Re: [Softwires] Checksum neutrality and L4-protocol independence

Rémi Després <despres.remi@laposte.net> Tue, 14 February 2012 15:53 UTC

Return-Path: <despres.remi@laposte.net>
X-Original-To: softwires@ietfa.amsl.com
Delivered-To: softwires@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 767E921F8780 for <softwires@ietfa.amsl.com>; Tue, 14 Feb 2012 07:53:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.708
X-Spam-Level:
X-Spam-Status: No, score=-1.708 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_41=0.6, MIME_8BIT_HEADER=0.3]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K7ys+gXUx9Sw for <softwires@ietfa.amsl.com>; Tue, 14 Feb 2012 07:53:30 -0800 (PST)
Received: from smtpout.laposte.net (smtpout3.laposte.net [193.253.67.228]) by ietfa.amsl.com (Postfix) with ESMTP id 0154221F85E7 for <softwires@ietf.org>; Tue, 14 Feb 2012 07:53:29 -0800 (PST)
Received: from [192.168.0.21] ([88.166.221.144]) by mwinf8505-out with ME id ZrtS1i00737Y3f403rtSRQ; Tue, 14 Feb 2012 16:53:27 +0100
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary="Apple-Mail-13-887771346"
From: Rémi Després <despres.remi@laposte.net>
In-Reply-To: <CAFUBMqVygJv4k_zHsyccL-W3x_=tcaWe61_BoHheyN6p-FH5rA@mail.gmail.com>
Date: Tue, 14 Feb 2012 16:53:25 +0100
Message-Id: <8D2093C7-EC77-4CBA-9E4B-E4BEB3F74A26@laposte.net>
References: <B140D6B2-1B19-43D7-9B63-6BEA83CEB164@juniper.net> <3AAD65F3-5169-49B7-9698-E820EF419B35@employees.org> <53ACB4FC-988F-443C-A936-1CA5B13180EB@free.fr> <C694D7DC-2F98-434F-8123-751E2C1A98D0@employees.org> <081C7074-F5E2-46B7-B2C8-E033F3E5BC15@laposte.net> <B94D39A0-CA66-4AE6-BDC5-E4DFA2D47BEC@employees.org> <A8A6FDA2-0FFC-44D2-BEDF-29FB012D3113@laposte.net> <4749FAFA-A522-4795-9B8A-9AA4B030E075@employees.org> <C38B2AD1-08F1-4ECD-8ADB-AE88BC34A0B9@laposte.net> <CAFUBMqW+RrHKYJbgLBSbm3RebQWcr6oMZRcCwbv3_QR13MLV1Q@mail.gmail.com> <9FD6B92C-9B42-4A30-9FF5-30A86F845E72@laposte.net> <CAFUBMqVygJv4k_zHsyccL-W3x_=tcaWe61_BoHheyN6p-FH5rA@mail.gmail.com>
To: Maoke <fibrib@gmail.com>
X-Mailer: Apple Mail (2.1084)
Cc: Softwires WG <softwires@ietf.org>
Subject: Re: [Softwires] Checksum neutrality and L4-protocol independence
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/softwires>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Feb 2012 15:53:31 -0000

Le 2012-02-14 à 16:21, Maoke a écrit :

> 
> 
> 2012/2/14 Rémi Després despres.remi@laposte.net
>  
>> 2) in the environment where single translation is also envolved (either stateless or stateful), L4 checksum rewriting is a MUST because sometimes there is only one address of the (src, dst)-pair following the checksum-neutral address scheme. (this is mentioned in RFC6052, giving up to enforce the checksum-neutrality in the address format, to my knowledge).
> 
> I have aways acknowledged that L4 update is necessary for single translation, no disagreement.
> But here the problem is stateless IPv4 service across IPv6, a different problem where there is no such necessity.
>  
>  
> RFC6052 includes also the double-translation case. i guess operators wouldn't like to deploy different translators here for single translation while there for double.
>  
>  
> The point is that, where it can be used, checksum neutrality is MORE GENERAL than L4 update.
>  
>  
> how do you define the "generality"? doing L4 update is a safe choice no matter if the addresses are checksum-neutral or not.
>  
>  
> Besides, but less important, it is simpler as far as the number of specifications it depends on is concerned (no need to know where checksum fields are for different protocols).
>  
>  
>> i understand Ole has the same opinion: as we anyway have it,
> 
> There can be implementations of BRs that are independent of single translation.
> They don't need to know where checksums are placed in various protocols.
>  
> 
>> we don't need it in the address scheme standard
> 
> One can live with a standard less good than it could be but, since we are working for the future, let's make them as good as we can now.
> In any case, this is no excuse to claim that, with checksum neutrality the following is not correct "BRs need no change for any new protocol having ports at their usual place and TCP-like checksum" (DCCP, SCTP if it would acce^t TCP-like checksum, any other.)
>  
> 
>  
> i think making L4 checksum update is a safe choice for standard. once we have a new L4 protocol,
> the BR surely need a change to check if this new protocol is a TCP-checksumed one.

1. A key, that probably hasn't been clarified enough so far (thanks for in fact raising it), is the following:
- With checksum neutrality, the BR DOESN'T NEED to know about UDP, TCP etc. (see R-22 (3) of the 4rd-U draft).

If, by mistake a remote host sends to a shared IPv4 address a packet whose L4 payload has no ports at their usual places, the packet, if it reaches a CE, will ALWAYS be  discarded there (protocol unknown by the NAT44) => no operational problem. 

This is one more instance where it isn't useful to try and guess what mistakes people might make, and to add specific software for them while tools already exist to detect and signal them. (Keep it simple)

OK?


> at least the BR's code should include the new protocol number in to the list of checksum-neutrality-compatible.

See above.

> A better BR needs also to check the packet integrity with ensuring that the checksum is correct and there a L4 activity is not avoidable.

2. A less good BR in my understanding: more processing for no appreciable gain.

>  therefore i do agree with Ole's argument.

> if i make anything incorrect, please point out.

See above.

Cheers,
RD


>  
> best,
> maoke
>> (but it could be a recommendation for the operators to enable the address-level checksum neutrality,
> 
> What remains to be seen is what is gained by not having it a MUST while we are specifying a new standard for a new problem.
> 
> Cheers,
> RD
> 
>> put in either prefix or interface id, through the address assignment, in order to help any L4 protocol when its TCP-flavor checksum rewrite happens not to be considered/implemented). 
>> 
>> cheers,
>> maoke
> 
>