Re: [tcpm] AccECN field order

Yoshifumi Nishida <nsd.ietf@gmail.com> Fri, 12 February 2021 17:49 UTC

Return-Path: <nsd.ietf@gmail.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A01133A1829 for <tcpm@ietfa.amsl.com>; Fri, 12 Feb 2021 09:49:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id egVhyqghXD4Q for <tcpm@ietfa.amsl.com>; Fri, 12 Feb 2021 09:49:51 -0800 (PST)
Received: from mail-qv1-xf2a.google.com (mail-qv1-xf2a.google.com [IPv6:2607:f8b0:4864:20::f2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6CAC3A1828 for <tcpm@ietf.org>; Fri, 12 Feb 2021 09:49:50 -0800 (PST)
Received: by mail-qv1-xf2a.google.com with SMTP id y10so147660qvo.6 for <tcpm@ietf.org>; Fri, 12 Feb 2021 09:49:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=w+yogIKnfA5V4L7lz7V5MSZ8ZSJ3k+tF3oHwAv+UAuM=; b=VOpctL3Axv2k19TU/i4mIw2FNTWGYSKIw/rS7B4qr4p8FpEsw2UnGUSz9xaNswzjgb zlZdsxdS7IJPY1k475RLCC44bnYLJPO89iFG8mlHytCi7FW5MUkRhWBzesjWfI7bEih4 4XQUDHrJAIisqwWEoSxRNP+jpCFEhNtppvHUskL+iNQ/lzM843j09ZOwkS++PXJYJhuM pVTBS79WQz3EP3XNe9lyfPYnv4Ps6epXtouij/qrdPhB4WUuQ/2rzVX0ZPc9djGzy2e+ 49nkOorjVwTM8ZfAsNJ9A0jrkwCwNvLRg20e+yxstm+d2sbF7QH0gh9sW7fLVcJ9rrAL 0jPg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=w+yogIKnfA5V4L7lz7V5MSZ8ZSJ3k+tF3oHwAv+UAuM=; b=ttsppXjtdMVN18KJNovOHmz+Drnku+8TfpvWHq8wd+eYMOGV0xg1nN16gxdsb/zWdW 5lyOzkz5+ek+W4DUXVxl8UUW6m8wo68F3onOZrMguhtJhqmlPYc5I/x8UxunzxiaJniz 0JO5xwdI9awVR0GMGpqo1QMuwJF6A2s+A0n0DN7trQ6Oig2JMsAQoqSCviN/1oIdFaZW qOjleKV1nzdJWKToLOnDRvA1BdElfAhmCSdH6Zq4Ht+WzxpZwyi/VsfZEk+I09yhObi0 TBf+bUK8duCzaQnLp8wDf+c7b3aiefZp+356JzqkY7i6EbGCBFagLb9g9NMntwrNpgGS zvdA==
X-Gm-Message-State: AOAM531bNbyqj1Qrrm7X568Wf28CFH499W7MMN37hslY0lugF2q7+j3X 7WBmc0V2uid2YncznNjESEdB4vyR5jXFjtx/ptI=
X-Google-Smtp-Source: ABdhPJxk0ou4LXQW0NUrx7LXAgG+Kbc3soMLQFuuDdhN/izNQDKecwT9VxW89+Mn+LqU5BoHhFqBpYZ4UgiV0pKfJ1Q=
X-Received: by 2002:ad4:4390:: with SMTP id s16mr3458530qvr.10.1613152189803; Fri, 12 Feb 2021 09:49:49 -0800 (PST)
MIME-Version: 1.0
References: <42eee5b7-fc0d-9576-c2ab-128706611a96@bobbriscoe.net> <CAAK044S8rVVRHjkHBxCfGDD6tOTRJvnsVOt3eGf0z95N0o=mDQ@mail.gmail.com> <CAAK044QRYKmk9GbPn1N-TxAr5E7TDr87mV3UJJuY2FNNKyd_Jw@mail.gmail.com> <279fb3d5-0000-f704-d88f-08ab0fa9e83a@bobbriscoe.net> <CAAK044TtbFWjb-msj3rA6vE+ZB99O1qAwhUFwzD2+rehzX9a7Q@mail.gmail.com> <9bdf71e9-4af0-f5ee-f2f7-e63349956500@bobbriscoe.net> <b3ae297684b04461be4e5ef5bbe3c83a@hs-esslingen.de> <f881b3e1-20e7-8533-1003-d22a69929f62@bobbriscoe.net> <30781ea61a794131beafe9997ed9221a@hs-esslingen.de> <1c927b36-7228-91f3-4d58-6f3545c88a57@bobbriscoe.net> <5c3c4661887c43529b35bd5f47d10c2b@hs-esslingen.de> <CADVnQynjc=fhTR_T29xP4r=945GtRJ8oBkRHCvpHraxb_a1ZCA@mail.gmail.com> <B7ED67D5-B5BE-4D42-8A48-06B9DD987749@kuehlewind.net> <SN4PR0601MB37286EB6FAA56C9E5293638086FC0@SN4PR0601MB3728.namprd06.prod.outlook.com> <381499f5-3333-08c5-2ffd-fba77e027795@bobbriscoe.net> <ffc499d2760a43a684543581a69b93f4@hs-esslingen.de> <1e61a7d3-b6be-d995-4fc2-777bc2d5d5fe@bobbriscoe.net>
In-Reply-To: <1e61a7d3-b6be-d995-4fc2-777bc2d5d5fe@bobbriscoe.net>
From: Yoshifumi Nishida <nsd.ietf@gmail.com>
Date: Fri, 12 Feb 2021 09:49:38 -0800
Message-ID: <CAAK044TeRk20+VzNzbZ-5PPj5cBxujbvg-XYEGYsOeup+DWzpQ@mail.gmail.com>
To: Bob Briscoe <ietf@bobbriscoe.net>
Cc: "Scharf, Michael" <Michael.Scharf@hs-esslingen.de>, "Scheffenegger, Richard" <Richard.Scheffenegger@netapp.com>, Mirja Kuehlewind <ietf@kuehlewind.net>, tcpm IETF list <tcpm@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000003def6a05bb2743fc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/H0xWJ7l0_dzq7p9QQhlZaaVc0uE>
Subject: Re: [tcpm] AccECN field order
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Feb 2021 17:49:57 -0000

On Thu, Feb 11, 2021 at 1:33 PM Bob Briscoe <ietf@bobbriscoe.net> wrote:

>
>
> On 09/02/2021 17:56, Scharf, Michael wrote:
> > Bob,
> >
> >> -----Original Message-----
> >> From: Bob Briscoe <ietf@bobbriscoe.net>
> >> Sent: Tuesday, February 9, 2021 5:58 PM
> >> To: Scheffenegger, Richard <Richard.Scheffenegger@netapp.com>; Mirja
> >> Kuehlewind <ietf@kuehlewind.net>; Scharf, Michael <Michael.Scharf@hs-
> >> esslingen.de>
> >> Cc: tcpm IETF list <tcpm@ietf.org>
> >> Subject: Re: AW: [tcpm] AccECN field order
> >>
> >> Richard,
> >>
> >> I just noticed I missed the last para of the old email from you below.
> >> Response inline, tagged [BB]...
> >>
> >> On 23/11/2020 12:42, Scheffenegger, Richard wrote:
> >>> I am also in favor of using two distinct option codes.
> >>>
> >>> However,
> >>>
> >>>> Or I guess we could say that only one option should be used for a
> >> connection.
> >>> I am opposed to this - with two option codes, a sender should be free
> to
> >> choose whichever he prevers at any one point; For example, if the
> sender a
> >> segment (e.g. may be the receiver side)  has to update the EE1 couter,
> but
> >> also convey SACK information, it would be good to use the one, where the
> >> EE1 field is first, and omit all remaining fields;
> >>> Later in the same connection, that very same host may choose to update
> >> the CE field together with some SACK information, and use the other
> >> codepoint in order to preserve as much TCP option space for the SACK
> >> option...
> >>
> >> [BB] I agree with you here (and disagree with Mirja below). The nice
> >> thing about 2 options kinds is they are self-describing, so they can be
> >> stateless (for instance, consider the code you would have to otherwise
> >> add for when a host switches to a different congestion control module -
> >> a lot of complexity despite being unlikely to happen).
> >>
> >>>
> >>> As for extensibility: I would want to avoid that topic, and just
> specifiy the
> >> three correct supported lengths here, and not mention (other than
> ignoring
> >> "odd" fractionals of the 3-byte wide counters) what happens with other
> >> lengths...
> >>
> >> [BB] A protocol spec should surely say what to do with unexpected
> >> inputs. Not specifying this is one of the main reasons we have such
> >> trouble changing things later - because we discover some implementers
> >> handled the unexpected in different ways to others (e.g. ignore, vs RST
> >> the connection), and others only handled expected inputs and didn't even
> >> think to check for anything else.
> >>
> >> So, I believe we have to either say "reset the connection" or "ignore",
> >> in response to an unexpected option length. I figure that, if there's no
> >> harm in ignoring something unexpected, then why not ("liberal in what
> >> you receive" principle).
> >>
> >> Earlier in this thread, Michael Scharf pointed out that there is some
> >> potential harm here (covert channel of up to 29B), but I pointed out
> >> that TCP/IP has plenty of other ways of creating covert channels, so
> >> we're not really adding to any problem here. But I did say that we would
> >> highlight the covert channel in the Security Considerations section, so
> >> the Sec Area has a chance to object. If it raises as serious concern,
> >> then we should switch from "ignore" to "reset", But I doubt it will.
> > I think we first have to come to the conclusion *inside* TCPM whether
> such a new covert channel is actually acceptable.
> >
> > Existing covert channels do not at all imply that a new covert channel
> is a good idea (and, IMHO, 29B per packet is a lot). Network administrators
> and operators know how to deal with the existing problems in TCP/IP. Adding
> any new security issue needs careful reasoning.
> >
> > As individual contributor to TCPM, I believe that this covert channel
> must just be removed from the next version of the draft. At least I don't
> need other opinions to come to this personal conclusion.
> >
> > If this was less obvious others in the WG, TCPM could ask for an early
> SECDIR review to get further guidance ASAP. Then this question can be
> sorted out while we finish the protocol.
> >
> > If TCPM needs any external input on covert channels, I think an early
> SECDIR review would be a much better approach compared to having a security
> discussion during IETF last call. We are here discussing a standards track
> extension of one of the core Internet protocols. In such a case, at least
> in my view on IETF processes, other IETF areas can expect that TCPM ties to
> deal with known open issues within the WG as far as possible, i.e., before
> they see a "stable" specification in the IETF last call.
> >
> > In a nutshell:
> >
> > -1 on leaving this question open until IETF last call
>
> [BB] That's a perfectly reasonable process proposal.
>
> I just wanted to add that there are not just 2 choices: the WG (with
> advice from SEC area if necessary) is free to limit the bandwidth of
> this covert channel anywhere between 0 and 29B per packet by simply
> limiting how much extensibility the protocol allows the option length
> field to offer, with a 0B covert channel corresponding to no extensibility.
>

OK. Michael.S abstains from the decision for SECDIR review, but other
co-chairs think this is an important point to be checked.
So, if there's no specific opposition, we would like to ask for SECDIR
review before WGLC.

Do authors want to update the draft beforehand to add some more
clarifications or are there any other thoughts on this?

Thanks,
--
Yoshi




> >>>
> >>> -----Ursprüngliche Nachricht-----
> >>> Von: Mirja Kuehlewind <ietf@kuehlewind.net>
> >>> Gesendet: Montag, 23. November 2020 12:39
> >>> An: Neal Cardwell <ncardwell@google.com>; Scharf, Michael
> >> <Michael.Scharf@hs-esslingen.de>; Bob Briscoe <ietf@bobbriscoe.net>
> >>> Cc: Yoshifumi Nishida <nsd.ietf@gmail.com>; tcpm IETF list
> >> <tcpm@ietf.org>; Scheffenegger, Richard
> >> <Richard.Scheffenegger@netapp.com>; Michael Tuexen <tuexen@fh-
> >> muenster.de>; tcpm-chairs@ietf.org
> >>> Betreff: Re: [tcpm] AccECN field order
> >>>
> >>> NetApp Security WARNING: This is an external email. Do not click links
> or
> >> open attachments unless you recognize the sender and know the content is
> >> safe.
> >>>
> >>>
> >>>
> >>> Hi all,
> >>>
> >>> I think I also support two options as this is the most simple solution.
> >>>
> >>> We probably need to look at section 3.2.3.2. (Path Traversal of the
> AccECN
> >> Option) again, as I think this section assumes mostly one option. Or I
> guess
> >> we could say that only one option should be used for a connection.
> >>> Regarding use of the option length for extensibility. I know new
> options are
> >> hard to deploy but that’s the extensibility mechanism we have with TCP.
> Not
> >> sure we want to invent a new now. If we think we need more extensibility
> >> for AccECN for any reason, we should specify valid option length values
> that
> >> include a flags field now.
> >>> Mirja
> >>>
> >>>
> >>>
> >>>> On 18. Nov 2020, at 01:03, Neal Cardwell <ncardwell@google.com>
> wrote:
> >>>>
> >>>> As someone who contributes to a TCP implementation, I would put in a
> >> vote for the "Two Option Kinds" proposal outlined in slide 6 here:
> >>>>
> >>>>
> https://datatracker.ietf.org/meeting/109/materials/slides-109-tcpm-mor
> >>>> e-accurate-ecn-feedback-in-tcp-ecn-adding-explicit-congestion-notifica
> >>>> tion-01#page=6
> >>>>
> >>>> This approach has the virtue of simplicity, which hopefully may help
> avoid
> >> middlebox bugs, speed standardization and development, and ease the
> >> process of maintaining fast and stable implementations.
> >>>> neal
> >>>>
> >>>>
> >>>> On Tue, Nov 17, 2020 at 9:25 AM Scharf, Michael <Michael.Scharf@hs-
> >> esslingen.de> wrote:
> >>>> Inline some comments [ms].
> >>>>
> >>>>
> >>>>
> >>>> Given that I don’t ask for any text chances, I’ll not follow-up
> forever in this
> >> discussion. I don’t own running code and a lot of encoding details
> mainly
> >> affect an implementation.
> >>>>
> >>>>
> >>>> IMHO the rest of the WG has to think about the option design more than
> >>>> me. So, this is mostly about triggering a discussion…
> >>>>
> >>>>
> >>>>
> >>>> From: Bob Briscoe <ietf@bobbriscoe.net>
> >>>> Sent: Tuesday, November 17, 2020 1:20 PM
> >>>> To: Scharf, Michael <Michael.Scharf@hs-esslingen.de>; Yoshifumi
> >>>> Nishida <nsd.ietf@gmail.com>
> >>>> Cc: Michael Tuexen <tuexen@fh-muenster.de>; tcpm-chairs@ietf.org;
> >>>> Mirja Kuehlewind <ietf@kuehlewind.net>; Scheffenegger, Richard
> >>>> <Richard.Scheffenegger@netapp.com>; tcpm IETF list <tcpm@ietf.org>
> >>>> Subject: Re: AccECN field order
> >>>>
> >>>>
> >>>>
> >>>> Michael,
> >>>>
> >>>> On 17/11/2020 08:10, Scharf, Michael wrote:
> >>>>
> >>>> Bob,
> >>>>
> >>>>
> >>>>
> >>>> I am fine with the two option kinds proposed in -13, but I don’t buy
> your
> >> arguments why this encoding is better than others.
> >>>>
> >>>>
> >>>> Most importantly, I don’t think that your “forward compatibility”
> >> argument is a very compelling reason for two codepoints. All proposals
> I am
> >> aware of have their pros and cons. And I am not aware of a really
> >> comprehensive discussion. At least neither the e-mail below nor today’s
> >> meeting discuss all tradeoffs I would investigate.
> >>>>
> >>>> [BB] You're right - the discussion below is useful and necessary.
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> For instance, the benefit of the length encoding variant would be to
> >> consume only one TCP option codepoint now. If we decided later to that a
> >> flag byte is needed (say, at the end), a follow-up proposed standard
> could
> >> specify another option format with that flag byte, using a second
> codepoint.
> >>>>
> >>>> [BB]
> >>>> * The new codepoint would require years to deploy (including in
> proxies)
> >> before it works e2e.
> >>>>
> >>>>
> >>>> [ms] That may depend *a lot* on the environment. In environments
> >> where ECN can get deployed today, say in datacenters, rolling out a new
> >> kernel version may perhaps not be the biggest operational challenge.
> Also,
> >> proxies may not be a significant problem in some of those cases.
> Deployment
> >> roadmaps are very hard to predict.
> >>>>
> >>>> * Whereas the 'forward compatibility' approach tries to ensure that
> >> AccECN implementations that are being built today will be ready to
> interwork
> >> with a future extension.
> >>>> * In contrast, if your hypothetical new AccECN codepoint did need to
> be
> >> deployed later, it would need to include a fall-back to the current
> AccECN
> >> option when one peer doesn't understand the new codepoint.
> >>>>
> >>>>
> >>>> [ms] This is a reasonable point, albeit not a particularly strong one,
> >>>> given that the option is not really required for basic
> >>>> interoperability. Also, a hypothetical follow-up standard could
> >>>> include a way to explicitly request the option…
> >>>>
> >>>>
> >>>> * Fall-back would need to avoid a second round of handshake (given
> >>>> this is for low latency), which would only work reliably with an
> >>>> option on the SYN (because the 3rd ACK is unreliable)
> >>>>
> >>>>
> >>>>
> >>>> [ms] I can’t follow. If an endpoint is unhappy with getting AccECN
> option
> >> “A” from a peer, I could send a “please send me the better AccECN
> option B”
> >> after the 3-WHS. It could be an upgrade, not a fallback. Also, at this
> point we
> >> don’t know what option B would be and in which context it would be
> >> needed. Maybe other protocol features would require negotiation, too.
> >> IMHO it is a solvable problem.
> >>>>
> >>>> * AccECN has so far avoided using any SYN option space, which is
> >> important given that is the scarcest resource.
> >>>>
> >>>>
> >>>> [ms] Yep, but as long as no proposal needs SYN options, this is
> nothing
> >> that would make one solution better than another.
> >>>> These days, extending TCP is like playing chess - we have to think
> multiple
> >> moves ahead!
> >>>>
> >>>>
> >>>> [ms] There is one fundamental difference between chess and TCP: In
> >> chess you precisely know the current situation and can predict all
> potential
> >> moves in advance (albeit there are a lot). However, we don’t know the
> >> future evolution of TCP, ECN and the Internet as a whole, nor future
> >> requirements. If we try to engineer a TCP extension for some potential
> >> future, we may figure out later that reality is different from what we
> >> designed for. As much as I appreciate your attempts to predict the
> future, it
> >> would be a big surprise to me if you could correctly predict what TCP
> will be in
> >> 10 years from now. So, instead of trying to write specifications that
> take into
> >> account future requirements, which are in fact just unknown, it is more
> >> important for me to write effective, efficient and secure
> specifications for
> >> what is currently known for sure.
> >>>>
> >>>>
> >>>> [ms] I *don’t* know for sure whether the current AccECN option will be
> >> needed, but I see quite some evidence that support of the AccECN
> option(s)
> >> is not a top priority these days. That is also something to think about
> when
> >> designing the details.
> >>>>
> >>>>
> >>>> I need to learn to articulate onto the list all my reasons for
> rejecting
> >> certain parts of the design space. Sorry about that.
> >>>> Yes, I admit, the current proposal is at the cost of burning two TCP
> option
> >> codepoints. However, you said yourself when you proposed this approach,
> >> that they are not (currently) a scarce resource. Certainly not as
> scarce as
> >> option space. I just checked: roughly 15% of the option codepoint
> allocation
> >> space has been used so far. So that's where I would suggest we
> compromise
> >> first.
> >>>> [ms] I made a similar calculation some years ago and came to a similar
> >> conclusion. Investing two codepoints for AccECN is something we can
> >> probably afford. But nonetheless we have to reason carefully why it is
> really
> >> worth the effort.
> >>>>
> >>>>
> >>>>
> >>>> Regarding the resulting codepoint consumption (two option kinds) and
> >> the addition of a flag byte, this approach would basically end up with
> the
> >> same result as the current proposal in -13 plus some hypothetical future
> >> addition leveraging the length field beyond the currently known use.
> >>>>
> >>>>
> >>>> And, yes, the length encoding variant may be less flexible and/or
> >> consume some more bits in some cases, but on the plus side it only needs
> >> one codepoint now – and given that it is entirely unclear whether any
> >> AccECN option will indeed be widely used in future, this is a big plus.
> The fact
> >> that implementers are quite silent on the option design is not a good
> sign.
> >>>>
> >>>> [BB] Here's another possibility then.
> >>>>
> >>>> a) [K|L| EE1B | ECEB | EE0B ]
> >>>> b) [K|L| EE1B | ECEB | EE0B |F]    if F = 0bXXXXXXX0
> >>>> c) [K|L| EE0B | ECEB | EE1B |F]    if F = 0bXXXXXXX1
> >>>>
> >>>> We'd have to decide which order alternative (a) takes. I've picked
> EE1B
> >> first only 'cos you're right that there is not currently as much
> pressure (on the
> >> public Internet) for AccECN with ECT(0).
> >>>> ==Legend==
> >>>> K:    Kind (1B)
> >>>> L:    Length (1B)
> >>>> ExxB: Echo xx byte counter
> >>>> F:    Flags (1B)
> >>>>
> >>>> Alternatives a) and b) are equivalent, at least while the only
> allocated flag
> >> is for field order.
> >>>> However, alternative b) is available in case other flags are allocated
> >>>> in future The flags byte can only be omitted if (L % 3 == 2).
> >>>> The flags byte is considered present if (L % 3) == 0.
> >>>>
> >>>> Forward compatibility: Options with (L % 3 == 1) MUST be assumed to
> >> include a flags byte, and current implementations ignore the last byte.
> >>>> The flags byte is optional to implement (even if the AccECN option is
> >>>> implemented) If the server includes a flags byte on the SYN/ACK but
> the
> >> client does not include one on the 3rd ACK or the first data packet,
> the server
> >> assumes the client does not implement the flags byte and uses only
> >> alternative a) for the remainder of the connection.
> >>>>
> >>>> [ms] I am not sure if we need that, but I take this as existence
> proof that
> >> other encodings are possible. Personally, I think that other solutions
> would
> >> be doable if you took one bit from one or multiple counters for format
> >> encoding. At least for some of the byte counters I don’t think taking
> one bit
> >> for other purposes would result in an Internet congestion collapse…
> But, I
> >> have already said that the -13 proposal works for me, so I’ll not try
> to come
> >> up with another variant myself.
> >>>>
> >>>>
> >>>> To me, one potential difference between two proposals would be
> >> incremental deployment. The proposal in -13 only has an advantage if
> >> middleboxes such as firewalls will indeed pass TCP options with a
> format that
> >> contains content beyond the (first) Accurate ECN standard (i.e.,
> currently
> >> unused length values). IMHO it is too early to know whether firewalls
> would
> >> indeed allow this in future.
> >>>>
> >>>>
> >>>>   From a security perspective, it is not clear to me whether allowing
> >> arbitrary unspecified bytes in a TCP option is a good idea *at all*. It
> will be
> >> interesting to hear the opinion from SEC area on that. Personally, I am
> not
> >> convinced that this really makes sense, but I my concerns are not strong
> >> enough to formally push back. I’ll leave it to others to think about
> whether
> >> this is a bug or a feature.
> >>>>
> >>>> [BB] Well, let's first try to deal with security ourselves:
> >>>> * Octets that are explicitly declared as part of an option cannot be
> used
> >> for a buffer overflow attack. I don't really need to, but I could add
> the
> >> following text to the forward compatibility wording:
> >>>>       A receiver considers octets beyond those it uses, but within the
> >> specified length, as if they are padding.
> >>>> * And such octets cannot be any different from the current ability of
> a
> >> sender to add padding. So there's no new attack possible here.
> >>>> * And there's no need to specify a max length for any AccECN Option,
> >> which would just unnecessarily limit flexibility.
> >>>> [ms] I have more thought about the covert channel that some
> unspecified
> >> bytes in a standards track TCP option could offer… In particular if the
> AccECN
> >> option gets widely deployed and used, would some malicious users find
> >> those bytes useful? For what? For instance, what in the AccECN protocol
> >> design prevents use of these “padding” bytes as super-cookie? To me, it
> is
> >> much more important to think about abuse of whatever we standardize
> >> *now*, instead of engineering for some entirely unknown future. I am
> not a
> >> security expert, but I suggest a careful analysis of any security
> implications of
> >> the AccECN option. We seldomly specify new TCP options and malicious
> >> users will certainly look for “opportunities” in the spec. So far, I
> don’t know
> >> whether that whole idea of forward compatibility is a feature or a bug.
> >>>>
> >>>>
> >>>> Michael
> >>>>
> >>>>
> >>>>
> >>>> Maybe one lesson learnt is that the document could have a non-
> >> normative appendix that explains the rationale for the finally picked
> TCP
> >> option encoding. That may also help if there are further questions
> whether
> >> two codepoints are really required, e.g. by the IESG (if two codepoints
> are
> >> still the design after WGLC). At least for past TCP option codepoint
> allocations
> >> I recall some discussions late in the IETF process. In those past
> cases, good
> >> arguments in an appendix and running code has helped a lot.
> >>>>
> >>>> [BB] I can do that. Appx B is already similar, giving Design
> Rationale for the
> >> ACE field.
> >>>>
> >>>> Bob
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> Michael
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> From: Bob Briscoe <ietf@bobbriscoe.net>
> >>>> Sent: Tuesday, November 17, 2020 6:10 AM
> >>>> To: Scharf, Michael <Michael.Scharf@hs-esslingen.de>; Yoshifumi
> >>>> Nishida <nsd.ietf@gmail.com>
> >>>> Cc: Michael Tuexen <tuexen@fh-muenster.de>; tcpm-chairs@ietf.org;
> >>>> Mirja Kuehlewind <ietf@kuehlewind.net>; Scheffenegger, Richard
> >>>> <Richard.Scheffenegger@netapp.com>; tcpm IETF list <tcpm@ietf.org>
> >>>> Subject: Re: AccECN field order
> >>>>
> >>>>
> >>>>
> >>>> Michael,
> >>>>
> >>>> On 16/11/2020 17:36, Scharf, Michael wrote:
> >>>>
> >>>> Bob,
> >>>>
> >>>>
> >>>>
> >>>> One proposal using the length field with *one option codepoint only*
> >>>> is detailed in:
> >>>> https://mailarchive.ietf.org/arch/msg/tcpm/zo-
> >> 1OR0nRfhHocX8yvTvpC4BNMo
> >>>> /
> >>>>
> >>>>
> >>>>
> >>>> It is the third option mentioned in this e-mail. One example would be
> to
> >> use option length values 5/8/11 for one encoding type and option length
> >> values 6/9/12 for the other encoding type (i.e., order of fields). Or
> one could
> >> use some other combination of length values – the only requirement is
> that a
> >> certain value for the option length is only used by one of the option
> formats.
> >> In that approach, the value of the length field would thus directly
> describe
> >> the encoding of the option. Unless I miss something, this would work
> and it
> >> would just require one option codepoint.
> >>>>
> >>>>
> >>>> Thus, alternatives to two option codepoints exist and I have explained
> >> them on the list in March 2020.
> >>>>
> >>>> OK, sorry, yes, I remember this now.
> >>>>
> >>>> As I will explain in the AccECN status update talk today in virtual
> Bangkok,
> >> the draft has made provision for different length values than 5/8/11.
> It says
> >> existing implementations MUST accept length values other than those
> >> currently defined. But then read in as many whole 3-byte fields as they
> can.
> >>>> This can be used to add a flags byte on the end in future, for
> extensibility.
> >> Or any other form of extensibility the WG might decide in the future.
> >>>> I know a flags byte at the end seems odd compared to at the beginning.
> >> But (if decided it's needed in future) it's reasonably easy to
> implement by
> >> reading the whole option, then processing the last byte, before reading
> the
> >> rest of the option.
> >>>> I believe you will agree that this is a better way to utilize
> different lengths.
> >>>>
> >>>> And thank you for repeatedly emphasizing that you're happy with the 2-
> >> kind scheme, or other alternatives.
> >>>>
> >>>> Bob
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> Anyway, I don’t really care how the options are encoded as long as the
> >> receiver doesn’t need per-connection state for decoding a TCP option.
> So,
> >> personally, I would be fine with using e.g. the length field as
> described in my
> >> old e-mail. Or an additional flag byte. And one could come up with
> further
> >> encodings, e.g., by using one or a few bits as a short “type” field for
> each
> >> counter. This is all about protocol engineering. And all these variants
> have
> >> their pros and cons.
> >>>>
> >>>>
> >>>> I am also fine with using two option codepoints as specified in -13;
> this is
> >> probably the approach that consumes the least number of bits.
> >>>>
> >>>>
> >>>> Michael (w/o any hat)
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> From: Bob Briscoe <ietf@bobbriscoe.net>
> >>>> Sent: Monday, November 16, 2020 5:52 PM
> >>>> To: Yoshifumi Nishida <nsd.ietf@gmail.com>
> >>>> Cc: Scharf, Michael <Michael.Scharf@hs-esslingen.de>; Michael Tuexen
> >>>> <tuexen@fh-muenster.de>; tcpm-chairs@ietf.org; Mirja Kuehlewind
> >>>> <ietf@kuehlewind.net>; Scheffenegger, Richard
> >>>> <Richard.Scheffenegger@netapp.com>; tcpm IETF list <tcpm@ietf.org>
> >>>> Subject: AccECN field order
> >>>>
> >>>>
> >>>>
> >>>> Yoshi, (adding the tcpm list in cc)
> >>>>
> >>>> On 05/11/2020 06:58, Yoshifumi Nishida wrote:
> >>>>
> >>>> Hi Bob,
> >>>>
> >>>>
> >>>>
> >>>> On Wed, Nov 4, 2020 at 3:29 PM Bob Briscoe <ietf@bobbriscoe.net>
> >> wrote:
> >>>> Yoshi,
> >>>>
> >>>> On 04/11/2020 06:51, Yoshifumi Nishida wrote:
> >>>>
> >>>> Hi, folks,
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> In my understanding, I'm not sure if we settled down on using two
> option
> >> kinds or encoding schemes for 24bits fields in acc ecn draft.
> >>>> So, I think there're still something to be clarified and hope things
> will be
> >> settled at the meeting.
> >>>>
> >>>> [BB] I know a WG can change it's mind at any time. But I'd rather we
> just
> >> clarified what a previous decision was, to avoid the need to keep
> re-opening
> >> discussion on a question that have been decided then changed three
> >> different ways already.
> >>>> My memory is not so good these days. I trusted that Michael S
> >> remembered the decision correctly, and I seem to remember that decision
> >> being made.
> >>>> I've just checked the minutes of the last interim:
> >>>>
> >>>>
> https://datatracker.ietf.org/doc/minutes-interim-2020-tcpm-01-20200429
> >>>> 1600/ and they mention Michael's proposal to use two kinds, but don't
> >>>> record any decision.
> >>>> The jabber log gives no clues about any decision.
> >>>>
> >>>> I can't find an audio or video recording. Can you point me at one?
> >>>>
> >>>>
> >>>>
> >>>> I thought that it's because there was no clear decision at the
> meeting.
> >>>>
> >>>> But, you can check https://www.youtube.com/watch?v=KsB0_Nb8-kA
> >>>>
> >>>> Please let us know if you have any questions or opinions with regard
> to
> >> this.
> >>>>
> >>>> [BB] I checked the Youtube link you sent below.
> >>>>
> >>>> First I think we're agreed no-one was fighting for us to keep the
> previous
> >> way we did this (using the initial value of the field to set the order
> for the
> >> connection).
> >>>> In my presentation I said there was strong resistance from Michael to
> do it
> >> a different way.
> >>>> (also, offlist, the co-authors including me also didn't like this so
> >>>> much. And Ilpo said it made the implementation complex.)
> >>>>
> >>>> Then came the question of what we do instead. There were three
> >> alternative proposals:
> >>>> a) use 2 option kinds
> >>>> b) add a flags byte
> >>>> c) somehow use the length field maybe
> >>>>
> >>>> Michael raised (c) in the meeting as a possibility, but no-one could
> think
> >> how to distinguish two options of the same length but a different field
> order
> >> using the length field. Michael said he'd post any ideas to the list if
> he could
> >> think of any, but that didn't happen.
> >>>> So we're left choosing between (a) and (b).
> >>>> I said in the meeting (and on the list when discussing with Ilpo)
> that I'd be
> >> happy to go with (b), but only if there was another use for a flag.
> Because it
> >> would consume 1B more options space in many packets, which is a scarce
> >> resource.
> >>>> Ilpo had a proposed use for another flag (to help synch counters
> after a
> >> loss), but I think the discussion about it ended that it wouldn't be
> helpful, 'cos
> >> the way it worked depended on itself (circular logic).
> >>>> In conclusion, I don't think there was an explicit decision to go
> with 2
> >> option kinds, but it ended up as the 'last person standing'.
> >>>> I like it. It's simple. And apparently option kinds are not such a
> scarce
> >> resource.
> >>>> Perhaps we can ratify this in the WG tomorrow.
> >>>>
> >>>>
> >>>> Bob
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> Thanks,
> >>>>
> >>>> --
> >>>>
> >>>> Yoshi
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> --
> >>>>
> >> __________________________________________________________
> >> ______
> >>>> Bob Briscoe                               http://bobbriscoe.net/
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> --
> >>>>
> >> __________________________________________________________
> >> ______
> >>>> Bob Briscoe                               http://bobbriscoe.net/
> >>>>
> >>>>
> >>>>
> >>>> --
> >>>>
> >> __________________________________________________________
> >> ______
> >>>> Bob Briscoe                               http://bobbriscoe.net/
> >>>> _______________________________________________
> >>>> tcpm mailing list
> >>>> tcpm@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/tcpm
> >> --
> >> __________________________________________________________
> >> ______
> >> Bob Briscoe                               http://bobbriscoe.net/
>
> --
> ________________________________________________________________
> Bob Briscoe                               http://bobbriscoe.net/
>
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm
>