Re: [Taps] How to handle Protocol stacks that are not equivalent

Tommy Pauly <tpauly@apple.com> Tue, 23 July 2019 14:33 UTC

Return-Path: <tpauly@apple.com>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DBD51202A5 for <taps@ietfa.amsl.com>; Tue, 23 Jul 2019 07:33:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UR9QRiGe8JDo for <taps@ietfa.amsl.com>; Tue, 23 Jul 2019 07:33:07 -0700 (PDT)
Received: from ma1-aaemail-dr-lapp01.apple.com (ma1-aaemail-dr-lapp01.apple.com [17.171.2.60]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E7EA120131 for <taps@ietf.org>; Tue, 23 Jul 2019 07:33:06 -0700 (PDT)
Received: from pps.filterd (ma1-aaemail-dr-lapp01.apple.com [127.0.0.1]) by ma1-aaemail-dr-lapp01.apple.com (8.16.0.27/8.16.0.27) with SMTP id x6NEMqdc039546; Tue, 23 Jul 2019 07:33:05 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=sender : content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=20180706; bh=hlelD5K0FGCajItDg9ge9XIUQ6DtragU9fDiv6REOfM=; b=AZuJ+K2ND3cpkxVo0FR2x1zpt8kvYmB4aTYPb9k3P2Zfy/wRRCFgEnitQ+HYIpEqcTP2 bmSPnUWpZfLDl2s2qXWyNeC6n1KtugCgur0UKQNBnBHs92Q/0uYTWZN7cD6e3yUPJ4zC /BXCAI93LV8S149oYUdbtTc/g+ygFNYbZvt2ZXuiDkixHVPRpTwP9UMrLICU9dqn4n3n 3bfCDgY1Bm7656JVoYXJ5HWi+KvcH6F3W3x8JtRW7HY1w5YHGvjccYnl9vprY28bLXcK MiohkQVH4Oz6oQuDgC1Jw1Tu20vwuylYe202shZQLJ4LjcWwKxxYPpIW8NSG3eXc28el ew==
Received: from mr2-mtap-s02.rno.apple.com (mr2-mtap-s02.rno.apple.com [17.179.226.134]) by ma1-aaemail-dr-lapp01.apple.com with ESMTP id 2tv1m6wfn6-4 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 23 Jul 2019 07:33:04 -0700
Received: from nwk-mmpp-sz10.apple.com (nwk-mmpp-sz10.apple.com [17.128.115.122]) by mr2-mtap-s02.rno.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPS id <0PV300CTRN33QB50@mr2-mtap-s02.rno.apple.com>; Tue, 23 Jul 2019 07:33:03 -0700 (PDT)
Received: from process_milters-daemon.nwk-mmpp-sz10.apple.com by nwk-mmpp-sz10.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) id <0PV300600N2KT300@nwk-mmpp-sz10.apple.com>; Tue, 23 Jul 2019 07:33:03 -0700 (PDT)
X-Va-A:
X-Va-T-CD: 2b784dc161e0635db4a0c2407b1814f4
X-Va-E-CD: 844c7cd8bab9de5eb47f49962d389d34
X-Va-R-CD: 9ea3b1bc4aa98e49e23c581d3272df86
X-Va-CD: 0
X-Va-ID: df0e9a0d-c7e2-44cd-a39c-b1c9bece7a9c
X-V-A:
X-V-T-CD: 2b784dc161e0635db4a0c2407b1814f4
X-V-E-CD: 844c7cd8bab9de5eb47f49962d389d34
X-V-R-CD: 9ea3b1bc4aa98e49e23c581d3272df86
X-V-CD: 0
X-V-ID: 0951bce4-08dd-4d9d-a86b-fb30e94b0131
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-07-23_06:,, signatures=0
Received: from [17.235.51.16] by nwk-mmpp-sz10.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPSA id <0PV300KGIN04XC20@nwk-mmpp-sz10.apple.com>; Tue, 23 Jul 2019 07:31:19 -0700 (PDT)
Sender: tpauly@apple.com
Content-type: text/plain; charset="utf-8"
MIME-version: 1.0 (Mac OS X Mail 12.4 \(3445.104.2\))
From: Tommy Pauly <tpauly@apple.com>
In-reply-to: <3D1D6BE1-6AE2-4098-A2C8-40ADF73A2316@tiesel.net>
Date: Tue, 23 Jul 2019 10:31:12 -0400
Cc: taps WG <taps@ietf.org>
Content-transfer-encoding: quoted-printable
Message-id: <F9C04679-79DB-4CAA-9710-DD5C04FD30E8@apple.com>
References: <3D1D6BE1-6AE2-4098-A2C8-40ADF73A2316@tiesel.net>
To: "Philipp S. Tiesel" <philipp@tiesel.net>
X-Mailer: Apple Mail (2.3445.104.2)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-07-23_06:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/taps/sKs36BlMBd8Ws7kTwUnR6TbiGC8>
Subject: Re: [Taps] How to handle Protocol stacks that are not equivalent
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IETF Transport Services \(TAPS\) Working Group" <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jul 2019 14:33:17 -0000

My initial impression here is that any protocol stacks that provide the same transport services, and thus can be raced as candidates, need to be equivalent. It ends up being a bit tautological. The description in the architecture explains what combinations are allowed based on preference—if you don't require reliability, then a UDP protocol stack is equivalent to a message protocol over TCP. If you do require reliability, then those aren't equivalent.

Thanks,
Tommy

> On Jul 22, 2019, at 5:16 PM, Philipp S. Tiesel <philipp@tiesel.net> wrote:
> 
> Hi,
> 
> as time did not permit to discuss all open issues in the session today, I’ll take them to the list as proposed.
> This issue is based on Github issue #305: https://github.com/ietf-tapswg/api-drafts/issues/305
> 
> Following the architecture draft, only protocol stacks that are equivalent can be safely raced. What should happen if selection properties result in a candidate set that includes protocol stacks that are not intuitively equivalent?
> 
> 
> Resolution Proposals:
> 
> a) Define Protocol Stack Equivalence more rigorously. A possible way to do this would be to say two stacks are equivalent with respect to the applications’ requirements if both fulfil all require properties specified by the applications and do not violate any of the prohibit properties.
> 
> b) Generate some kind of Error Event for configurations with unlike protocol stack candidates. (May need a definition of "unlike”).
> 
> c) Do nothing and close the issue.
> 
> 
> AVE!
>   Philipp S. Tiesel
> 
> -- 
> Philipp S. Tiesel 
> https://philipp.tiesel.net/
> 
> _______________________________________________
> Taps mailing list
> Taps@ietf.org
> https://www.ietf.org/mailman/listinfo/taps