Re: [tsvwg] Rregarding soft-state and UDP options

Joe Touch <touch@strayalpha.com> Fri, 03 January 2020 01:11 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26FF212006F for <tsvwg@ietfa.amsl.com>; Thu, 2 Jan 2020 17:11:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.219
X-Spam-Level:
X-Spam-Status: No, score=-1.219 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fvz7naa4NcxV for <tsvwg@ietfa.amsl.com>; Thu, 2 Jan 2020 17:11:21 -0800 (PST)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EB85212006B for <tsvwg@ietf.org>; Thu, 2 Jan 2020 17:11:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=/iSqYXddJvxgIUWlxICkTe6QsdgFr4YXl7XX0ane9Mk=; b=OqkJ9kFrV+U0owvDnCNPKvXKJ WUiGX6/3hUUdJPGn2QXOnE2P3KOeAuetj9WQDu+iX9j8DAKfB7gDpMT0wOw+3l/PEJpZez8symQm7 Zs/yU1qPlWzs4Wb/V+Y6Hhk97sexBPRKvYNYGuTIetVU53jJd6Wo5OCanhYW83ObKUKWVruLYUjAC ZyTB4PT6h61bBYOWF2e48KGMyGKR/EWe4tyOA1cYrnhirF0lCo3E+JedVAUBU/YZZbSVxY8PS6CpC zh12+aOjSUmEcpwvlMWkWkBkEXcHpsl5BkCp191CXa7WlzJdqFg6kbKXVVtm2n4PsIoE/LOFm9dnc bbzuvVpMw==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:53300 helo=[192.168.1.10]) by server217.web-hosting.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1inBUi-00032Y-9I; Thu, 02 Jan 2020 20:11:20 -0500
Content-Type: multipart/alternative; boundary="Apple-Mail=_D635050F-E76E-46E4-B90B-9A821D2DB155"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Joe Touch <touch@strayalpha.com>
In-Reply-To: <CALx6S37FNw-5DBJZPORaGKT0HEa2nGD6NodObZHSeC1-WkwvTA@mail.gmail.com>
Date: Thu, 02 Jan 2020 17:11:12 -0800
Cc: TSVWG <tsvwg@ietf.org>
Message-Id: <3CB53C92-9CE3-4EAE-BBF4-39334550B192@strayalpha.com>
References: <CACL_3VF_Mi6JFK=so_P57+Woe5PYOzC4o2Okj6BPVzB91scRQg@mail.gmail.com> <40B548AC-6168-46B5-81F8-CB6A64C83D5C@strayalpha.com> <CACL_3VEmX6C-Mqz8OQuS2NtJQPNNFgyTgyb9uN6TrHuZYwLMLA@mail.gmail.com> <CALx6S34o4AooKW2w5rPPzRu8yQU=Db_f4jboEB6=AywJBw-mgg@mail.gmail.com> <0AA45B1F-3081-4F4F-92C2-AFB47B222854@strayalpha.com> <CALx6S35mtfGLOESBGqQpd5N0whHO_jEtZQCrfhJ=GBHSH6nxdg@mail.gmail.com> <6d088714156c9ccba194dc71ff667273@strayalpha.com> <CALx6S37FNw-5DBJZPORaGKT0HEa2nGD6NodObZHSeC1-WkwvTA@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/1zAMzyzbfdqh8DktpdtybGj0Wng>
Subject: Re: [tsvwg] Rregarding soft-state and UDP options
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jan 2020 01:11:22 -0000


> On Jan 2, 2020, at 2:37 PM, Tom Herbert <tom@herbertland.com> wrote:
> 
> On Thu, Jan 2, 2020 at 1:50 PM Joe Touch <touch@strayalpha.com> wrote:
>> 
>> Hi, Tom,
>> 
>> On 2020-01-02 08:19, Tom Herbert wrote:
>> 
>> On Wed, Jan 1, 2020 at 1:08 PM Joe Touch <touch@strayalpha.com> wrote:
>> 
>> 
>> (changing the subject to track the thread)
>> 
>> As we've said before, soft state negotiation is an application layer issue.
>> 
>> Pushing the problem to the application layer really doesn't help to
>> clarify or resolve the issues that have been raised. For instance,
>> Mike's question on how soft-state negotiation would work for a
>> unidirectional flow is still valid.
>> 
>> 
>> We've addressed this too - state negotiation is impossible for unidirectional flows. Always has been.
>> 
> 
> Hi Joe,
> 
> Where has this been addressed? I see nothing in the draft that
> discusses the constraints or requirements like this for soft-state
> negotiation.

Sec 13 makes it clear that there is no way to establish state for the first message.

That section also notes that options must be silently droppable until confirmed. it should be clear that a unidirectional flow can’t be confirmed.

> 
>> IP is not a model for transport protocols. There's a reason why some features were added to IP - some of which *remain unused and unsupported*.
>> 
>> And you don't want "drop unrecognized options". You want "drop this ENTIRE PACKET" if the option isn't recognized.
>> 
>> a) LITE+FRAG with pre and post options accomplishes this *safely* for both legacy and option-aware endpoints
>> 
>> b) an option-required" bit *cannot* accomplish this safely for both legacy and option-aware endpoints. Legacy endpoints already treat all options as "silently ignore".
>> 
> It's simple. Just require that options that cannot be ignored (i.e.
> ones with the bit set) can only be sent in LITE+FRAG mode.

OK, we can include that reminder. 

> If the end
> point doesn't understand UDP options all it will drop the packet. If
> the endpoint does understand UDP options but doesn't understand one
> that can't be ignored then the packet will also be dropped. This
> procedure works in *all* cases, including unidirectional flows.
> 
>> 
>> is sufficient to prevent a
>> receiver from ignoring options that cannot safely be ignored (note
>> this works in the unidirectional flow case for instance).
>> 
>> 
>> LITE_FRAG pre and post options already accomplish this. If the data-modifying options aren't handled properly then the OCS on the reassembled result would fail. And legacy receivers will ignore it all.
>> 
>> The option-required bit never works properly for legacy endpoints unless you design the option to basically *BE* LITE+FRAG (to bury the user data in the option). We already have a solution that does that more generally; there's no need for a bit to accomplish this.
> 
> If you're referring to negotiation, I don't see how that could be
> considered more general. We've already pointed out one constraint that
> doesn't exist for the drop if not recognized bit (the unidirectional
> problem). There are likely other cases where negotiation won't work.

Negotiation doesn’t *have to work*. But if you don’t negotiate some sort of state, you can’t use options that can’t be silently dropped - regardless of whether they modify contents or not. That’s already stated in Sec 13.

I’ll certainly look at that section and revise to be more clear.

Joe