Re: [Spud] [tsvwg] New Version Notification for draft-touch-tsvwg-udp-options-01.txt
Joe Touch <touch@isi.edu> Tue, 03 November 2015 01:50 UTC
Return-Path: <touch@isi.edu>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id BA2FA1B2B9E;
Mon, 2 Nov 2015 17:50:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level:
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01]
autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id SA-nTzLJdQjX; Mon, 2 Nov 2015 17:50:04 -0800 (PST)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161])
(using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 4644F1B2BA6;
Mon, 2 Nov 2015 17:50:04 -0800 (PST)
Received: from [192.168.1.28] (cpe-172-250-225-10.socal.res.rr.com
[172.250.225.10]) (authenticated bits=0)
by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id tA31mt4J004493
(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
Mon, 2 Nov 2015 17:48:56 -0800 (PST)
Content-Type: text/plain;
charset=us-ascii
Mime-Version: 1.0 (1.0)
From: Joe Touch <touch@isi.edu>
X-Mailer: iPhone Mail (13B143)
In-Reply-To: <CALx6S36JfJu-Sc-z0obP5Ku1TzTWfrQAYv3OMppfdFptG54Kog@mail.gmail.com>
Date: Mon, 2 Nov 2015 17:48:55 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <2C92D0E0-7269-4B53-9AA8-DB999597BBEA@isi.edu>
References: <CACL_3VF5i7FvMR53R8JwRQAW--QJz3a+T9c_Pnwqt9D-baAJ-w@mail.gmail.com>
<5636FD40.4030101@bobbriscoe.net>
<CALx6S36vY+E-JN7eU5hwur-W2KzYfavhYSyPbcAwZec1pA0b6w@mail.gmail.com>
<56378116.2050709@isi.edu>
<CALx6S36JfJu-Sc-z0obP5Ku1TzTWfrQAYv3OMppfdFptG54Kog@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/V8GLY3_wpyXP8eLiyMlJfrpRmxI>
Cc: Bob Briscoe <ietf@bobbriscoe.net>, tsvwg <tsvwg@ietf.org>,
spud <spud@ietf.org>
Subject: Re: [Spud] [tsvwg] New Version Notification for
draft-touch-tsvwg-udp-options-01.txt
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>,
<mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>,
<mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Nov 2015 01:50:11 -0000
On Nov 2, 2015, at 5:15 PM, Tom Herbert <tom@herbertland.com> wrote: >> We need to live without broken offloads because offloads are part of the >> protocol stack. They can't simply jump in and try to help without being >> very careful about corner cases like this. >> >> E.g., we've already seen an offload that merges TCP packets with >> different options, which ought to be clearly inappropriate. > Checksum offload conforms to the requirements for host checksum field > processing and Length field handling in RFC768 and RFC1122-- if this > change maintains those requirements then there is no issue. > > It is not clear from the draft what the effect on checksum processing > will be. My questions are: > > 1) What is the UDP payload length for number of bytes to checksum over? The udp payload indicated by the udp length field, and the usual IP pseudoheader. > 2) What value is in the UDP length field when the checksum is performed? The length before the trailer. > 3) What is the on-the-wire value of the UDP length field? Same as #2 above. > > If the use of UDP options is treated as a "truncation" of the UDP > payload before the checksum calculation is performed It is. > then the answers > to the above questions are the same and there is no incompatibility. > The option bytes would not be covered by the UDP checksum however. Correct. A separate "trailer checksum" would be required to protect the trailer. Joe > > Thanks, > Tom
- [Spud] Fwd: New Version Notification for draft-to… Joe Touch
- Re: [Spud] Fwd: New Version Notification for draf… Christian Huitema
- Re: [Spud] Fwd: New Version Notification for draf… Christian Huitema
- Re: [Spud] [tsvwg] New Version Notification for d… Brian Trammell
- Re: [Spud] [tsvwg] New Version Notification for d… Gorry Fairhurst
- Re: [Spud] [tsvwg] New Version Notification for d… Joe Touch
- Re: [Spud] [tsvwg] New Version Notification for d… Joe Touch
- Re: [Spud] New Version Notification for draft-tou… C. M. Heard
- Re: [Spud] [tsvwg] New Version Notification for d… Bob Briscoe
- Re: [Spud] [tsvwg] New Version Notification for d… Tom Herbert
- Re: [Spud] [tsvwg] New Version Notification for d… Jana Iyengar
- Re: [Spud] [tsvwg] New Version Notification for d… Derek Fawcus
- Re: [Spud] [tsvwg] New Version Notification for d… Joe Touch
- Re: [Spud] [tsvwg] New Version Notification for d… Joe Touch
- Re: [Spud] [tsvwg] New Version Notification for d… Joe Touch
- Re: [Spud] [tsvwg] New Version Notification for d… gorry
- Re: [Spud] [tsvwg] New Version Notification for d… Bob Briscoe
- Re: [Spud] [tsvwg] New Version Notification for d… Joe Touch
- Re: [Spud] [tsvwg] New Version Notification for d… Joe Touch
- Re: [Spud] [tsvwg] New Version Notification for d… Tom Herbert
- Re: [Spud] [tsvwg] New Version Notification for d… Joe Touch
- Re: [Spud] [tsvwg] New Version Notification for d… Tom Herbert
- Re: [Spud] [tsvwg] New Version Notification for d… Joe Touch