Re: [Spud] Putting Network-Layer Information in the Network Layer

Joe Touch <touch@isi.edu> Mon, 20 July 2015 16:23 UTC

Return-Path: <touch@isi.edu>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 08A541A90AC for <spud@ietfa.amsl.com>; Mon, 20 Jul 2015 09:23:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level:
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ScG5xGSXciHl for <spud@ietfa.amsl.com>; Mon, 20 Jul 2015 09:23:10 -0700 (PDT)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B71C1ACD7E for <spud@ietf.org>; Mon, 20 Jul 2015 09:23:10 -0700 (PDT)
Received: from [128.9.160.211] (mul.isi.edu [128.9.160.211]) (authenticated bits=0) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id t6KGMdS7021111 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 20 Jul 2015 09:22:39 -0700 (PDT)
Message-ID: <55AD204E.5080908@isi.edu>
Date: Mon, 20 Jul 2015 09:22:38 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Brian Trammell <ietf@trammell.ch>, Tom Herbert <tom@herbertland.com>
References: <20150703151910.417.20312.idtracker@ietfa.amsl.com> <176C39DB-16F3-4E46-9A1D-22290A38FBA6@tik.ee.ethz.ch> <CALx6S37Eo6eAE4GTkAWGe+w0ZhDHyuMym7+txgjai5GRw+pgiQ@mail.gmail.com> <7158BF85-8731-40A0-9920-36D21D73D7F2@trammell.ch> <CALx6S37w1J=v48gFCH18E-3UZyfC28_d_LTuKjC5VHtXC0eu2Q@mail.gmail.com> <5A64B99E-89C5-4D5C-BFF2-C5F0C25EC35D@trammell.ch> <559D8301.2020604@isi.edu> <006C9182-7352-4086-AF18-785AEFD44979@trammell.ch> <559EB134.2090905@isi.edu> <CB3FEFD0-1FE0-49D4-A650-349218ABD00A@trammell.ch> <CALx6S37Xy1gg0O-OmkMMdxbJoQmHDS79Z9ZoU92-kAsDfUbTrQ@mail.gmail.com> <AB3E8022-C3F3-4966-9EAF-193971D26F26@trammell.ch>
In-Reply-To: <AB3E8022-C3F3-4966-9EAF-193971D26F26@trammell.ch>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/WzmWtW13jHsDxZF7CVq2d_6pdKM>
Cc: spud@ietf.org, =?windows-1252?Q?Mirja_K=FChlewind?= <mirja.kuehlewind@tik.ee.ethz.ch>, touch@isi.edu
Subject: Re: [Spud] Putting Network-Layer Information in the Network Layer
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Jul 2015 16:23:12 -0000


On 7/20/2015 4:30 AM, Brian Trammell wrote:
> 
>> On 10 Jul 2015, at 18:19, Tom Herbert <tom@herbertland.com> wrote:
>>
>>> Coming back to the layering question:
>>>
>>> It does seem to me that what we're (the we that wrote the two 
>>> documents starting this thread) trying to do is explicitly
>>> reinforce the boundary between the network layer and the
>>> transport layer, where this is defined as "things the path needs
>>> to see versus things only endpoints need to see". Asking nicely
>>> (i.e., publishing RFCs) did not work in this case: the transport
>>> ports are de facto part of the network layer now, and short of
>>> blowing the Internet up and starting over I can't see a way to
>>> get them back. So now we are left with enforcing the boundary 
>>> cryptographically, leaving some space in the "new network layer"
>>> (in this case, IP + UDP (for ports) + SPUD) for those things now
>>> commonly done within the network.
>>>
>> This "new network layer" breaks down at fragmentation.
> 
> One can argue (indeed, I do) that in-network fragmentation is
> essentially a deprecated feature of the network layer.

If you think that network devices need to see transport ports, then it
doesn't matter where the fragmentation occurs. Source fragmentation -
which is still very much a part of the network layer, and needs to be* -
causes just as much of a problem.

> The current
> version of IP doesn't support it, and AFAICT avoiding fragmentation is
> current practice in modern transport protocol design.

In-network, yes. Source, no.

>> Only the first
>> fragment carries port numbers and the embedded network layer
>> information in the payload. Other fragments will carry neither, but
>> still can carry IP options, DSCP, TTL, ECN marking, flow labels in
>> IPv6.
>>
>> An alternate possibility would be to embed IP options within UDP. So a
>> packet might look like IP-UDP-IP options-payload.
> 
> This is an intriguing possibility, if there is an advantage to reusing IP options handling code.
> 
>> This allows us to
>> use native options (say in our data center where we can control
>> things), but maybe to use embedded IP options in UDP on paths in the
>> Internet where we see options are being dropped. SFC-in-UDP
>> (https://tools.ietf.org/html/draft-kumar-sfc-nsh-udp-transport-00)
>> proposes a similar model,
> 
> It looks a lot like innerspace (http://tools.ietf.org/html/draft-briscoe-tcpm-inner-space-01), too.

Yes and no. UDP has a length field, which means it's actually possible
to use space in an IP payload that isn't part of the UDP frame without
compliant UDP implementations breaking.

That's the real issue with innerspace; it's inside the TCP payload.

Joe