Re: [tcpm] Definition of SMSS/RMSS in RFC5681 are inaccurate?!

Joe Touch <touch@isi.edu> Mon, 26 July 2010 15:59 UTC

Return-Path: <touch@isi.edu>
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3FF5A3A6A59 for <tcpm@core3.amsl.com>; Mon, 26 Jul 2010 08:59:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.904
X-Spam-Level:
X-Spam-Status: No, score=-1.904 tagged_above=-999 required=5 tests=[AWL=-0.695, BAYES_00=-2.599, PLING_QUERY=1.39]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nyZiDL9jQH8J for <tcpm@core3.amsl.com>; Mon, 26 Jul 2010 08:59:27 -0700 (PDT)
Received: from nitro.isi.edu (nitro.isi.edu [128.9.208.207]) by core3.amsl.com (Postfix) with ESMTP id 7B7403A681A for <tcpm@ietf.org>; Mon, 26 Jul 2010 08:59:27 -0700 (PDT)
Received: from [130.129.133.227] (dhcp-85e3.meeting.ietf.org [130.129.133.227]) (authenticated bits=0) by nitro.isi.edu (8.13.8/8.13.8) with ESMTP id o6QFwAqI019856 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 26 Jul 2010 08:58:22 -0700 (PDT)
Message-ID: <4C4DB091.8030506@isi.edu>
Date: Mon, 26 Jul 2010 08:58:09 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.11) Gecko/20100711 Thunderbird/3.0.6
MIME-Version: 1.0
To: Hagen Paul Pfeifer <hagen@jauu.net>
References: <62315AD7-72BE-42A1-AEFB-E706C54BF50A@nets.rwth-aachen.de> <07e7e311cf5541066605d58353cc4681@localhost>
In-Reply-To: <07e7e311cf5541066605d58353cc4681@localhost>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-MailScanner-ID: o6QFwAqI019856
X-ISI-4-69-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: "tcpm@ietf.org Extensions" <tcpm@ietf.org>, David Borman <david.borman@windriver.com>
Subject: Re: [tcpm] Definition of SMSS/RMSS in RFC5681 are inaccurate?!
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jul 2010 15:59:28 -0000

Hi, all,

On 7/26/2010 8:43 AM, Hagen Paul Pfeifer wrote:
>
> On Mon, 26 Jul 2010 14:33:26 +0200, Alexander Zimmermann wrote:
>
>> The size does not include the TCP/IP headers and options. This is wrong!
>> The options are the TCP/IP headers.
>
> Strange that nobody spotted this. "The options are the TCP/IP headers",
> what does this mean? draft-ietf-tcpm-tcpmss-03 should be mentioned instead:
>
>     The MSS value to be sent in an MSS option should be equal to the
>     effective MTU minus the fixed IP and TCP headers.

Some of us just spotted this, and you just typed faster than we did ;-)

Yes, RFC5681 is correct, and draft-ietf-tcpm-tcpmss intends to update 
RFC879 and RFC2385.

Note that RFC2385 is already obsoleted by RFC5925, which states:

    Please note that the use of TCP-AO does not affect TCP's advertised
    maximum segment size (MSS), as is the case for all TCP options
    [Bo09].

This statement is consistent with draft-ietf-tcpm-tcpmss, FWIW.

(Dave - does this mean that draft-ietf-tcpm-tcpmssSec 3.2 might include 
a note that it updates 2385 even though 2385 is obsoleted...?)

Joe