Re: [tcpm] draft-ietf-tcpm-tcp-uto-02

Ted Faber <faber@ISI.EDU> Fri, 09 December 2005 18:26 UTC

Received: from localhost.cnri.reston.va.us ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1EkmxM-0000tq-I9; Fri, 09 Dec 2005 13:26:56 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1EkmxK-0000pO-Fj for tcpm@megatron.ietf.org; Fri, 09 Dec 2005 13:26:54 -0500
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA11100 for <tcpm@ietf.org>; Fri, 9 Dec 2005 13:25:59 -0500 (EST)
Received: from boreas.isi.edu ([128.9.160.161]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1EkmxX-0005sG-78 for tcpm@ietf.org; Fri, 09 Dec 2005 13:27:08 -0500
Received: from hut.isi.edu (hut.isi.edu [128.9.168.160]) by boreas.isi.edu (8.11.6p2+0917/8.11.2) with ESMTP id jB9IPW008914; Fri, 9 Dec 2005 10:25:32 -0800 (PST)
Received: (from faber@localhost) by hut.isi.edu (8.13.4/8.13.4/Submit) id jB9IPV5x005429; Fri, 9 Dec 2005 10:25:31 -0800 (PST) (envelope-from faber)
Date: Fri, 09 Dec 2005 10:25:31 -0800
From: Ted Faber <faber@ISI.EDU>
To: Fernando Gont <fernando@gont.com.ar>
Subject: Re: [tcpm] draft-ietf-tcpm-tcp-uto-02
Message-ID: <20051209182531.GC1177@hut.isi.edu>
References: <BF9BD734.4234%gorry@erg.abdn.ac.uk> <6.2.0.14.0.20051201035418.0323fc48@localhost> <4390569C.6050004@erg.abdn.ac.uk> <6.2.0.14.0.20051202201002.048b5de8@localhost> <20051208222808.GB22920@hut.isi.edu> <6.2.0.14.0.20051208164304.041ead70@localhost>
Mime-Version: 1.0
In-Reply-To: <6.2.0.14.0.20051208164304.041ead70@localhost>
User-Agent: Mutt/1.4.2.1i
X-url: http://www.isi.edu/~faber
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: faber@hut.isi.edu
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 6cca30437e2d04f45110f2ff8dc1b1d5
Cc: gorry@erg.abdn.ac.uk, Lars Eggert <lars.eggert@netlab.nec.de>, tcpm@ietf.org, "mallman@icir.org" <mallman@icir.org>
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0178733785=="
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

On Thu, Dec 08, 2005 at 04:51:13PM -0800, Fernando Gont wrote:
> At 02:28 p.m. 08/12/2005, Ted Faber wrote:
> 
> >> >Do you mean there are no cases where application semantics can change 
> >as a
> >> >result of using this option.
> >>
> >> The application should care about application-layer timeouts, not about
> >> transport-layer timeouts.
> >
> >TCP provides an interface that the application can use to set this
> >timeout in RFC793.  Breaking applications that made use of it should not
> >be done lightly, even if there are alternative mechanisms that those
> >applications could have used.
> 
> Agreed.
> 
> But we agreed that the application-specified UTO would take precedence. And 
> that, in the event a system-wide toggle existed, it would default to off.
> 
> So if you were using UTO, either the application programmer or the system 
> administrator decided to do so.

I think you mean that if you're using UTO negotiation it's because of an
active decision, which is IMHO, correct.

> 
> (From a theoretical point of view, I'd probably argue that an application 
> that really *breaks* because the user timeout ends up being longer than 2 
> minutes or whatever, then it's already broken. And, even then, we have 
> higher and lower limits for the UTO, which one would hope will keep the UTO 
> "within acceptable values". But well, as I pointed out above, this would 
> not even be the case.)

If you're arguing that implementation of the user timeout is more likely
to be flaky than more core features of the protocol, I agree.  Relying
on the urgent pointer has similar practical issues.  So does relying on
the UNIX sleep or usleep timers.

The mechanism described in 793 and 1122 is a perfectly reasonable
definition of a timeout system that an application could use to take
action if data's not delivered in a timely fashion.  In a system where
those mechanisms are implemented to spec, I don't see why using them
would break an application.  And that seems to be what you're saying.

-- 
Ted Faber
http://www.isi.edu/~faber           PGP: http://www.isi.edu/~faber/pubkeys.asc
Unexpected attachment on this mail? See http://www.isi.edu/~faber/FAQ.html#SIG
_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www1.ietf.org/mailman/listinfo/tcpm