Re: [Spud] [tsvwg] New Version Notification for draft-touch-tsvwg-udp-options-01.txt

gorry@erg.abdn.ac.uk Mon, 02 November 2015 16:17 UTC

Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98E471B491C; Mon, 2 Nov 2015 08:17:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ffi1GgE4AtUK; Mon, 2 Nov 2015 08:17:47 -0800 (PST)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk [139.133.204.173]) by ietfa.amsl.com (Postfix) with ESMTP id EA9C41B4918; Mon, 2 Nov 2015 08:17:46 -0800 (PST)
Received: from erg.abdn.ac.uk (galactica.erg.abdn.ac.uk [139.133.210.32]) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPA id E73B41B00351; Mon, 2 Nov 2015 16:24:57 +0000 (GMT)
Received: from 212.159.18.54 (SquirrelMail authenticated user gorry) by erg.abdn.ac.uk with HTTP; Mon, 2 Nov 2015 16:17:45 -0000
Message-ID: <2f12e2f48b58ff27ead9c4f390043421.squirrel@erg.abdn.ac.uk>
In-Reply-To: <56378116.2050709@isi.edu>
References: <CACL_3VF5i7FvMR53R8JwRQAW--QJz3a+T9c_Pnwqt9D-baAJ-w@mail.gmail.com> <5636FD40.4030101@bobbriscoe.net> <CALx6S36vY+E-JN7eU5hwur-W2KzYfavhYSyPbcAwZec1pA0b6w@mail.gmail.com> <56378116.2050709@isi.edu>
Date: Mon, 2 Nov 2015 16:17:45 -0000
From: gorry@erg.abdn.ac.uk
To: "Joe Touch" <touch@isi.edu>
User-Agent: SquirrelMail/1.4.23 [SVN]
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/QN2jMCG-sJcfNnloCTI4J4FiIlk>
Cc: Tom Herbert <tom@herbertland.com>, touch@isi.edu, Bob Briscoe <ietf@bobbriscoe.net>, tsvwg <tsvwg@ietf.org>, spud <spud@ietf.org>
Subject: Re: [Spud] [tsvwg] New Version Notification for draft-touch-tsvwg-udp-options-01.txt
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Nov 2015 16:17:48 -0000

Sorry I wasn't at the meeting yesterday in Japan

- Block packets (perhaps firewalls, for instance), but also truncate
(which may be more common on devices doing incremental checksum update).
- I expect the default behaviour is either to copy UDP-L; which means you
lose the options (i.e., truncate - sad but not disaster) or IP-L; which
means you get all (the same as UDP-Lite).

Gorry
>
> On 11/1/2015 10:43 PM, Tom Herbert wrote:
>> On Mon, Nov 2, 2015 at 3:05 PM, Bob Briscoe <ietf@bobbriscoe.net> wrote:
>>> Joe,
>>>
>>> Before starting measurements, I would recommend searching the Web for
>>> the manuals of middleboxes that might block such packets.
>>>
>> Please look at NIC offloads also. I am pretty certain that the most
>> common flavor of checksum offload will break in this proposal since
>> devices use the value in the UDP length field as the length of the
>> payload to compute the checksum over.
>
> That is the intended behavior.
>
>> UDP Fragmentation Offload would
>> similarly be broken, although we can probably live without that (but
>> we can't live without checksum offload!).
>
> We need to live without broken offloads because offloads are part of the
> protocol stack. They can't simply jump in and try to help without being
> very careful about corner cases like this.
>
> E.g., we've already seen an offload that merges TCP packets with
> different options, which ought to be clearly inappropriate.
>
> Joe
>