RE: [Trigtran] TRIGTRAN Justification

Kacheong Poon <poon@cs.wisc.edu> Thu, 16 January 2003 00:12 UTC

Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA15525 for <trigtran-archive@odin.ietf.org>; Wed, 15 Jan 2003 19:12:24 -0500 (EST)
Received: (from mailnull@localhost) by www1.ietf.org (8.11.6/8.11.6) id h0G0REK24394 for trigtran-archive@odin.ietf.org; Wed, 15 Jan 2003 19:27:14 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h0G0REJ24391 for <trigtran-web-archive@optimus.ietf.org>; Wed, 15 Jan 2003 19:27:14 -0500
Received: from www1.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA15515 for <trigtran-web-archive@ietf.org>; Wed, 15 Jan 2003 19:11:53 -0500 (EST)
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h0G0RAJ24382; Wed, 15 Jan 2003 19:27:10 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h0G0QjJ24356 for <trigtran@optimus.ietf.org>; Wed, 15 Jan 2003 19:26:45 -0500
Received: from parmesan.cs.wisc.edu (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA15504 for <trigtran@ietf.org>; Wed, 15 Jan 2003 19:11:23 -0500 (EST)
Received: (from poon@localhost) by parmesan.cs.wisc.edu (8.9.2/8.9.2) id SAA27163; Wed, 15 Jan 2003 18:14:44 -0600 (CST)
Date: Wed, 15 Jan 2003 18:14:44 -0600
From: Kacheong Poon <poon@cs.wisc.edu>
Message-Id: <200301160014.SAA27163@parmesan.cs.wisc.edu>
To: trigtran@ietf.org
Subject: RE: [Trigtran] TRIGTRAN Justification
Cc: Yogesh.Swami@nokia.com
Sender: trigtran-admin@ietf.org
Errors-To: trigtran-admin@ietf.org
X-BeenThere: trigtran@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/trigtran>, <mailto:trigtran-request@ietf.org?subject=unsubscribe>
List-Id: Triggers for Transport <trigtran.ietf.org>
List-Post: <mailto:trigtran@ietf.org>
List-Help: <mailto:trigtran-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/trigtran>, <mailto:trigtran-request@ietf.org?subject=subscribe>

Included message from Yogesh.Swami@nokia.com:

>----
>--  Is TRIGTRAN only considering TCP, or can other transport
>protocols such as RTP over UDP, or raw UDP with TFRC, also make use of
>it?

I think this is one important question to answer.  I
don't know if this is one of the original motivations of
trigger to be an "universal notification mechanism" for
all transports.  I agree that it would be nice, but it
is probably wrong to do it.  We know that there is not
an "universal transport" and it is probably wrong to have
one.  The same reasons apply to transport notification
mechanism.

>--  If it's supposed to help other protocols like RTP over UDP, or
>UDP using TFRC for rate control, then we need to keep in mind that
>unlike TCP, RTP does not have a protocol field in the IP
>header. This means that given a stream of UDP packets, one cannot
>*reliably* say if these packets belong to a RTP session, of if
>they belong to some other protocol on top of UDP which just
>happens to have the same format (It's good to be a little paranoid
>while designing a new protocol, so don't bite off my head if you
>think that the probability of such collisions are small) This also
>means that TRINGTRAN routers cannot be stateful (i.e., one cannot
>estimate RTT etc for a "flow"--whatever that means).
>
>The framework should indicate such issues, or advise against using
>TRIGTRAN for UDP applications...

The above is a good reason not to have trigger as a
notification mechanism.  The mechanism has to be aware of
end2end transport context to be effective.  This means that
it is probably good to do it end2end.

>--  If it's supposed to work only for TCP then it will be useful
>to consider how it will work in the presence of IPSec tunnels. Of
>course we can just say that it will not work with IPSec, but that
>doesn't sound right (to me). Shouldn't IETF protocols work in the
>presence of all the other IETF protocols.

Another point against trigger.  An end2end notification
mechanism does not have this problem, or can get around it
easily, for example ECN.

>--  Since TRIGTRAN is only advisory, it should not have signals
>for which the transport layer does not have an in band counter
>part. For example, handoff has no in band counterpart for TCP/UDP
>and therefore such signals should not be present (but if they are
>present then it SHOULD be ignored by the transport)
>
>--  Also, for DoS attacks, TRIGTRANS should not only protect the
>transport protocol, but it must protect itself, too. (This is
>obvious, but it's probably useful to point it out explicitly.)
>>From the age-old example, one needs to consider how to handle IPv4
>fragmentation; how to respond to multiple anomalies etc so that
>the network is not flooded with TRIGTRAN messages..., etc.

Yet another point not to use trigger as a notification
mechanism.

I believe when people continue to look into trigger as a
transport notification, more and more problem will be
found, as we have learnt from ICMP.  I suggest we should
look at other forms of transport notification or how to
put notification into existing transports as the starting
point.

>----


							K. Poon.
_______________________________________________
Trigtran mailing list
Trigtran@ietf.org
https://www1.ietf.org/mailman/listinfo/trigtran