Re: [Taps] TAPS Transports and ICMP

Joe Touch <touch@isi.edu> Thu, 04 June 2015 20:56 UTC

Return-Path: <touch@isi.edu>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE2AC1ABD3F for <taps@ietfa.amsl.com>; Thu, 4 Jun 2015 13:56:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y8cMsfC9_u6c for <taps@ietfa.amsl.com>; Thu, 4 Jun 2015 13:56:33 -0700 (PDT)
Received: from nitro.isi.edu (nitro.isi.edu [128.9.208.207]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B697E1ABD3E for <taps@ietf.org>; Thu, 4 Jun 2015 13:56:33 -0700 (PDT)
Received: from [128.9.160.252] (pen.isi.edu [128.9.160.252]) (authenticated bits=0) by nitro.isi.edu (8.13.8/8.13.8) with ESMTP id t54KuDWS028502 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Thu, 4 Jun 2015 13:56:13 -0700 (PDT)
Message-ID: <5570BB6C.2070905@isi.edu>
Date: Thu, 04 Jun 2015 13:56:12 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: "Pal Martinsen (palmarti)" <palmarti@cisco.com>
References: <00597CB8-D128-408A-8F35-BA98CDF45A62@cisco.com> <55707211.8010609@isi.edu> <26B9DE0B-4D38-430D-A9A1-921CD0067C70@cisco.com> <5570988A.6040208@isi.edu> <554F884C-642C-42B1-A976-EECD0C32928B@cisco.com> <5570A452.8090209@isi.edu> <43C5480A-904D-4A7E-A181-08EBA709BC2A@cisco.com>
In-Reply-To: <43C5480A-904D-4A7E-A181-08EBA709BC2A@cisco.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
X-MailScanner-ID: t54KuDWS028502
X-ISI-4-69-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <http://mailarchive.ietf.org/arch/msg/taps/rW-iF3BXgqNvHxAoZUPQ4D_zu1w>
Cc: "taps@ietf.org" <taps@ietf.org>
Subject: Re: [Taps] TAPS Transports and ICMP
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussions on Transport Services <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jun 2015 20:56:36 -0000


On 6/4/2015 12:51 PM, Pal Martinsen (palmarti) wrote:
> 
>> On 04 Jun 2015, at 21:17, Joe Touch <touch@isi.edu> wrote:
>>
>>
>>
>> On 6/4/2015 12:08 PM, Pal Martinsen (palmarti) wrote:
>> ...
>>>> UDP passes all ICMP messages to the app. If the app doesn't listen for
>>>> it, that’s the app's decision.
>>>>
>>> Then there is a lot UDP application developers out there that does not care. 
>>>
>>> Ill guess what I am asking if we should make life easier for them.
>>
>> Again, FIRST this doc needs to explain the current abstract APIs for
>> transport protocols.
>>
>> THEN we can decide whether that set either needs to be augmented,
>> diminished, or translated to be more useful for “applications".
> 
> Heh.. I still do not get that..
> 
>>From the Abstract:
> This document describes services provided by existing IETF protocols
> and congestion control mechanisms.

*existing*

That means we need to document WHAT IS before deciding to pursue WHAT
SHOULD BE.

> It is designed to help
> application and network stack programmers and to inform the work of
> the IETF TAPS Working Group.
> 
> 
> Having a description of how ICMP works. Both in theory (abstract
> APIs) and in practice would help app developers.

In theory, it behaves like RFC 792 and RFC 1122 specify.

In practice, we can measure whether those capabilities are supported or
not (but that's not particularly the scope of TAPS).

However, that does not necessarily require documenting the Java
interface to TCP on Linux CentOS v7. That what man pages are for.

>>>>> Unfortunately how to do this varies from OS to OS:
>>>>> See https://tools.ietf.org/html/draft-martinsen-tram-stuntrace-01#appendix-A.2 for
>>>>> examples.
>>>>
>>>> You are confusing the OS and language-dependent implementation of the
>>>> API with the abstract API.
>>>>
>>> On purpose. I hate it when a feature should work because it says so 
>>> in a RFC, but the implementations of it is so vastly different that
>>> it is not possible to get the thing to work so the app developer just
>>> chose to ignore it.
>>
>> The IETF standardizes protocols and abstract APIs.
>>
>> If you are concerned with differences in the implementations of those
>> abstract APIs, you need to address them in other organizations (e.g.,
>> POSIX, etc.).
>>
> 
> That seems like a fun task.. (So who is on the list: Apple,
> Microsoft, Google(android), Linux, BSD…)

POSIX is maintained by the IEEE, and defines the common API across
various OS implementations - and yes, some of those orgs participate.

That's far outside the scope of the IETF, though.

>> ...
>>>> RFC1122 requires that UDP implementations make the ICMP signals
>>>> available to the application. It does not indicate by what mechanism.
>>>>
>>>>> Listening for port unreachable can be nice to avoid spamming a host or
>>>>> application that recently crashed. Detecting fragmentation or max MTU is
>>>>> also a nice feature especially VoIP applications sending video can
>>>>> utilise to optimise their packet sizes. 
>>>>
>>>> UDP is required to pass ALL ICMP messages to the app layer, as per RFC 1122.
>>>
>>> That is another problem. An app using port 5555 will receive all
>>> ICMP messages also generated by other apps running on other ports.
>>
>> That's an incorrect implementation. See RFC1122 Section 4.1.3.3.
>>
> The section says:
> UDP MUST pass to the application layer all ICMP error
> messages that it receives from the IP layer.  Conceptually
> at least, this may be accomplished with an upcall to the
> ERROR_REPORT routine (see 
> Section 4.2.4.1).
> 
> Looks like none the implementers do send any ICMP messages to the
> UDP layer.

Here's an example of how an app can get errors in response to a call:
http://stackoverflow.com/questions/4888285/send-an-udp-packet-and-receive-an-icmp-response-from-router-in-c

The app can get async errors (i.e., not in response to a given sendmsg
or recvmsg call) by using a connect() to the socket - i.e., creating a
handle by which the OS can signal the app.

See the book excerpt here:
https://books.google.com/books?id=ptSC4LpwGA0C&pg=PA249&lpg=PA249&dq=socket+errors+icmp&source=bl&ots=Ks3APlbjQs&sig=aBvReFfOYShEGtJtvEheG-8HpnI&hl=en&sa=X&ei=lLpwVdLHJZSZoQSxtYKwCw&ved=0CDMQ6AEwAg#v=onepage&q=socket%20errors%20icmp&f=false

AFAICT, this is widely supported.

>> ...
>>> So this boils down better education of the app developers?
>>
>> No, in that case you have a bug. The only thing the UDP app has to worry
>> about are ICMPs from other apps using the same port.
> 
> Do you have any real code to show that this actually work as described on any platform?

See above.

Joe