Re: [Taps] I-D Action: draft-ietf-taps-minset-00.txt

Michael Welzl <michawe@ifi.uio.no> Tue, 14 November 2017 01:08 UTC

Return-Path: <michawe@ifi.uio.no>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 254591205F0 for <taps@ietfa.amsl.com>; Mon, 13 Nov 2017 17:08:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g3o17BPommFx for <taps@ietfa.amsl.com>; Mon, 13 Nov 2017 17:08:08 -0800 (PST)
Received: from mail-out01.uio.no (mail-out01.uio.no [IPv6:2001:700:100:10::50]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B143126579 for <taps@ietf.org>; Mon, 13 Nov 2017 17:08:08 -0800 (PST)
Received: from mail-mx06.uio.no ([129.240.10.40]) by mail-out01.uio.no with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <michawe@ifi.uio.no>) id 1eEPhu-0002xc-E8 for taps@ietf.org; Tue, 14 Nov 2017 02:08:06 +0100
Received: from dhcp-9539.meeting.ietf.org ([31.133.149.57]) by mail-mx06.uio.no with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) user michawe (Exim 4.82_1-5b7a7c0-XX) (envelope-from <michawe@ifi.uio.no>) id 1eEPhs-0001EO-A9; Tue, 14 Nov 2017 02:08:06 +0100
From: Michael Welzl <michawe@ifi.uio.no>
Message-Id: <C0298ED8-6EE3-473C-BCD0-639BF50EAFFC@ifi.uio.no>
Content-Type: multipart/alternative; boundary="Apple-Mail=_DE2F7D5E-B1DC-42F1-9FDE-BD5A713561C1"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Tue, 14 Nov 2017 09:08:02 +0800
In-Reply-To: <DDD570C4-FA0B-441A-A02B-31D97F940EB8@apple.com>
Cc: "taps@ietf.org" <taps@ietf.org>
To: Tommy Pauly <tpauly@apple.com>
References: <150871580801.24896.1276317669567869148@ietfa.amsl.com> <7403AB1A-33FC-461A-B88F-B8DB8FC08881@ifi.uio.no> <DDD570C4-FA0B-441A-A02B-31D97F940EB8@apple.com>
X-Mailer: Apple Mail (2.3273)
X-UiO-SPF-Received: Received-SPF: neutral (mail-mx06.uio.no: 31.133.149.57 is neither permitted nor denied by domain of ifi.uio.no) client-ip=31.133.149.57; envelope-from=michawe@ifi.uio.no; helo=dhcp-9539.meeting.ietf.org;
X-UiO-Spam-info: not spam, SpamAssassin (score=-4.9, required=5.0, autolearn=disabled, AWL=0.141, HTML_MESSAGE=0.001, UIO_MAIL_IS_INTERNAL=-5, uiobl=NO, uiouri=NO)
X-UiO-Scanned: 0A8B5700BF843A4C5D8D3CDB211B28B238C941CB
Archived-At: <https://mailarchive.ietf.org/arch/msg/taps/h5IsnDlQwY_XF62OE37Iw9MK1dc>
Subject: Re: [Taps] I-D Action: draft-ietf-taps-minset-00.txt
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IETF Transport Services \(TAPS\) Working Group" <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Nov 2017 01:08:11 -0000

Hi,

In line:


> On Nov 14, 2017, at 8:20 AM, Tommy Pauly <tpauly@apple.com> wrote:
> 
> A couple initial comments on the minset document:
> 
> In Section 4:
> 
> - Title should be "4.  A MinSet Abstract Interface" not "4.  An MinSet Abstract Interface”

Ack,


> For this:
> 
> 3.  Not offer any of the transport features of these protocols and
>        the LEDBAT congestion control mechanism that do not require
>        application-specific knowledge (to give maximum flexibility to a
>        TAPS system)
> 
> Could this be written as "that can be performed automatically" or something, rather than "do not require application-specific knowledge"? It ends up having a lot of negatives that get confusing.

Agreed,


> I'd like to see the reference removed to Post Sockets indicating that it would require any protocol changes or the system on both ends. As discussed on the other thread, Post does not require any changes to the peer for compatibility.

Absolutely! No problem


> TLS:
> 
> We can discuss in the group, but I think that security can stay a separate document for now. You wouldn't "fall back" to TLS—TLS is just something you can use underneath the TAPS API, and you either have security or you don't. That shouldn't be changing underneath you.

Agreed,


> General:
> 
> Much of the document is phrased in terms of "fall-back" to TCP, UDP, etc. While I understand where this is coming from, I'm wondering from a larger perspective if this is the right framing. As the document reads now, there's this underlying normative assumption that "TCP and UDP are less preferred" and MPTCP or SCTP etc is preferred over them. This may be true for some systems, but maybe not always. The set of transports that a TAPS system may eventually use hopefully won't be just limited to the set in the survey, but include things like QUIC, etc. And depending on the scenario, maybe we prefer something over TCP, and then fall-back to some other less preferred mode. Or, the application may not allow falling back at all, but simply wants to reuse its transport code that uses a TAPS API between different protocols it uses for different, mutually exclusive scenarios.
> 
> So, I would be tempted to change the first two requirements from:
> 
>    1.  Support one-sided deployment with a fall-back to TCP (or UDP)
>    2.  Offer all the transport features of (MP)TCP, UDP(-Lite), LEDBAT
>        and SCTP that require application-specific knowledge
> 
> To:
> 
>    1.  Support basic functionality required for all transports (the 
> 	minimal set for TCP and UDP)
>    2.  Offer all extended transport features that require application-
> 	specific knowledge (such as options for (MP)TCP, UDP(-Lite), LEDBAT
>        and SCTP)
> 
> Then, for each feature listed, you have essentially this format:
> 
>    o  [Feature name]
>       Protocols: SCTP
>       [Description]
>       Fall-back to TCP: [do nothing/not supported]
>       Fall-back to UDP: [do nothing/not supported]
> 
> How about something like:
> 
>    o  [Feature name]
>       Supported by: SCTP
>       Ignored by: TCP
>       Incompatible with: UDP
>       [Description]
> 
> This way, we list how each protocol will treat it, but we're not making normative preferential statements, and we're not relying on the notion of falling back. I think "falling back" is something that belongs in documents around happy eyeballs and racing, etc, and baking in which protocol is a fallback and which is the primary may be quite misleading to implementers.

I completely agree!

That was easy  :)

Cheers,
Michael