Re: [Spud] SPUD's open/close are unconvincing
Jana Iyengar <jri@google.com> Wed, 08 April 2015 23:46 UTC
Return-Path: <jri@google.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 14AB71B347D
for <spud@ietfa.amsl.com>; Wed, 8 Apr 2015 16:46:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.388
X-Spam-Level:
X-Spam-Status: No, score=-1.388 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001,
SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 4RG4zHqTZXmB for <spud@ietfa.amsl.com>;
Wed, 8 Apr 2015 16:46:07 -0700 (PDT)
Received: from mail-ig0-x230.google.com (mail-ig0-x230.google.com
[IPv6:2607:f8b0:4001:c05::230])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 2A1BC1B36C9
for <spud@ietf.org>; Wed, 8 Apr 2015 16:46:07 -0700 (PDT)
Received: by igblo3 with SMTP id lo3so52190687igb.0
for <spud@ietf.org>; Wed, 08 Apr 2015 16:46:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113;
h=mime-version:in-reply-to:references:date:message-id:subject:from:to
:cc:content-type;
bh=dRcc6NQT9ZNzqbx0iAZCu+GYdqchga9Zr1Bzgt/O72c=;
b=dXKmtNYqTO3N5MPtcgP3R6zbJaowU7TmntTNsAbt6LQaDLU2LanZqDpdMEhzIUgC1f
750cjzYow8vOO2mEWbducXcs1d15jEOSA3zv8ElajL3Zft5baqoKSrE12jFs0fTlRwuT
/zBlu3WdL9zugkjYPj37TRLpExF+akWUDTaWm6SM9txfii3Pa+axRRQ2h2ezAwEGVriU
IlgqD1F1ntSt4bVXYwJS8qClX/1sDRm+ulUI4/FZMzLPGAyZGXOARsE1vvPHOxYyg9Fm
OGQ2G74zuH79GLSHVFv/WfUEkd+Dz/TcpFwVmflYM+CDfeMpvjvvQbjzIxdR3PGwoeN4
0gaA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20130820;
h=x-gm-message-state:mime-version:in-reply-to:references:date
:message-id:subject:from:to:cc:content-type;
bh=dRcc6NQT9ZNzqbx0iAZCu+GYdqchga9Zr1Bzgt/O72c=;
b=C/bv9tmmeUKUE2bQz5PDnqHBVxzEe8Cfvcck+sYHo1b9p1MPtW9BFYDjDYQ4sLavWP
DYBqHMvVTZys8oq+TlyehkLs8wdOOC5v25oDN5vedJ308R/5jv1vq3vmfiUHvOEePQfq
nlvFVRjhPm4KM/9bkE2AV/xekPxR2DzPcvdt9TqN/cr5Lf0llUIWVSoO1clOjhHI88a4
gx1yb+Yu/Dhzf8AeFbEmJuEDOmH5KJ69olOXF5BVhCsw7gBhLWSTPrzA4kIK8x15I/W5
GUXz9QauN/XKYaMLr/Vn1/tMeTZlP8ujk+7Tb8jP8kO6AqFf1AaXvNr9r2tVdeocMy8C
W47A==
X-Gm-Message-State: ALoCoQn8C2xhEe/PNA+pLCY0dQu6kmFvAW4PYpHMMP9YQ6c8qLu4MEujvNlspJsbwPKrJxtUG/ru
MIME-Version: 1.0
X-Received: by 10.50.56.106 with SMTP id z10mr15802715igp.8.1428536766268;
Wed, 08 Apr 2015 16:46:06 -0700 (PDT)
Received: by 10.50.45.41 with HTTP; Wed, 8 Apr 2015 16:46:06 -0700 (PDT)
In-Reply-To: <874moq2rtq.fsf@alice.fifthhorseman.net>
References: <87iod631nv.fsf@alice.fifthhorseman.net>
<DM2PR0301MB06555C7D7F32A69214405D44A8FC0@DM2PR0301MB0655.namprd03.prod.outlook.com>
<20150408193920.GD24286@cisco.com>
<09D0D481-9380-42CA-94B1-895EC9E51428@cisco.com>
<874moq2rtq.fsf@alice.fifthhorseman.net>
Date: Wed, 8 Apr 2015 16:46:06 -0700
Message-ID: <CAGD1bZYN-scxAuiiRF22bYa1ReNKSvSY75v991AHRf9FfvVrCQ@mail.gmail.com>
From: Jana Iyengar <jri@google.com>
To: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Content-Type: multipart/alternative; boundary=089e0158afa680b5fa05133f2215
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/mZweBeFI8c1-AVyyXhlfc6i-TLY>
Cc: "Toerless Eckert \(eckert\)" <eckert@cisco.com>,
"Joe Hildebrand \(jhildebr\)" <jhildebr@cisco.com>,
"spud@ietf.org" <spud@ietf.org>
Subject: Re: [Spud] SPUD's open/close are unconvincing
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>,
<mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>,
<mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Apr 2015 23:46:10 -0000
Hi all, One higher-order point: This conversation seems to refer to middlebox admins as outsiders and represents them as an ossified whole. If this new architecture is to be a end-middle-end architecture, the middle needs to be represented in a technical debate about the value of new protocol machinery. I would sincerely love to see that happen. I think there's a good bit of serious architectural work that can be done here, but this requires wrangling with hard questions about trust, delegation, and placement of network functions. I fear that discussions on what exact bits to expose so that middlebox admins don't turn into fire-breathing monsters misses the larger architectural questions. It's not clear to me that we should negotiate with middlebox admins on what bits they want -- I'd like some degree of engagement on exactly why they want it. I'm not keen to see the middlebox admin's wishlist of what headers they'd like to see. I'm substantially more interested in understanding the network functions they are looking for. Chances are these are implementable without the information they think they need. If not, let's make that case -- one network function at a time -- do a cost-benefit analysis for the good of the Internet, and decide whether to expose any bits. dkg has quite nicely said many of the things I've wanted to say below; I'll re-echo these and I'll add a couple of comments inline. > Yes. In talking with enterprise firewall admins, they're comfortable > with these properties of TCP: > > > > - they're sure which interface the intent to start an association came > in on > > This is true of UDP today. +1. > > > - they're pretty sure that subsequent packets match that initial intent > > This is also true of UDP today; responses to the same 5-tuple (with > source and dest swapped) provide a "pretty sure" match. +1. > > > - they're pretty sure that if a box goes down comes back up, or a new > > box takes the old one's address listening on the same port, that the > > host will be able to reject traffic left over from an old association > > Surely this is a matter for endpoints and not for middleboxes, and > dependent on the protocol implemented by the listener? For stateless > listeners on an endpoint, they shouldn't mind seeing traffic from an old > "association" because no state is associated with it. For stateful > listeners, they can simply discard traffic that doesn't align with their > internal state. +1. > > > - they know when to clean up state > > This is untrue of either TCP or UDP today in an absolute sense. In both > cases, they must each rely on timeouts because either peer can fall > off-net for many different reasons that are beyond anyone's control +1. > > - they don't feel the need to set as aggressive timeouts as they > > currently do for UDP, which would cause apps to send lots of extra > > keep-alives > > So they're willing to permit longer timeouts for raw TCP SYNs than they > do for UDP? That sounds like a trivial state exhaustion attack waiting > to happen. If they treat an unacknowledged TCP SYN with an aggressive > timeout, but then lengthen the timeout after seeing a SYN/ACK, then > surely they can just treat an unreplied UDP 5-tuple with the aggressive > timeout, and lengthen it when they see a response? This doesn't require > any on-wire format change. +1. I'll add that it wouldn't be surprising for clients to disappear or for servers to drop TCP connections without sending a FIN or an RST, for a variety of reasons. (As it turns out, this can be energy-saving for mobile devices that don't have to wake the radio up only to receive and process a FIN! See: http://conferences.sigcomm.org/co-next/2013/program/p211.pdf.) > > From a certain perspective, it doesn't necessarily matter if we > > completely agree with them that today's implicit heuristics are not > > good enough. We have evidence that there are enough corporate > It obviously does matter if we disagree with them. We're considering a rework of the Internet's architecture -- I don't think this is what you're saying, but at what point did we decide to take their needs as absolute? "They" need to make technical arguments about their needs, if more information is to be exposed for their use. > firewall admins have similar feelings, particularly in places where > > folks that want to deploy standards-based WebRTC solutions (e.g.), > > that I believe we need to take their perceptions into account. The > > approach that SPUD currently takes is to smell enough like TCP from a > > policy perspective that we can get corporate firewall admins to allow > > the traffic by policy. > Doesn't it seem silly that we will be engaging with corporate firewall admins, but only to learn that *they think* our traffic needs to look like TCP for them to be comfortable with it? Their perceptions of TCP are most likely ossified, and quite possibly wrong -- what do we do then? (Perhaps we should run the "Underhanded TCP Contest" -- make crazy stuff happen but look like TCP on the wire :-)) TCP FastOpen and Minion both challenge prior notions of what was (incorrectly but commonly) considered TCP behavior. I would be quite disappointed if we were to enshrine this ossification in a wg, and for non-TCP protocols too! This wouldn't be evolution, this would be ossification on steroids. > In other words: these are potentially deployment requirements, not > > technical requirements. > > This argument is also unconvincing to me. It sounds like you're saying > that we cannot rely on this group of administrators to make reasonable > decisions about how to operate their equipment on the basis of the data > that they currently have, so we're going to do some unnecessary things > to the bits on the wire that will convince them to make reasonable > decisions on the basis of some other unnecessary data. > > Why should i believe that this will be the eventual outcome? A group of > administrators has already provided evidence that they're unwilling to > consider reasonable approaches with data format A; why would equivalent > data format B suggest they would do anything different? > +1. - jana
- Re: [Spud] SPUD's open/close are unconvincing Joe Hildebrand (jhildebr)
- Re: [Spud] SPUD's open/close are unconvincing Toerless Eckert
- Re: [Spud] SPUD's open/close are unconvincing Christian Huitema
- [Spud] SPUD's open/close are unconvincing Daniel Kahn Gillmor
- Re: [Spud] SPUD's open/close are unconvincing Daniel Kahn Gillmor
- Re: [Spud] SPUD's open/close are unconvincing Christian Huitema
- Re: [Spud] SPUD's open/close are unconvincing Brian Trammell
- Re: [Spud] SPUD's open/close are unconvincing Caitlin Bestler
- Re: [Spud] SPUD's open/close are unconvincing Jana Iyengar
- Re: [Spud] SPUD's open/close are unconvincing Eliot Lear
- Re: [Spud] SPUD's open/close are unconvincing Tom Herbert
- Re: [Spud] SPUD's open/close are unconvincing Toerless Eckert
- Re: [Spud] SPUD's open/close are unconvincing Tom Herbert
- Re: [Spud] SPUD's open/close are unconvincing Toerless Eckert (eckert)
- Re: [Spud] SPUD's open/close are unconvincing Toerless Eckert
- Re: [Spud] SPUD's open/close are unconvincing Roland Bless
- Re: [Spud] SPUD's open/close are unconvincing Phillip Hallam-Baker
- Re: [Spud] SPUD's open/close are unconvincing Phillip Hallam-Baker
- Re: [Spud] SPUD's open/close are unconvincing Toerless Eckert
- Re: [Spud] SPUD's open/close are unconvincing Eliot Lear
- Re: [Spud] SPUD's open/close are unconvincing Brian Trammell
- Re: [Spud] SPUD's open/close are unconvincing Toerless Eckert
- Re: [Spud] SPUD's open/close are unconvincing Toerless Eckert
- Re: [Spud] SPUD's open/close are unconvincing Tom Herbert
- Re: [Spud] SPUD's open/close are unconvincing Toerless Eckert
- Re: [Spud] SPUD's open/close are unconvincing Eliot Lear
- Re: [Spud] SPUD's open/close are unconvincing Toerless Eckert
- Re: [Spud] SPUD's open/close are unconvincing Tom Herbert
- Re: [Spud] SPUD's open/close are unconvincing Caitlin Bestler
- Re: [Spud] SPUD's open/close are unconvincing Toerless Eckert
- Re: [Spud] SPUD's open/close are unconvincing Tom Herbert
- Re: [Spud] SPUD's open/close are unconvincing Yoav Nir
- Re: [Spud] SPUD's open/close are unconvincing Jana Iyengar
- Re: [Spud] SPUD's open/close are unconvincing Jana Iyengar
- Re: [Spud] SPUD's open/close are unconvincing Daniel Kahn Gillmor
- Re: [Spud] SPUD's open/close are unconvincing Eliot Lear