Re: [tcpm] SYN/ACK Payloads, draft 01

Joe Touch <touch@ISI.EDU> Thu, 14 August 2008 17:32 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EB75A3A6974; Thu, 14 Aug 2008 10:32:37 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AD40F3A6957 for <tcpm@core3.amsl.com>; Thu, 14 Aug 2008 10:32:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.724
X-Spam-Level:
X-Spam-Status: No, score=0.724 tagged_above=-999 required=5 tests=[AWL=-0.665, BAYES_00=-2.599, FRT_STOCK2=3.988]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KyjH0Fc74G2t for <tcpm@core3.amsl.com>; Thu, 14 Aug 2008 10:32:35 -0700 (PDT)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) by core3.amsl.com (Postfix) with ESMTP id C33903A692D for <tcpm@ietf.org>; Thu, 14 Aug 2008 10:32:35 -0700 (PDT)
Received: from [75.214.2.40] (40.sub-75-214-2.myvzw.com [75.214.2.40]) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id m7EHVnH1021671 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 14 Aug 2008 10:31:52 -0700 (PDT)
Message-ID: <48A46BD3.4030408@isi.edu>
Date: Thu, 14 Aug 2008 10:30:59 -0700
From: Joe Touch <touch@ISI.EDU>
User-Agent: Thunderbird 2.0.0.16 (Windows/20080708)
MIME-Version: 1.0
To: Adam Langley <agl@imperialviolet.org>
References: <396556a20808111035s2b974233o1e9d3671e82e3350@mail.gmail.com> <48A35CFA.4060709@isi.edu> <396556a20808131525i20dabf06w7a7a11e3468e541a@mail.gmail.com> <48A36104.6000000@isi.edu> <396556a20808131605w2ccac3ceo21160401e4545c15@mail.gmail.com> <48A383F0.9030601@isi.edu> <396556a20808131827x1ab32b13yaa9358ac1a70c6ed@mail.gmail.com> <48A3C0B3.8050003@isi.edu> <396556a20808140940p63dec2d2ib3332b27da8260ae@mail.gmail.com> <48A465CC.8000402@isi.edu> <396556a20808141023s3abddc96u43b9e6e7898033ed@mail.gmail.com>
In-Reply-To: <396556a20808141023s3abddc96u43b9e6e7898033ed@mail.gmail.com>
X-Enigmail-Version: 0.95.6
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: tcpm@ietf.org
Subject: Re: [tcpm] SYN/ACK Payloads, draft 01
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Adam Langley wrote:
| On Thu, Aug 14, 2008 at 10:05 AM, Joe Touch <touch@isi.edu> wrote:
|> It's a lot more than that; it hints that the socket interface is
|> insufficient for using the available TCP capability for sending data
|> with either SYNs or SYN-ACKs. I'm wondering how/if this has been
|> explored before, and whether there would be a solution that maps to
|> TCP's model of a stream better.
|>
|> The socket option above is incorrect, IMO. It implies that the user
|> should have control over data that ends up in the SYN-ACK directly; IMO,
|> TCP's stream model should allow only that data be written to the stream
|> early - which may require a socket option - BUT should *not* imply that
|> the data maps to the SYN-ACK directly.
|>
|> E.g., what happens if the data is larger than the MSS? Or if the SYN-ACK
|> comes back with an ICMP 'too-big'? I.e., this should be called just
|> TCP_DATA, not TCP_SADATA.
|
| There are several cases:
|
| If the setsockopt has requested that the data be included in the
| stream without exception, then it is enqueued like any other data. If
| there's space in the SYN/ACK, it can go in there. If not, it will be
| sent as usual. If the client doesn't ACK a SYNACK payload, it will be
| retransmitted etc. This requires no standards effort, it's a TODO for
| me at the moment.

OK. So why bother with an option at that point? Why does the user data
need to be different if the option is present?

If the user data were not different, then this all boils down to a
change in the implementation of the API. The trouble is that you're
expecting a TCP option to change the *content* of the data stream, and
that seems bizarre to me.

| If the setsockopt flags request that the data only be sent in reply to
| SYNs with the SAPP option:
|
| If the payload fits in the SYNACK (given MSS etc) then it is
| transmitted and the option is echoed back. Otherwise, a bare SYNACK
| (without the option) is sent back. In the latter case, the data is not
| enqueued to be sent in the future. The applications on both sides are
| aware of what happened and proceed correctly given the situation.

This is a big change - you're saying that if the payload fits, it goes
in the SYN-ACK. If not, *none* of it is sent in the SYN-ACK? Why?

TCP provides a *byte stream*. The description above implies that the
application knows/sees segment boundaries, which isn't TCP anymore.

Joe
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkika9IACgkQE5f5cImnZrvUUQCgwS0gBBPzVhXF5YoJCpEw84B7
XCMAnj+w6SpKM39Gv7e9AdrfUmb1allb
=OzbR
-----END PGP SIGNATURE-----
_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm