Re: [Taps] IETF planning

Michael Welzl <michawe@ifi.uio.no> Mon, 26 October 2015 13:50 UTC

Return-Path: <michawe@ifi.uio.no>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 357BE1B3E62 for <taps@ietfa.amsl.com>; Mon, 26 Oct 2015 06:50:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w3k8uJ-Tf_qA for <taps@ietfa.amsl.com>; Mon, 26 Oct 2015 06:50:03 -0700 (PDT)
Received: from mail-out4.uio.no (mail-out4.uio.no [IPv6:2001:700:100:10::15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B3B631B3E96 for <taps@ietf.org>; Mon, 26 Oct 2015 06:50:02 -0700 (PDT)
Received: from mail-mx3.uio.no ([129.240.10.44]) by mail-out4.uio.no with esmtp (Exim 4.80.1) (envelope-from <michawe@ifi.uio.no>) id 1Zqi6r-0007nX-Vm; Mon, 26 Oct 2015 14:46:49 +0100
Received: from 173.179.249.62.customer.cdi.no ([62.249.179.173] helo=[192.168.0.101]) by mail-mx3.uio.no with esmtpsa (TLSv1:DHE-RSA-AES256-SHA:256) user michawe (Exim 4.80) (envelope-from <michawe@ifi.uio.no>) id 1Zqi6r-0005Ui-79; Mon, 26 Oct 2015 14:46:49 +0100
Content-Type: multipart/alternative; boundary="Apple-Mail=_CBEA31F0-4686-4EF1-9ACF-C32BF964F302"
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2104\))
From: Michael Welzl <michawe@ifi.uio.no>
In-Reply-To: <CAD62q9XjebXmRHUebJLrd35=PnrLPGCZFv4LBO5omYBh2J+72Q@mail.gmail.com>
Date: Mon, 26 Oct 2015 14:46:47 +0100
Message-Id: <564DD3D7-446B-4ABC-9A40-26E79DADD50E@ifi.uio.no>
References: <64271754-EED2-4322-BB0E-51CB66365682@gmail.com> <B36B9E5E-0EB5-418A-A6A1-E103C8ECF500@ifi.uio.no> <CCC80AEF-66CD-4497-A374-2ED89DF4FA17@trammell.ch> <CAD62q9XQMSyuG_=HYjXKe12iE=-F3HasXqrmJs+RAQeBZbddCQ@mail.gmail.com> <562DF846.7090901@erg.abdn.ac.uk> <CAD62q9XjebXmRHUebJLrd35=PnrLPGCZFv4LBO5omYBh2J+72Q@mail.gmail.com>
To: Aaron Falk <aaron.falk@gmail.com>
X-Mailer: Apple Mail (2.2104)
X-UiO-SPF-Received:
X-UiO-Ratelimit-Test: rcpts/h 6 msgs/h 2 sum rcpts/h 12 sum msgs/h 3 total rcpts 34363 max rcpts/h 54 ratelimit 0
X-UiO-Spam-info: not spam, SpamAssassin (score=-5.0, required=5.0, autolearn=disabled, HTML_MESSAGE=0.001, TVD_RCVD_IP=0.001, UIO_MAIL_IS_INTERNAL=-5, uiobl=NO, uiouri=NO)
X-UiO-Scanned: 20867889C86842604033C2A6A9ADEA7613190367
X-UiO-SPAM-Test: remote_host: 62.249.179.173 spam_score: -49 maxlevel 99990 minaction 1 bait 0 mail/h: 2 total 1958 max/h 14 blacklist 0 greylist 0 ratelimit 0
Archived-At: <http://mailarchive.ietf.org/arch/msg/taps/u6reg6hZUc_Vcc5q7Z4gzGlqA6s>
Cc: "<gorry@erg.abdn.ac.uk> Fairhurst" <gorry@erg.abdn.ac.uk>, Brian Trammell <ietf@trammell.ch>, "taps@ietf.org" <taps@ietf.org>, Stein Gjessing <steing@ifi.uio.no>
Subject: Re: [Taps] IETF planning
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussions on Transport Services <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Oct 2015 13:50:06 -0000

> On 26. okt. 2015, at 14.17, Aaron Falk <aaron.falk@gmail.com> wrote:
> 
> On Mon, Oct 26, 2015 at 5:54 AM, Gorry Fairhurst <gorry@erg.abdn.ac.uk <mailto:gorry@erg.abdn.ac.uk>> wrote:
> On 22/10/2015 15:14, Aaron Falk wrote:
> 
>     > draft-welzl-taps-transports currently only covers TCP and SCTP. But then: how many other protocols?
>     > It seems people agree that the protocols covered in draft-welzl-taps-transports should be a subset of the protocols covered in draft-ietf-taps-transports. My question is, then: how to choose the subset?
>     >
>     > It seems obvious to include protocols that are seeing some deployment, i.e. of course UDP, maybe UDP-Lite (?), but also MPTCP…
>     > However: if that is the only decision ground, we probably wouldn’t include DCCP. Are we then making a significant mistake, missing a lesson to be learned?
>     >
>     > That, to me, is a discussion I’d like to have in Yokohama.
> 
>     +1, and FWIW that's exactly the same starting point I got to on my own.
> 
> 
> Any volunteers to kick off the lead the discussion?
> 
> 
> 
> <snip test on another draft>
> 
> So, I think UDP, and UDP-Lite *NEED* to be included. MPTCOP also.

Assuming this is a typo and you mean MPTCP, I agree.


> On DCCP, this has many services being re-invented above. I think we have an interesting dilemma about whether to describe this, I suggest one of the reason for the minimal use of DCCP (DCCP/UDP) could well be the lack of a framework that allows this to be done without recoding an app. So, if we had such a framework *WHEN* DCCP/UDP was done, we may now have seen more usage.

I understand and agree, but that doesn’t help us now…



> I don't understand.  Why leave out any of the protocols included in draft-ietf-taps-transports?  Is there an argument other than for expedience?

Working towards a realistic end-goal of a deployable system.

So we’re i) describing services; ii) narrowing them down somehow; iii) describing how to build this thing.
My concern is with iii) being something feasible and useful, not an obscure sci-fi document.

Say we include DCCP. It’ll add some services that aren’t in the other protocols listed so far in this mail - e.g. drop notification (see section 3.6.3 in draft-ietf-taps-transports). Say, in step ii), we find no good arguments to remove drop notification. Then, in step iii), we’ll have to say how a TAPS system can support drop notification. So, to build a working TAPS system, one has to either:
- include DCCP in the code base
- extend other protocols to provide this functionality

None of these two options are very helpful if we want to TAPS to be real thing one day.

I understand that we can see these as optional, and end up with a document iii) that has a small mandatory base and lots of optional things - but this will then be a huge document, of which only a small subset will ever be implemented. Personally I think that’s a possibility but not really what we should aim at.

Cheers,
Michael