Re: [tcpm] New Version Notification for draft-touch-tcpm-tcp-edo-01.txt

Joe Touch <touch@isi.edu> Mon, 05 May 2014 16:15 UTC

Return-Path: <touch@isi.edu>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAA5A1A037A for <tcpm@ietfa.amsl.com>; Mon, 5 May 2014 09:15:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.851
X-Spam-Level:
X-Spam-Status: No, score=-4.851 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a0fo2SQhjIzs for <tcpm@ietfa.amsl.com>; Mon, 5 May 2014 09:15:22 -0700 (PDT)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) by ietfa.amsl.com (Postfix) with ESMTP id F048C1A03A6 for <tcpm@ietf.org>; Mon, 5 May 2014 09:15:21 -0700 (PDT)
Received: from [192.168.1.93] (pool-71-105-87-112.lsanca.dsl-w.verizon.net [71.105.87.112]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id s45GE61e025816 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 5 May 2014 09:14:25 -0700 (PDT)
Message-ID: <5367B8D1.30500@isi.edu>
Date: Mon, 05 May 2014 09:14:09 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.5.0
MIME-Version: 1.0
To: Costin Raiciu <c.raiciu@cs.ucl.ac.uk>
References: <20140425221257.12559.43206.idtracker@ietfa.amsl.com> <2586_1398464386_535ADF82_2586_915_1_535ADF56.9050106@isi.edu> <CF8D8E25-E435-4199-8FD6-3F7066447292@iki.fi> <5363AF84.8090701@mti-systems.com> <5363B397.8090009@isi.edu> <CAO249yeyr5q21-=e6p5azwULOh1_jUsniZ6YPcDYd69av8MMYw@mail.gmail.com> <DCC98F94-EA74-4AAA-94AE-E399A405AF13@isi.edu> <655C07320163294895BBADA28372AF5D2CFE36@FR712WXCHMBA15.zeu.alcatel-lucent.com> <536548D7.5030802@uclouvain.be> <5367B0F1.1000403@isi.edu> <45E71AD0-D376-4E59-A094-19DAEFCE22D3@cs.ucl.ac.uk>
In-Reply-To: <45E71AD0-D376-4E59-A094-19DAEFCE22D3@cs.ucl.ac.uk>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpm/RbzVWUGe5tKuHtEK4UFBOsmD3-E
Cc: "tcpm@ietf.org" <tcpm@ietf.org>
Subject: Re: [tcpm] New Version Notification for draft-touch-tcpm-tcp-edo-01.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 May 2014 16:15:25 -0000


On 5/5/2014 9:04 AM, Costin Raiciu wrote:
>> A middlebox that examines the contents of TCP traffic - or worse, modifies it - needs to follow all of RFC1122 host requirements. It's interpreting content - if it sees a SYN with an unknown option, it ought to have removed it or dropped the SYN.
>>
>> If it doesn't, you have a device that is broken and needs to be
>> replaced.
>>
>> We should design TCP to be liberal in what it accepts, but no
>> Internet protocol should be designed to overcome deliberate
>> implementation errors.
>>
> As much as I agree with this purist view of the Internet, I also
> believe it is unworkable if we want stuff deployed.
>
> Say we actually stuck to the plan and designed EDO for a world with
> reasonable middleboxes. Then we implement it in Linux, then we turn it
> on by default. Then, all of a sudden the Internet stops working, and you
> have disgruntled users cursing Linux right and left....

Linux already runs lots of things we didn't approve, and never seems to 
take any blame. I don't see avoiding Linux user ire as a viable approach.

> Trouble is, for middleboxes to change you need to have a working
> protocol (that is maybe suboptimal) and a strong need for the change,
> and push from OS/app vendors etc.

For middleboxes to change, they have to start breaking things. As long 
as we adapt to the errors they make, we're helping create their market.

I agree with your overall point that we do need to consider how/whether 
this can avoid being held hostage by middleboxes, and a *temporary* 
header checksum might be a way.

But ultimately, that still means the new option will not work through 
middleboxes, and lots of people will not consider that the fault of the 
middlebox.

Joe