[tcpm] Is ECN a valid TCP header flag?
t petch <ietfa@btconnect.com> Fri, 24 September 2021 10:06 UTC
Return-Path: <ietfa@btconnect.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id F02BB3A21D9
for <tcpm@ietfa.amsl.com>; Fri, 24 Sep 2021 03:06:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_MSPIKE_H2=-0.001,
SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key)
header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id KHflt5WI3VOb for <tcpm@ietfa.amsl.com>;
Fri, 24 Sep 2021 03:06:01 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
(mail-eopbgr80103.outbound.protection.outlook.com [40.107.8.103])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 523E53A21DC
for <tcpm@ietf.org>; Fri, 24 Sep 2021 03:06:01 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=fQD2qtXb23bYuMw3jLVirK91vWopEaBLuQqNSaJ4gmn9lBXVpwRpVe4/rNmsn3GjIGuTz1IFeyrTKwTh25xrE0iPlu6mrjG/B59mGUrOtcEywpziiW4+RGkkhmJQP4I6gQjsZPAyUwkcZXczjL2kjz11SHtPiVwppbSys4PNhEG0u20Z8nwHM0R//k9bOJD87kyMf3R4yv9qHHssAkjy/7EgQ3vFxQR1VQnlHn8nWyOLlMbniqT+ed7cWQS5JnmENchXcttsakCTbnYmDqXA1FvHjeQd4CP2W/JB6J2WwsBdrEydu566FmYbD7PFTrLG/EgYN/Wti0AokzjvVWDYvg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1yPki4C0mgEyiYH7fgPWMuIBAimzp+gF7LMId2ZatJo=;
b=WVFxMV6JD2cQ7OZC4U+xZo1cpXWcxNjhT0fGMf6Wx4DvsMCU+6srBM/NALIhWa34Lh2Co+ZsXpMsyj6PzCj8Bbsyd/3wqGlD1WuiRn4FkElLbuLQnJFmw+saVs4wshgn6nSY7AD5jsytCh45pQOug0dmQnriKtEn6tTtSuY5T3uUGSyiyYRegj5ddB5dmtjz6c5RdsXn9qeGH9z9PMoxIa6CGq8/zv3bPnjkal7TFi7OkPYXwqAPGouTb2OSqVuKsCOD7EOzXypWbySjcLnJuXDjfibGzBOlvPJxjaoHQhOUCDCXR4hiNaLRASM/7Egu3Mpk1eLZTKuL6ztdTb+8Gg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
smtp.mailfrom=btconnect.com; dmarc=pass action=none
header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=1yPki4C0mgEyiYH7fgPWMuIBAimzp+gF7LMId2ZatJo=;
b=mwzNPGnKmRG3jrWaeQr/KLhbh6X+CBvxBSroCtWh0aCkm11V+qEqSitwyyHJiyz2CH0FjtnMt8h2QE+sQXJVcchX0JuSd5Lf5qI9GUgStG5ToTuqzjys9LT90/LAFlntqWTpLuFnb3WZ0vCk2e+pxGFMWTj9Jv1U5A0omW2f958=
Authentication-Results: ietf.org; dkim=none (message not signed)
header.d=none;ietf.org; dmarc=none action=none header.from=btconnect.com;
Received: from DB7PR07MB5546.eurprd07.prod.outlook.com (2603:10a6:10:73::23)
by DB7PR07MB4475.eurprd07.prod.outlook.com (2603:10a6:5:38::30) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4544.11; Fri, 24 Sep
2021 10:05:57 +0000
Received: from DB7PR07MB5546.eurprd07.prod.outlook.com
([fe80::1df3:bc53:dcc9:1187]) by DB7PR07MB5546.eurprd07.prod.outlook.com
([fe80::1df3:bc53:dcc9:1187%4]) with mapi id 15.20.4566.008; Fri, 24 Sep 2021
10:05:57 +0000
To: tcpm <tcpm@ietf.org>
From: t petch <ietfa@btconnect.com>
Message-ID: <614DA301.4030902@btconnect.com>
Date: Fri, 24 Sep 2021 11:05:53 +0100
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:38.0) Gecko/20100101
Thunderbird/38.5.0
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: LO4P123CA0330.GBRP123.PROD.OUTLOOK.COM
(2603:10a6:600:18c::11) To DB7PR07MB5546.eurprd07.prod.outlook.com
(2603:10a6:10:73::23)
MIME-Version: 1.0
Received: from [192.168.1.65] (86.131.120.159) by
LO4P123CA0330.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:18c::11) with Microsoft
SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
15.20.4544.13 via Frontend Transport; Fri, 24 Sep 2021 10:05:57 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f4591502-67f0-4403-0482-08d97f42e764
X-MS-TrafficTypeDiagnostic: DB7PR07MB4475:
X-Microsoft-Antispam-PRVS: <DB7PR07MB4475D6C201721609E5A27BC7A2A49@DB7PR07MB4475.eurprd07.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:9508;
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: ETvxyhvdsLBynpDmSS2I21j0CBM8pldZ5tFaYNu7MM9FHpxVpt/WdBqHhLZyWOdY45cG333adOl6/gg1Sp4cxKqgkjy2lxMA0ModEd68S5rG7s4SlcDUi/V0HaDgy5G+ygPmEpUqEWqUQXzXyRINnEeQYBp3UPDoczJ381JjJPTpzRsi4QcvZTIzSQhujNsLfEYsGIhOSAFCN2gPMs6/0XR6ze+575Boi6gm66OnmQ9PunBarxw3wmviBHKSp5i8UdDAFkG8nlf04YWPj/0Lkt4vOx3UOTQFoUp5TKbAMjgK41XH9jHmP45TKG3JMky6bsykJDXHsjejeQOP07WnkrDuqKT2vUnZHhCM2xnkoU/yn9LytmT7VwjTvM/VqXgnXY8ndoRPZPONWK4T6TT6eWOc4vdkXqpFrxdGVlxKHkAAPZwvyN/CkiJY9/FCjZyrRvhwnfVRajrXo2GmOSWudkmpJfA3k4W5VBSjMpLEy/LYi7FZvMbBIdsIUzKjdxeyQKYlFGYsIImzAmH6BRymgi60bbjxVskBW4HlmwM2s9QISYLg+TWcZ/MK9d7mZKryqG39NY8ErQtFWGS7qxhx7jC/Ki+HRVRufoYOG/AVpz1yljE6BhiDDdnsm1iPfdu1oCJiRKw1OZfd4b2xUfvyC+busCuexuHW9PNawSd8EpYGB7NyrZOcTA+T2arK5HlheV+otdzQExL3Jx1ZmTQbbg==
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM;
H:DB7PR07MB5546.eurprd07.prod.outlook.com; PTR:; CAT:NONE;
SFS:(366004)(6666004)(36756003)(38350700002)(38100700002)(6916009)(26005)(8936002)(8676002)(6486002)(2616005)(5660300002)(33656002)(186003)(956004)(508600001)(83380400001)(16576012)(316002)(66556008)(2906002)(86362001)(87266011)(66946007)(52116002)(66476007);
DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?Windows-1252?Q?+VAgOweIKurDMTrhtlpn7xwKlJyGsip0Zv+ugT8K4zqjBjIjDxYCQ7Rk?=
=?Windows-1252?Q?JKPX74p2Hj9ZkUfGREdl0tFCm5Po4IOiUu0CPLMcnvVf32HTAPNFNUsH?=
=?Windows-1252?Q?ODzymBoLSncL0RqghAu4lpnX+eIIm/KpwNtzs74xnIWq6hHyZhMjw+Ai?=
=?Windows-1252?Q?v0rFX/jBe6dJjVeU71C8+YK4WMIP3AVmHBoTT2UdxnChp+lKrzHbcMt8?=
=?Windows-1252?Q?TLZZWkB7FEI5LmH56JW478WnL8bwxZnklB0AqefIz0zc6wCIsracGG/X?=
=?Windows-1252?Q?1JwJw8Rd+eSHtny/N2GVA4SPa0mAHaqkb1kTOrF3waiCjezrdXt9nWy0?=
=?Windows-1252?Q?jLvs6Tdn5u+9p9ZkiWnFdo1i2qTOC6OJwCzQxtVSiiwmdgyX1ts2HBzt?=
=?Windows-1252?Q?UjUo3XlnK3oROihZhE3E8Jil7arNqWStJJjo/4TU2P5MmegNFGojyDHE?=
=?Windows-1252?Q?ajy5j1euTH9QNGBizpd26iY6yyhoZNNUiHiEYSTJRjlnlj16dnnM9nWS?=
=?Windows-1252?Q?r1HYaa9h/OfDKoyTnjU3Y6wGkCB2K/48h4Cd3DhrvdwZzAUhyJHt3tFf?=
=?Windows-1252?Q?8UFrROgitCXRs6canwb7AeWsToHdtT3llEXtCtUGOOF8ldRPcmQV5lKK?=
=?Windows-1252?Q?3pzZxNM5iLhZj3PT30Ugtjz1+7W7rlajeo+6K0bdCzoZmz+THfr51OcN?=
=?Windows-1252?Q?BeMNRAw2ezh2Y9bhpB6LPxBINETvt/mLfCtwM4tmA4aSBIRIVNxNg58f?=
=?Windows-1252?Q?If38WtwV1pqeuYf65l5szVKe3HDmzAnlPm1bsUaPFiHXVW1HStT0FDmB?=
=?Windows-1252?Q?0ZDEZlfn7v+Fh8nl5Q1OwBBllHNut3egkA1E44RoH97vMJaXrS6H3sNP?=
=?Windows-1252?Q?rc2l7yxUCqrkzLQDVW/sSJGkpL3J+Fej9pOS6O89ouyfCfmeJjZsQA4Y?=
=?Windows-1252?Q?xQkl5Mkc6rWPDnPGiY9CPsyqQ3PfauIX3LUMmAkHP1M0XDzNq06z9pM8?=
=?Windows-1252?Q?hKcnr2N84lPGqfYGPLx2Ij/B4NTuEJflS/DQ5+8sxxBWVZ+faG1Xte0z?=
=?Windows-1252?Q?r9kudFju+ZoEdpUdOzc3dtC3GZ8Ogb7UtM8XvWOVzXrkRIYuoCt/tCRF?=
=?Windows-1252?Q?bEJOtmOq8rx0+fsuxmxgjdovuBOdT8kK2wdOAOqjzZ1ITma93LxhEwq8?=
=?Windows-1252?Q?NA0vPzhURZ++N+QTAgrYmuCqf+p6DaeuuG/rOJhxorDSYzaZ7tfxu1z9?=
=?Windows-1252?Q?yMHReGpiPUDa8Dh4cnOskxIKSZeQGSe7xkhv6u6OWTgsSmfAvR1H4Ft7?=
=?Windows-1252?Q?DzREUDN0z1ZC5KHuV+xYyEbbkPF1BaKONlFGXLOtlyEEfJzsTkDzcm/i?=
=?Windows-1252?Q?VwO+M3b7AsHRWCOWiQfwGAq1Sr8JMf6R2dVXD0epYMy4PYLmotiPUKtq?=
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f4591502-67f0-4403-0482-08d97f42e764
X-MS-Exchange-CrossTenant-AuthSource: DB7PR07MB5546.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Sep 2021 10:05:57.7715 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 8BaxEE7QQQwgzH9BXyyCEar39aQsuE2aMnP2Hch65BmWeVK+pfvFDc9ldmJVe7QNTbjDBzBnqMcXxjzzvS37hg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR07MB4475
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/uTTZKs04oWvtbP5UjXPfLOmU_I8>
Subject: [tcpm] Is ECN a valid TCP header flag?
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>,
<mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>,
<mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Sep 2021 10:06:07 -0000
This question came to me seeing the IESG discussion of an OPSAWG I-D
which modelled, in part, TCP, in YANG, but did not model it the way TCPM
does.
There is a lot of this about, as in I2NSF, which has the most detailed
model I see of TCP although not in a way that is likely to be used by
those operating TCP.
Thus draft-ietf-i2nsf-nsf-facing-interface-dm provides identities such as
identity tcp-flags {
which is then used as
base tcp-flags;
identity cwr {
identity ecn {
identity urg {
identity ack {
identity psh {
identity rst {
identity syn {
identity fin {
with descriptions and references. My knowledge of this is limited but I
suspect that the reference for 'ecn' should be RFC3168 and not RFC793
but then should it be 'ece' and not 'ecn'? I suspect that a TCP expert
might see rather more idiosyncrasies. Is RFC793 still the right
reference or should it be 793bis? Both are used.
Details of TCP also appear in
draft-ietf-i2nsf-capability-data-model
draft-ietf-i2nsf-consumer-facing-interface-dm
draft-ietf-i2nsf-nsf-monitoring-data-model
as do details of IP and a wide range of application and transport
protocols; I suspect that those with an attention to detail and an
interest in transport could have a field day here.
Tom Petch
- [tcpm] Is ECN a valid TCP header flag? t petch
- Re: [tcpm] Is ECN a valid TCP header flag? Scharf, Michael
- Re: [tcpm] Is ECN a valid TCP header flag? tom petch
- [tcpm] TSVART review of I2NSF Re: Is ECN a valid … tom petch
- Re: [tcpm] Is ECN a valid TCP header flag? Jonathan Morton
- Re: [tcpm] Is ECN a valid TCP header flag? tom petch