Re: [tsvwg] Intdir early review of draft-ietf-tsvwg-udp-options-19

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Fri, 10 February 2023 22:55 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84CC0C1575DA; Fri, 10 Feb 2023 14:55:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.597
X-Spam-Level:
X-Spam-Status: No, score=-9.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="I8sB14a8"; dkim=pass (1024-bit key) header.d=cisco.com header.b="MBA0GEYQ"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dLqhjUS0eMck; Fri, 10 Feb 2023 14:55:41 -0800 (PST)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D26FC1575D8; Fri, 10 Feb 2023 14:55:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=35853; q=dns/txt; s=iport; t=1676069741; x=1677279341; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=bTAHeIH7QfYDxkic5VH/aZdTVBO8NI+GyM2i/vjXhE0=; b=I8sB14a8Nq9NuRNPVtaAko7kM/3XV1qbK8uQCYJgliSY4rfH1eLREDsT fKAnluStyKWjibkdiuSXHw4+u2Xx/qPYm1QabLwQyeQiFQWjKwo1aRYpP g1KV/e/4X0vtLkqDxn/cQVmGFzzunKMuPUHTryj29LyDXnU0++26COacN 4=;
X-IPAS-Result: A0A2AgCMyuZjmI9dJa1aHgEBCxIMggQLgVsqKIEHWzpGhFKDTAOFL4gigRabAoEsFIERA1YPAQEBDQEBRAQBAYUNAhaFEgIlNAkOAQIEAQEBAQMCAwEBAQEBAQMBAQUBAQECAQcEFAEBAQEBAQEBHhkFDhAnhWgBDIZWAgEDEggJBBkBASUHBgUBDwIBCEICAgIwJQIEDgUiglyCF4EMAwGiGAGBPwKKH3p/M4EBgggBAQYEBJ8fCYFAhD2EVgEBg2WDIYERJxyBSUSBFSccgWZKNz6CYgKBIggNKINZOYIujjSHMwqBNneBJA5MeIEJAgkCEXOBGQhogU4HNgMJAwcFLB1AAwsYDRY6EywUIQsLJAY/AQUCDx82BgMJAwIhS20vEhIFAwsVKkcECDYFBhs0EQIIDxIPBiZDDkI3NBMGXAEpCw4RA1BDGW0EL4FbCgYBKSaZC1s0NgQvOA4NFwkBIwYGAV4GBg4MDxkHFR4RkheDfYo/hFKJUpJUgTYKg3aab4YDBC6DeYxihmmKXYYwXpdSIINonlUZTQGEKgIEAgQFAg4BAQaBYjqBW3AVOyoBgjw/ExkPjiAJEAmBBAEIgkOPYXU7AgcBCgEBAwmJUIJZAQE
IronPort-PHdr: A9a23:b+LVdBzQ+kkhunTXCzPZngc9DxPP8534PQ8Qv5wgjb8GMqGu5I/rM 0GX4/JxxETIUoPW57Mh6aLWvqnsVHZG7cOHt3YPI5BJXgUO3MMRmQFoCcWZCEr9efjtaSFyH MlLWFJ/uX+hNk0AE8flbFqUqXq3vlYv
IronPort-Data: A9a23:99XL5KJfTg5PkDqnFE+RBZUlxSXFcZb7ZxGr2PjKsXjdYENSgTxSn DMcWWjUM63eNGLyfNt/aI7j8kgAvZTTn4BkHAQd+CA2RRqmiyZq6fd1j6vUF3nPRiEWZBs/t 63yUvGZcIZuCCa0Si6FatDJtWN72byDWo3yAevFPjEZbQJ/QU/Nszo78wICqtMu0IfR7z+l4 4uo+JWFYQf9gFaYD0pNg069gEI31BjNkGtwUmwWPZhjoFLYnn8JO5MTTYnZw6zQG9Q88kaSH o4v/Znhlo/r105F5uCNzt4XRnY3rov6ZmBivJb5t5+K2XCurgRqukoy2WF1hU1/011llPgpo DlBWADZpQoBZsXxdOohvxZwHAo5Lf1v3e7+E3X8oZGXnxL5Wl716qA7ZK02FdVwFudfG2pC8 7kTLyoAK0/FjOOty7X9Qe5p7ighBJC0Z8VE5TcxlneAUa1OrZPrG80m4fdTxDY/gMlSFN7VZ tESbnxkaxGojxhnZA9PU8Nkwr3Aan/Xcj1EtWmFlbYLwSvDwg1T4oPVNIrlQ4nfLSlSth/I+ j2Zl4jjOTkGL8KAxhKE/26iwOjVkkvTVJgbGqH99/N2jhiP3XIMB1gLWUP+puGli0m4QJRWL 0g8+ycyo+417kPDZtj7Q1i0oWSsvxMAVZxXCeJSwB2K16HUyx2FHGEVRzpZaNVgv8gzLQHGz XeTlN/vQDdoqrDQFjSW96yfqnW5Pi19wXI+iTEsQiBC84nKhdAKvB+MXotnQPGKp/jsMGSlq 9yVlxQWi7IWhM8N8qy0+1Hbnj6hzqQlqCZoum07uUr4smtEiJ6Zi5+AsgeEsK4RRGqNZhzQ4 yhewpn2APUmVMnVzESwrPMx8KZFDstp3RXGilJpWpIm7TnopDiofJtb53d1I0IB3ic4ld3BP he7VeB5vc870J6WgUlfOdLZ5yMClvGIKDgdfqqIBueim7AoHON9wAlgZFSLw0fmm1U2nKc0N P+zKJjzUy5HUvQ8kGXnGI/xNIPHIAhjmAs/orimkXyaPUa2PxZ5tJ9cagLVN7BlhE96iFWKo r6zyPdmOz0GALGhPUE7AKYYLEsBKjAgFIvqpslMHtNv0SI4cFzN/8T5mOt7E6Q8xvw9vr6Ro hmVBBQCoHKh3iKvFOl/Qi05AF8Zdcwh/StT0O1FFQvA5kXPlq7ztP5EL8JqIul/nAGhpNYtJ 8Q4lwy7KqwnYlz6F/41MPERcKQKmMyXuD+z
IronPort-HdrOrdr: A9a23:FQ2xIqFvMd2OM628pLqFXZHXdLJyesId70hD6qkvc3Jom52j+P xGws526fatskdsZJkh8erwXJVoMkmsiqKdgLNhcYtKOTOGhILGFvAb0WKP+UyDJ8S6zJ8h6U 4CSdkwNDSTNykAsS+S2mDReLxMoKjlzEnrv5al854Hd3AMV0gU1XYBNu/tKDwReOApP+tdKL Osou584xawc3Ueacq2QlMfWfLYmtHNnJX6JTYbGh8O8mC1/H2VwY+/NyLd8gYVUjtJz7tn23 PCiRbF6qKqtOz+4gPA1lXU849dlLLau5p+7Y23+4gowwfX+0SVjbdaKvi/VfcO0aWSAWMR4Z rxStEbToNOAj3qDyeISFDWqnfdOX4Vmg7fIBmj8CLeSQiTfkNgNyKH7rgpKicxonBQz+1Uwe ZF2XmUuIFQCg6FlCPh58LQXxUvjUasp2E++NRjxEC2weMlGc9sRKEkjQpo+a07bWrHwZFiFP MrANDX5f5Qf1/fZ3fFvnN3yNjpWngoBB+JTkULp8TQilFt7T1E5lpdwNZakmYL9Zo7RZUB7+ PYMr5wnLULSsMNd6pyCOoIXMPyAG3QRhDHNn6UPD3cZes6EmOIr4Sy7KQ+5emsdpBNxJwumI 7ZWFcdrmI2c1KGM7z54HSKyGG7fIyQZ0WY9igF3ekKhlTVfsufDRG+
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos; i="5.97,287,1669075200"; d="scan'208,217"; a="60039262"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 10 Feb 2023 22:55:40 +0000
Received: from mail.cisco.com (xfe-rcd-001.cisco.com [173.37.227.249]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 31AMtdLB013854 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 10 Feb 2023 22:55:39 GMT
Received: from xfe-rtp-001.cisco.com (64.101.210.231) by xfe-rcd-001.cisco.com (173.37.227.249) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Fri, 10 Feb 2023 16:55:39 -0600
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-001.cisco.com (64.101.210.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Fri, 10 Feb 2023 17:55:39 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gszPwxlBxTKpTsvpMAwDfwkUB/Uj0zT2Reqzpbi9wkLwwdIPe/0xBO22/iB6ivzneTUIgIiKM8K8I5wNYj91YJ37t61lWesKWZjFjG8tHF2nfRS9fJhU/h2M6xuTHETZD2HuiDsMdUKerv0/vNTB0Nx7l1b3+hlGpKlVud48B2Igr2cQickrKTCHXCanG7Vzjym3r2rSZnFw2UmixBoJp8X+hEGaKqpm42F4j7sW0jDmdHdcpLr0h3lP0XkNbdKFD73rsLdEhQZ62L3yWb3thYrJ4R/wYHh+/uWgeLjS6Na0tCMHE08MiHaCiGGpj1ax/7519+yhYXIhd68oFE2yJw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bTAHeIH7QfYDxkic5VH/aZdTVBO8NI+GyM2i/vjXhE0=; b=OZmxUMlpWk1rUnVZED5OGVPsbbtb3O2H+GEe4kOczF7we62ufdDDxXk/13eD8OaQn2HaMjLliWDz1M1/fBpF47oul64ew/aexLt5UjuGs9aFuF2MXv9w7KO+ECbOSNtU7UCISwKucH6NfYDGQ6TDllUbiprVZDHLK63/63QxxrW0oQVk+2VKxXpATphkf0NFB5a9A0g/OgvAC3yZgaWzYfar1wpz3kK/JPFXCy+zAn1fV+ziKIWFqn3AW3pHWpQDD67MgGg9UG7sSmd20fSn6m4y7WQ9tja6FZ5CtcK3RJYtGeLYHVgZa9/yWEt8Mr5s6aFLnbBjOSXmyp+c4sFTuA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bTAHeIH7QfYDxkic5VH/aZdTVBO8NI+GyM2i/vjXhE0=; b=MBA0GEYQabn6Ysgg5Sz2jIVpGMpAUNQtTGRnpGAL7rC7N3Zc3/xsRF7pYRU1PgKiUD+adu4W4wUHPs7Wz+whgkaKSxzvClaf4gAL1wPWNGGINsSUSsTeWeJalI2tdPYyJBzR63ToD3Kjp6OGZ9wW0mCxcHkyyekm3heNqy0Gwfk=
Received: from DM4PR11MB5502.namprd11.prod.outlook.com (2603:10b6:5:39e::23) by SA1PR11MB7063.namprd11.prod.outlook.com (2603:10b6:806:2b5::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6086.19; Fri, 10 Feb 2023 22:55:37 +0000
Received: from DM4PR11MB5502.namprd11.prod.outlook.com ([fe80::3ef2:be08:5f60:3678]) by DM4PR11MB5502.namprd11.prod.outlook.com ([fe80::3ef2:be08:5f60:3678%4]) with mapi id 15.20.6086.021; Fri, 10 Feb 2023 22:55:37 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "touch@strayalpha.com" <touch@strayalpha.com>
CC: "int-dir@ietf.org" <int-dir@ietf.org>, "draft-ietf-tsvwg-udp-options.all@ietf.org" <draft-ietf-tsvwg-udp-options.all@ietf.org>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: Intdir early review of draft-ietf-tsvwg-udp-options-19
Thread-Index: AQHZPQVxy6M6EbYCkE+q4OqfkY9DMq7Iy4gA
Date: Fri, 10 Feb 2023 22:55:37 +0000
Message-ID: <0E3756C7-E473-4B3A-9D6D-C43DA3C89C91@cisco.com>
References: <167599146728.42049.10916891372133731811@ietfa.amsl.com> <CBCA1F49-73BC-4242-B162-2B743F23FAAF@strayalpha.com>
In-Reply-To: <CBCA1F49-73BC-4242-B162-2B743F23FAAF@strayalpha.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3731.400.51.1.1)
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM4PR11MB5502:EE_|SA1PR11MB7063:EE_
x-ms-office365-filtering-correlation-id: a3e4bd6c-846d-476d-fbf4-08db0bb9ecd3
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM4PR11MB5502.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(376002)(366004)(39860400002)(346002)(136003)(396003)(451199018)(30864003)(66899018)(2906002)(186003)(86362001)(2616005)(66574015)(122000001)(8936002)(5660300002)(38070700005)(26005)(6486002)(6506007)(53546011)(478600001)(36756003)(71200400001)(83380400001)(6916009)(6512007)(38100700002)(66476007)(64756008)(66946007)(316002)(4326008)(66556008)(8676002)(66446008)(33656002)(54906003)(41300700001)(91956017)(76116006)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_0E3756C7E4734B3A9D6DC43DA3C89C91ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM4PR11MB5502.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a3e4bd6c-846d-476d-fbf4-08db0bb9ecd3
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Feb 2023 22:55:37.2915 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 7qA+nslcvKEZ1DWjfQId9G4+Xv2PIlGHRTRlfbdw1PLqbaOfQBZERcTc7P2zNtKDV50thut7vy29pPgoQYN4cQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR11MB7063
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.249, xfe-rcd-001.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/9td_Q9I-4Anf5ZAFGbZZnEjy2q8>
Subject: Re: [tsvwg] Intdir early review of draft-ietf-tsvwg-udp-options-19
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Feb 2023 22:55:48 -0000

Hi, Joe,

Thank you very much for the quick response. Please find some follow-ups inline.

Carlos Pignataro (He/Him)

On Feb 9, 2023, at 11:08 PM, touch@strayalpha.com wrote:

Hi, Carlos,

Many thanks for the detailed review. Some responses below.

Joe

On Feb 9, 2023, at 5:11 PM, Carlos Pignataro via Datatracker <noreply@ietf.org> wrote:

Reviewer: Carlos Pignataro
Review result: Ready with Issues

…

A. Transport Options for UDP [draft-ietf-tsvwg-udp-options-19]

As a high-order bit, I would have expected a broader, deeper, and more explicit
discussion of two areas: (1) considerations relating every endpoint, stack,
middle-box, security filter, etc., which might complain in the presence of the
difference in length -- not explicitly defined,

This is first noted in Section 5 and in detail in Section 16,

Please see below, in the follow-up re §16.


and (2) security and privacy
considerations of having effectively a covert channel, and whether it is best
to recommend it is not used versus recommending its use.

This is addressed in Sec 22 (though there’s a typo there - it should say:
substantially different than *TCP* options
The key point is that sentence (which admittedly fails its point as written). The previous sentence already recommends not using them where this is a concern.

§22 concerns itself with the security considerations of UDP options as specified in the I-D. My curiosity was coming from a slightly different angle: because the surplus area (syntax and semantics) had not been specified before, the potential of legitimizing space for data leakage exists.

The paragraph containing the sentence you are referring to, corrected, is:


   Note that any user application that considers UDP options to affect
   security need not enable them. However, their use does not impact
   security in a way substantially different than TCP options; both
   enable the use of a control channel that has the potential for
   abuse. Similar to TCP, there are many options that, if unprotected,
   could be used by an attacker to interfere with communication.


I believe there is a substantial difference in practice and operations: TCP options have been specified and used for a long time, while the for UDP, the surplus area existed but its use and processing for options would be new.

Based on this, I was really wondering about the tradeoff of choosing to forbid the use of the surplus area versus defining it for options. Again, this is curiosity as I had thought about this question. There is a difference between “not enabling UDP options” in an endpoint versus allowing in a middle-box the space without processing vs…

And for completeness, one of the attacks I am thinking of is piggybacking information leakage — which specifying the use of the surplus area would alleviate.


For (1), I find the section "Interactions with Legacy Devices" to be "anecdata"
more than "analytical", and (possibly as intended) not comprehensive nor much
useful. For example, "worked through NAT devices" is neither qualitative nor
quantitative, and a single NAT that might drop a UDP optioned packet might be
too much.

I’m not sure what you’re looking for, but there cannot be a useful quantitative statement (worked through 10 vs 100 means nothing if we can’t know how many different types/firmware variants of NATs are in the Internet).

Indeed, and fully agree. [and as a side note, I had tested a non-statistically-significant set of NATs and stacks with gibberish in the surplus area and found no issues, years ago]
That’s exactly the difficulty in this section. And my question on trade-off.
For clarity, I am not asking for anything in particular, but acknowledging that the inherent value of such a section is limited, and perhaps one approach would be guidance in the case on which some stack might choke.


As an aside, the qualifier "legacy" sounds like a stretch label --
every udp stack as semi-obsolete -- though this might be my misinterpretation
of the nuances of the use and semantics of the word.

Legacy was implied as shorthand for “not updated with these options”; that can be added earlier in the doc.

Thank you.


For (2), I'd frankly find most useful a discussion on the engineering and
architectural tradeoffs between, (a) e.g., saying "the inconsistency of length
fields is largely a security invitation, and as such, though shall be malformed
packets sent to /dev/null, and if you want options use something else", versus
(b) saying "largely works and is mega useful and read the security
considerations". There seems to be an implied assumption, although frankly I
might have missed text, or it could be documented in the WG mailing list as
discussion had, and not worth for the I-D.

As noted in Section 16, this inconsistency of length has always been allowed, so it’s not clearly a “malformed” packet. Unexpected values are not security issues - despite numerous RFCs and drafts that continue to draw this incorrect conclusion.

Correct, I was not suggesting the packet as “malformed”, and instead...


So there’s arguably a philosophical debate to be had between this and a document outlawing length inconsistency, but this document exists in only one side of that debate anyway. So yes, perhaps the other side of the debate was on the list, but I don’t see how it adds to the doc.

… the choice of using the bonus bits versus closing the gap.

Which you answered above.


Some more in-lined comments, marked with "CMP":

Abstract

 Transport protocols are extended through the use of transport header
 options. This document extends UDP by indicating the location,
 syntax, and semantics for UDP transport layer options.

CMP: I often find the Abstract setting stage for a whole piece of work. These
could be nits and editorials, though maybe significant to call out: CMP: The
first sentence is an absolute statement. Are *all* transport protocols (or
*all* the time) extended as such? Frankly UDP has not been for decades, still
being a transport protocol, and truly will *not* be either extended with
"header options" (but trailing ones). For these two things, the very first
sentence in the document does not, to me, fully parse.

“Header” should have been “metadata carried with the packet”, yes.

Thanks.


6. The UDP Surplus Area Structure

 The remainder of the surplus area consists of options defined using
 a TLV (type, length, and optional value) syntax similar to that of
 TCP [RFC9293], as detailed in Section 8. These options continue

CMP: It seems there are some options that do not use the Length either -- are
only Type. As such, is length optional in the first sentence, similar to the
value being optional? Otherwise, the minimum option would be two octets.

TLV is often abbreviated when T implies L and V. So yes, “type, length, and value - where length can be implied and value is optional”. I’ll see how to work that in, but it’s common in TLV representations.

I think “length can be implied from the T” covers it.


 For IPv4, IP Total Length field indicates the total IP datagram
 length (including IP header) and the size of the IP options is
 indicated in the IP header (in 4-byte words) as the "Internet Header
[...]
 UDP options use the entire surplus area, i.e., the contents of the
 IP payload after the last byte of the UDP payload. They commence
 with a 2-byte Option Checksum (OCS) field aligned to the first 2-
 byte boundary (relative to the start of the IP datagram) of that
[...]
 UDP options are typically a minimum of two bytes in length as shown
 in Figure 5, excepting only the one byte options "No Operation"
 (NOP) and "End of Options List" (EOL) described below.

CMP: NB: this is a humble, not presumptuous or arrogant. In the text above, as
well as throughout the document, I read "bytes" which is strictly a
machine-dependent quantity, and always try to use 'octets' or 'bits' instead.
RFC 791 says '32-bit words', not '4-byte words'. Octets instead of bytes?

Back in the 1970s/80s there was a distinction between octet and byte, but currently most RFCs just go straight to byte both more common and as unambiguously equivalent to octet.

Having started to contribute to the IETF much after the 1970s/80s, my experience is that octets was preferred — but again, this is a ‘I noticed so I’ll mention’ nit. (BTW, I recall, if memory is not failing, “8-bit byte” nomenclature. In this case, the doc uses both byte and octet.


8. UDP Options

 The Kind field is always one byte. The Length field is one byte for
 all lengths below 255 (including the Kind and Length bytes). A

CMP: It is clear from the examples and subsections under Section 9 that the UDP
Option Length includes the Kind and Length/EL fields themselves. Is that what
is meant in the parenthetical above? Something like this might be more clear:
CMP: "The Length field is one octet when its value is below 255. The value of
the Length  includes the Kind and Length fields, and as such its minimum value
is 2. [...]"

I will clean that up.

Thanks!


9.4. Fragmentation (FRAG)

CMP: How is FRAG a SAFE UDP Option?

Because FRAG embeds user data in the surplus area. An UNSAFE option is one that cannot be used with user data without also using FRAG.

Ack.


24.1. Normative References

 [Fa22]    Fairhurst, G., T. Jones, "Datagram PLPMTUD for UDP
           Options," draft-ietf-tsvwg-udp-options-dplpmtud, Sep.
           2022.

CMP: Why is this a Normative Reference?

Because REQ and RES are required in the base implementation but their use is defined in that doc, not in this one.

I always saw this case as a unidirectional link, but I can also see the “go read this spec for their use”.

Thanks!

Carlos.


I Imagined one I-D defined the base
option spec, while others can make use of them, and add other options. CMP:
That is, a unidirectional Normative reference
draft-ietf-tsvwg-udp-options-dplpmtud -> draft-ietf-tsvwg-udp-options.

The definition of those options IS part of the base spec. It just is unwieldy to include it in the base doc.

~~~

B. Datagram PLPMTUD for UDP Options [draft-ietf-tsvwg-udp-options-dplpmtud-04]

CMP: One question only:

4.1.  Sending Probe Packets using the Echo Request and Response Options

 A Probe Packet includes the UDP Options area containing a RES Option
 and any other required options concluded with an EOL Option followed
 by any padding needed to inflate to the required probe size.

CMP: Is there an advantage or implication of this approach, versus having a
PADDING UDP Option which can be passed to UDP on receipt, and verify that
padding? (modulo the risk of a covert-channel)

Again, I hope these are clear and useful, and thanks for the review request and
entertaining these comments.

Thank you!

Carlos Pignataro