Re: [tae] New draft: announcing the supported transports via DNS

Andrew Yourtchenko <ayourtch@cisco.com> Thu, 01 October 2009 12:34 UTC

Return-Path: <ayourtch@cisco.com>
X-Original-To: tae@core3.amsl.com
Delivered-To: tae@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DDA783A6A79 for <tae@core3.amsl.com>; Thu, 1 Oct 2009 05:34:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.435
X-Spam-Level:
X-Spam-Status: No, score=-2.435 tagged_above=-999 required=5 tests=[AWL=0.164, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 94nxAv2Whiy6 for <tae@core3.amsl.com>; Thu, 1 Oct 2009 05:34:17 -0700 (PDT)
Received: from av-tac-bru.cisco.com (weird-brew.cisco.com [144.254.15.118]) by core3.amsl.com (Postfix) with ESMTP id CE4D428C161 for <tae@ietf.org>; Thu, 1 Oct 2009 05:29:52 -0700 (PDT)
X-TACSUNS: Virus Scanned
Received: from strange-brew.cisco.com (localhost.cisco.com [127.0.0.1]) by av-tac-bru.cisco.com (8.13.8+Sun/8.13.8) with ESMTP id n91CVGE9006774; Thu, 1 Oct 2009 14:31:16 +0200 (CEST)
Received: from kk-son (dhcp-peg3-vl30-144-254-7-191.cisco.com [144.254.7.191]) by strange-brew.cisco.com (8.13.8+Sun/8.13.8) with ESMTP id n91CVEqs001390; Thu, 1 Oct 2009 14:31:15 +0200 (CEST)
Date: Thu, 01 Oct 2009 14:31:32 +0200
From: Andrew Yourtchenko <ayourtch@cisco.com>
X-X-Sender: ayourtch@zippy.stdio.be
To: Michael Welzl <michawe@ifi.uio.no>
In-Reply-To: <4AB5DCE4.4070008@ifi.uio.no>
Message-ID: <Pine.LNX.4.64.0910011418400.5047@zippy.stdio.be>
References: <Pine.LNX.4.64.0909180057060.5479@zippy.stdio.be> <77F0974F-62CD-411C-96D3-C29E6D872DEA@asomi.com> <4AB2E6AB.7020409@gmail.com><4AB3A33B.7080909@ifi.uio.no> <4AB3A5DE.1040708@isi.edu> <055001ca388b$163a0070$5da36b80@cisco.com> <4AB3CF61.5060208@isi.edu> <057601ca388e$d775e620$5da36b80@cisco.com> <4AB3D3ED.5010002@isi.edu> <058401ca3891$8b0e3d20$5da36b80@cisco.com> <4AB3D84E.3090408@isi.edu> <058b01ca3893$36cad190$5da36b80@cisco.com> <A202B88E-6EC9-4727-A6DD-187B4AB6A307@asomi.com> <4AB5DCE4.4070008@ifi.uio.no>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
Cc: tae@ietf.org
Subject: Re: [tae] New draft: announcing the supported transports via DNS
X-BeenThere: tae@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: ayourtch@cisco.com
List-Id: Transport Architecture Evolution <tae.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tae>, <mailto:tae-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tae>
List-Post: <mailto:tae@ietf.org>
List-Help: <mailto:tae-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tae>, <mailto:tae-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Oct 2009 12:34:19 -0000

my 2 cents based also on reading of the exchange between Bryan, Dan and 
Caitlin inline:

On Sun, 20 Sep 2009, Michael Welzl wrote:

>
>>  I think the following objectives need to be met for any probe-based
>>  solution:
>>
>>  1) Must add no additional messages when the default protocol is selected.

There are at least two possible scenarios I'd see:

a) default protocol is "selected" in case the peer simply does not have 
the support for the transport selection
b) the default protocol is "selected" after the fact because the more 
advanced protocol that was negotiated does not succeed.

and a worst case to consider is where the piggybacking on the existing 
"default" protocol breaks it - so there needs to be a fallback scenario 
for that case.

(a) is quite possible.
(b) very much not sure if possible.

>>  2) TCP must be a valid default protocol.
>>  3) There may be a case for adding UDP to that set for RTTP.

I'd phrase it something like: "There should always exist a valid 
fallback/default protocol that is defined on a per-application basis 
under the assumption that the transport selected is not implemented on 
the other endpoint".

>>  4) It should be capable of learning when a given client/server pair is
>>  blocked
>>      from using Transport X by some middle-box. Note: this is something a
>>      directory-based solution probably cannot do.,

+1. And the directory-based solution alone indeed can not do it. However, 
learning about the protocol being blocked, implies extra messages followed 
by a fallback to the "default" - the case of (1b) above.

I think it could be useful for first explicitly splitting the functions 
of "discovery" and "selection", and then seeing how they can be combined, 
if - a form of refactoring.

Having them originally split allows to focus on smaller chunks at a time, 
IMHO. When those chunks are well understood, it is easier to compose them.

thanks,
andrew