Re: [Taps] How to handle Protocol stacks that are not equivalent

Tommy Pauly <tpauly@apple.com> Tue, 23 July 2019 17:51 UTC

Return-Path: <tpauly@apple.com>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE17F120700 for <taps@ietfa.amsl.com>; Tue, 23 Jul 2019 10:51:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7
X-Spam-Level:
X-Spam-Status: No, score=-7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EVVTvYChhtKh for <taps@ietfa.amsl.com>; Tue, 23 Jul 2019 10:51:55 -0700 (PDT)
Received: from ma1-aaemail-dr-lapp02.apple.com (ma1-aaemail-dr-lapp02.apple.com [17.171.2.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CFE3212070E for <taps@ietf.org>; Tue, 23 Jul 2019 10:51:54 -0700 (PDT)
Received: from pps.filterd (ma1-aaemail-dr-lapp02.apple.com [127.0.0.1]) by ma1-aaemail-dr-lapp02.apple.com (8.16.0.27/8.16.0.27) with SMTP id x6NHgFuw038821; Tue, 23 Jul 2019 10:51:51 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=sender : content-type : mime-version : subject : from : in-reply-to : date : cc : message-id : references : to; s=20180706; bh=bVSXUNfXAuYy1/JA1GvlFlV7TBoXN3h1egv26SoscOM=; b=UnwR6tpJ4h2TmIh5tCf2UzanWy/NSaCscr/YKdb/dpxyKjt7xVDZpXbsCPr5icoyhdpA eNjr8LBhs0xKIEJohsQvXysKjeUcCo24W2ZPysCOZNg2P+IIGmKaprDZp/ubuGAu9uRo eDyMuPI0okI23rLUMCjr8qLVLx/HTJw7gsVTanQy85kV7WdycvWpZexUL/BaZP8OeTsS 3CxXmdyjUEjoQsmLxuWWlDVTFdYgJiEL0F4+E9w5rliw0wf1b4XPB7W44phoBr0jYGZ/ +yTG9hEDaZhQ3DF2m7W8Cwmgu/ch6Dl1+kNPXu64eSmEHtlBXvgwpFpv/Bf3i8IO30iq zw==
Received: from mr2-mtap-s03.rno.apple.com (mr2-mtap-s03.rno.apple.com [17.179.226.135]) by ma1-aaemail-dr-lapp02.apple.com with ESMTP id 2tx62v9v4a-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 23 Jul 2019 10:51:50 -0700
Received: from nwk-mmpp-sz12.apple.com (nwk-mmpp-sz12.apple.com [17.128.115.204]) by mr2-mtap-s03.rno.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPS id <0PV300FC9WAEC7D0@mr2-mtap-s03.rno.apple.com>; Tue, 23 Jul 2019 10:51:50 -0700 (PDT)
Received: from process_milters-daemon.nwk-mmpp-sz12.apple.com by nwk-mmpp-sz12.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) id <0PV300E00W58OM00@nwk-mmpp-sz12.apple.com>; Tue, 23 Jul 2019 10:51:50 -0700 (PDT)
X-Va-A:
X-Va-T-CD: 8dd9a97d16a6334c7005ce5b0715e098
X-Va-E-CD: 844c7cd8bab9de5eb47f49962d389d34
X-Va-R-CD: 9ea3b1bc4aa98e49e23c581d3272df86
X-Va-CD: 0
X-Va-ID: bab52bba-79cc-4676-bd90-ef13446f6cb3
X-V-A:
X-V-T-CD: 8dd9a97d16a6334c7005ce5b0715e098
X-V-E-CD: 844c7cd8bab9de5eb47f49962d389d34
X-V-R-CD: 9ea3b1bc4aa98e49e23c581d3272df86
X-V-CD: 0
X-V-ID: 532d1207-d4c2-43a7-bf1e-fbd93b10b765
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-07-23_07:,, signatures=0
Received: from [17.235.47.236] by nwk-mmpp-sz12.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPSA id <0PV300DP6WA9OV00@nwk-mmpp-sz12.apple.com>; Tue, 23 Jul 2019 10:51:50 -0700 (PDT)
Sender: tpauly@apple.com
Content-type: multipart/alternative; boundary="Apple-Mail=_0CFB71E4-93A1-4A3D-88CA-0572B065638B"
MIME-version: 1.0 (Mac OS X Mail 12.4 \(3445.104.2\))
From: Tommy Pauly <tpauly@apple.com>
X-Priority: 3
In-reply-to: <fcbd50de-9364-4e33-aebb-dccaeece8141@email.android.com>
Date: Tue, 23 Jul 2019 13:51:42 -0400
Cc: Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org>, Joe Touch <touch@strayalpha.com>, Theresa Enghardt <theresa@inet.tu-berlin.de>, taps@ietf.org
Message-id: <E6C9EB11-7537-4CB5-A75D-9295A6B5A5BD@apple.com>
References: <fcbd50de-9364-4e33-aebb-dccaeece8141@email.android.com>
To: Max Franke <mfranke@inet.tu-berlin.de>
X-Mailer: Apple Mail (2.3445.104.2)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-07-23_07:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/taps/9C-UXjEGCQ0SqM-ZmoYNEacg6kY>
Subject: Re: [Taps] How to handle Protocol stacks that are not equivalent
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IETF Transport Services \(TAPS\) Working Group" <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jul 2019 17:51:57 -0000

Yes, that's correct. My interpretation is that being in the candidate set already requires equivalence. We can make the text more clear here, but it isn't a technical change.

Thanks,
Tommy

> On Jul 23, 2019, at 12:05 PM, Max Franke <mfranke@inet.tu-berlin.de> wrote:
> 
> So if I understand this correctly, this boils down to the fact that if two protocols are in the candidate set for racing they are also equivalent? Thus we dont have to worry about unequivalent protocols as they are never part of the same candidate set anyway?
> 
> Best
> Max
> 
> 
> 
> Am 23.07.2019 11:59 schrieb Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org>:
> Hi Joe,
> 
> Yes, I completely agree. The current text in -arch expresses this as:
> 
>    2.  Both stacks MUST offer the same transport services, as required
>        by the application.  For example, if an application specifies
>        that it requires reliable transmission of data, then a Protocol
>        Stack using UDP without any reliability layer on top would not be
>        allowed to replace a Protocol Stack using TCP.  However, if the
>        application does not require reliability, then a Protocol Stack
>        that adds unnecessary reliability might be allowed as an
>        equivalent Protocol Stack as long as it does not conflict with
>        any other application-requested properties.
> 
> If you think we can clarify this any further, let me know!
> 
> Thanks,
> Tommy
> 
> On Jul 23, 2019, at 11:55 AM, Joe Touch <touch@strayalpha.com <mailto:touch@strayalpha.com>> wrote:
> 
> 
> 
> On Jul 23, 2019, at 8:19 AM, Theresa Enghardt <theresa@inet.tu-berlin.de <mailto:theresa@inet.tu-berlin.de>> wrote:
> 
> Another important difference between TCP and UDP are Message Boundaries.
> So in some cases, TCP + Framer may be equivalent to UDP.
> 
> FWIW, they might provide *similar* capabilities, even only those that the app is concerned about, but there are a LOT of other differences that can’t be glossed over. In some cases, it is TCP that is lacking (as above); in others, UDP).
> 
> It’s only important whether the user does or doesn’t care about those properties. When they match what they care about, they can be considered equivalent.
> 
> I.e., there’s not likely going to be a strict and absolute equivalence between transports.
> 
> Equivalence is TO THE USER, relative to their constraints.
> 
> Joe
> 
> _______________________________________________
> Taps mailing list
> Taps@ietf.org <mailto:Taps@ietf.org>
> https://www.ietf.org/mailman/listinfo/taps
> 
> 
> _______________________________________________
> Taps mailing list
> Taps@ietf.org
> https://www.ietf.org/mailman/listinfo/taps