXak8Gd for <quic-issues@ietfa.amsl.com>; Tue, 22 Sep 2020 15:02:16 -0700 (PDT)
Received: from out-23.smtp.github.com (out-23.smtp.github.com [192.30.252.206]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF9053A1A27 for <quic-issues@ietf.org>; Tue, 22 Sep 2020 15:02:15 -0700 (PDT)
Received: from github-lowworker-292e294.va3-iad.github.net (github-lowworker-292e294.va3-iad.github.net [10.48.102.70]) by smtp.github.com (Postfix) with ESMTP id 22D8B600069 for <quic-issues@ietf.org>; Tue, 22 Sep 2020 15:02:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1600812135; bh=wjOZMcEUSZGzQVecF6g+dq5UFuE1Yhbcv+ICSpS3dc8=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=PiZgf1dBAcwk9dZDXnvY+bSKruM/MVEhV/9VRTODPAZ8Q7rTXqbTiuv3mB1BEb19W eU4D5YMJmDSgsxHCbVJit8kdBaBFZfqacGLHzUwbSS+X5SOtJyw1sWqUHNvxfbre8z ndArURnWJ+TyLMme4/OKZHPW1y6uRU1dWOpkOpSs=
Date: Tue, 22 Sep 2020 15:02:15 -0700
From: Jana Iyengar <notifications@github.com>
Reply-To: quicwg/base-drafts <reply+AFTOJKY7SC54PVW6LG7F7XV5OZKWPEVBNHHCTXOHHI@reply.github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <quicwg/base-drafts/pull/4102/review/493873573@github.com>
In-Reply-To: <quicwg/base-drafts/pull/4102@github.com>
References: <quicwg/base-drafts/pull/4102@github.com>
Subject: Re: [quicwg/base-drafts] Clarify path validation and connection migration (#4102)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5f6a746713930_7e1319f0692dd"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: janaiyengar
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/syla4MoP9wTLD6k4yzb58cxUA4g>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Sep 2020 22:02:18 -0000

@janaiyengar commented on this pull request.

A few comments, but pretty close.

>  
 Path validation tests that packets sent on a path to a peer are
 received by that peer. Path validation is used to ensure that packets received
 from a migrating peer do not carry a spoofed source address.
 
 Path validation does not validate that a peer can send in the return direction.
-The peer performs independent validation of the return path.
+Acknowledgments cannot be used for path validation as they contain insufficient

```suggestion
Acknowledgments cannot be used for return path validation as they contain insufficient
```

> @@ -2152,35 +2155,44 @@ receive packets without first having sent a packet on that path. Effective NAT
 traversal needs additional synchronization mechanisms that are not provided
 here.
 
-An endpoint MAY include PATH_CHALLENGE and PATH_RESPONSE frames that are used
-for path validation with other frames.  In particular, an endpoint can pad a
-packet carrying a PATH_CHALLENGE for Path Maximum Transfer Unit (PMTU)
-discovery (see {{pmtud}}), or an endpoint can include a PATH_RESPONSE with its
-own PATH_CHALLENGE.
+An endpoint MAY include other frames with the PATH_CHALLENGE and PATH_RESPONSE
+frames used for path validation.  In particular, an endpoint can include
+PADDING with a PATH_CHALLENGE for Path Maximum Transfer Unit (PMTU) discovery

```suggestion
PADDING frames with a PATH_CHALLENGE frame for Path Maximum Transfer Unit (PMTU) discovery
```

> +(see {{pmtud}}); it can also include a PATH_CHALLENGE with its own
+PATH_RESPONSE.

```suggestion
(see {{pmtud}}); it can also include a PATH_CHALLENGE frame with its own
PATH_RESPONSE frame.
```

> +An endpoint uses a new connection ID for probes sent from a new local address
+(See {{migration-linkability}}).  So when probing a new path, an endpoint

```suggestion
An endpoint uses a new connection ID for probes sent from a new local address;
see {{migration-linkability}}.  When probing a new path, an endpoint
```

>  
+An endpoint can choose to simultaneously probe multiple paths. The number
+of simultaneous paths used for probes is limited by the number of extra
+Connection IDs its peer has previously supplied, since each new local address

```suggestion
connection IDs its peer has previously supplied, since each new local address
```

>  
+An endpoint can choose to simultaneously probe multiple paths. The number
+of simultaneous paths used for probes is limited by the number of extra
+Connection IDs its peer has previously supplied, since each new local address
+used for a probe requires a previously unused Connection ID.

```suggestion
used for a probe requires a previously unused connection ID.
```

>  
 To initiate path validation, an endpoint sends a PATH_CHALLENGE frame
 containing an unpredictable payload on the path to be validated.
 
 An endpoint MAY send multiple PATH_CHALLENGE frames to guard against packet
 loss. However, an endpoint SHOULD NOT send multiple PATH_CHALLENGE frames in a
-single packet.  An endpoint SHOULD NOT send a PATH_CHALLENGE more frequently
-than it would an Initial packet, ensuring that connection migration is no more
-load on a new path than establishing a new connection.
+single packet.
+
+An endpoint SHOULD NOT probe a new path with packets containing a
+PATH_CHALLENGE more frequently than it would send an Initial packet. This

```suggestion
PATH_CHALLENGE frame more frequently than it would send an Initial packet. This
```

>  
 To initiate path validation, an endpoint sends a PATH_CHALLENGE frame
 containing an unpredictable payload on the path to be validated.
 
 An endpoint MAY send multiple PATH_CHALLENGE frames to guard against packet
 loss. However, an endpoint SHOULD NOT send multiple PATH_CHALLENGE frames in a
-single packet.  An endpoint SHOULD NOT send a PATH_CHALLENGE more frequently
-than it would an Initial packet, ensuring that connection migration is no more
-load on a new path than establishing a new connection.
+single packet.
+
+An endpoint SHOULD NOT probe a new path with packets containing a
+PATH_CHALLENGE more frequently than it would send an Initial packet. This
+ensures connection migration is no more load on a new path than establishing a

```suggestion
ensures that connection migration is no more load on a new path than establishing a
```

>  to the new peer address and MUST initiate path validation ({{migrate-validate}})
-to verify the peer's ownership of the unvalidated address.
+to verify the peer's ownership of the address if it has not already.

```suggestion
to verify the peer's ownership of the address if validation is not already underway.
```

> -An endpoint uses a new connection ID for probes sent from a new local address;
-see {{migration-linkability}} for further discussion. An endpoint that uses
-a new local address needs to ensure that at least one new connection ID is
-available at the peer. That can be achieved by including a NEW_CONNECTION_ID
-frame in the probe.

Removing this is fine now I think.

> @@ -2314,33 +2320,31 @@ Therefore, a migrating endpoint can send to its peer knowing that the peer is
 willing to receive at the peer's current address. Thus an endpoint can migrate
 to a new local address without first validating the peer's address.
 
+To establish reachability on the new path, an endpoint initiates path
+validation ({{migrate-validate}}) on the new path.  An endpoint MAY defer path
+validation until after a peer sends the next non-probing frame to its new
+address.

This is fine, it's just moving text around.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/quicwg/base-drafts/pull/4102#pullrequestreview-493873573