RE: [Trigtran] TRIGTRAN Justification

"Spencer Dawkins" <sdawkins@cynetanetworks.com> Fri, 17 January 2003 01:29 UTC

Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA28605 for <trigtran-archive@odin.ietf.org>; Thu, 16 Jan 2003 20:29:10 -0500 (EST)
Received: (from mailnull@localhost) by www1.ietf.org (8.11.6/8.11.6) id h0H1iVr08121 for trigtran-archive@odin.ietf.org; Thu, 16 Jan 2003 20:44:31 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h0H1iVJ08118 for <trigtran-web-archive@optimus.ietf.org>; Thu, 16 Jan 2003 20:44:31 -0500
Received: from www1.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA28585 for <trigtran-web-archive@ietf.org>; Thu, 16 Jan 2003 20:28:39 -0500 (EST)
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h0H1iDJ08089; Thu, 16 Jan 2003 20:44:13 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h0H1hvJ08049 for <trigtran@optimus.ietf.org>; Thu, 16 Jan 2003 20:43:57 -0500
Received: from MAIL.cynetanetworks.com (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA28572 for <trigtran@ietf.org>; Thu, 16 Jan 2003 20:28:05 -0500 (EST)
X-MimeOLE: Produced By Microsoft Exchange V6.0.6249.0
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Subject: RE: [Trigtran] TRIGTRAN Justification
Date: Thu, 16 Jan 2003 19:31:27 -0600
Message-ID: <9255B6CD76A88943A3062F7D4E6432F51030E8@mail.cynetanetworks.com>
Thread-Topic: [Trigtran] TRIGTRAN Justification
Thread-Index: AcK8TuZSaBIZ/e7cSwqHrV19GSRPFgAfapKgAD3fVDA=
From: Spencer Dawkins <sdawkins@cynetanetworks.com>
To: trigtran@ietf.org
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by www1.ietf.org id h0H1hwJ08050
Sender: trigtran-admin@ietf.org
Errors-To: trigtran-admin@ietf.org
X-BeenThere: trigtran@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/trigtran>, <mailto:trigtran-request@ietf.org?subject=unsubscribe>
List-Id: Triggers for Transport <trigtran.ietf.org>
List-Post: <mailto:trigtran@ietf.org>
List-Help: <mailto:trigtran-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/trigtran>, <mailto:trigtran-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 8bit
Content-Transfer-Encoding: 8bit

Hi, Yogesh,

I have some notes (inline) - thanks for your helpful thoughts...

Spencer

> -----Original Message-----
> From: Yogesh.Swami@nokia.com [mailto:Yogesh.Swami@nokia.com]
> Sent: Wednesday, January 15, 2003 1:41 PM
> To: carlw@mcsr-labs.org; Spencer Dawkins; trigtran@ietf.org
> Subject: RE: [Trigtran] TRIGTRAN Justification
> 
> 
> Hi,
> 
> I have a couple of questions/comments based on these E-mails
> (these issues might have already been addressed, but I was unable
> to access the link that Spencer provided; can someone point me to
> the right link?). Here are my questions/comments:
> 
> --  Is TRIGTRAN only considering TCP, or can other transport
> protocols such as RTP over UDP, or raw UDP with TFRC, also make use of
> it?

As one data point - I've been asked by one streaming media vendor (hint, hint) for help with mobiles that can't sent RTCP messages when they're not reachable (there's nothing that tells the RTP sender that this is happening).

I can't tell you that TRIGTRAN needs to take this on, or that this is a solvable problem. I'm just passing the request through to the mailing list.

> 
> --  If it's supposed to help other protocols like RTP over UDP, or
> UDP using TFRC for rate control, then we need to keep in mind that
> unlike TCP, RTP does not have a protocol field in the IP
> header. This means that given a stream of UDP packets, one cannot
> *reliably* say if these packets belong to a RTP session, of if
> they belong to some other protocol on top of UDP which just
> happens to have the same format (It's good to be a little paranoid
> while designing a new protocol, so don't bite off my head if you
> think that the probability of such collisions are small) This also
> means that TRINGTRAN routers cannot be stateful (i.e., one cannot
> estimate RTT etc for a "flow"--whatever that means).
> 
> The framework should indicate such issues, or advise against using
> TRIGTRAN for UDP applications...
> 
> --  If it's supposed to work only for TCP then it will be useful
> to consider how it will work in the presence of IPSec tunnels. Of
> course we can just say that it will not work with IPSec, but that
> doesn't sound right (to me). Shouldn't IETF protocols work in the
> presence of all the other IETF protocols.

Yes, we definitely need to think about tunnels.

My immediate take is that, I don't know why TRIGTRAN shouldn't work, although a Transport IPSEC security gateway would have to relay the trigger (but it knows the relationship between the interior destination IP address and the tunnel, so this seems possible). But let's keep the question open, for now.

> 
> --  Since TRIGTRAN is only advisory, it should not have signals
> for which the transport layer does not have an in band counter
> part. For example, handoff has no in band counterpart for TCP/UDP
> and therefore such signals should not be present (but if they are
> present then it SHOULD be ignored by the transport)

You know... I'm hoping it doesn't work this way, because the problem we're dealing with, for TCP, is that there's only one defined inband signal (ACK clocking, or the lack thereof). But we're keeping explicit error notification on the "high-hanging fruit" list, so we certainly haven't demonstrated a need for lots of new signals yet.

> 
> --  Also, for DoS attacks, TRIGTRANS should not only protect the
> transport protocol, but it must protect itself, too. (This is
> obvious, but it's probably useful to point it out explicitly.)
> From the age-old example, one needs to consider how to handle IPv4
> fragmentation; how to respond to multiple anomalies etc so that
> the network is not flooded with TRIGTRAN messages..., etc.

I think "what to do when you receive the SECOND TRIGTRAN message" has to be defined as part of any response mechanism. Good input.

> 
> Thanks in advance for your response.
> 
> Thanks
> Best Regards
> Yogesh
_______________________________________________
Trigtran mailing list
Trigtran@ietf.org
https://www1.ietf.org/mailman/listinfo/trigtran