Re: [tsvwg] draft-ietf-udp-options issues from IETF 104

Tom Herbert <tom@herbertland.com> Fri, 12 July 2019 21:27 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D15511201DC for <tsvwg@ietfa.amsl.com>; Fri, 12 Jul 2019 14:27:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.602
X-Spam-Level:
X-Spam-Status: No, score=-0.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, PDS_NO_HELO_DNS=1.295, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6l6ULlk4ea7B for <tsvwg@ietfa.amsl.com>; Fri, 12 Jul 2019 14:27:14 -0700 (PDT)
Received: from mail-ed1-x534.google.com (mail-ed1-x534.google.com [IPv6:2a00:1450:4864:20::534]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 84A75120118 for <tsvwg@ietf.org>; Fri, 12 Jul 2019 14:27:12 -0700 (PDT)
Received: by mail-ed1-x534.google.com with SMTP id e3so10362628edr.10 for <tsvwg@ietf.org>; Fri, 12 Jul 2019 14:27:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=DBCyu/RSJAXOLeNEnQ4YFFcA2r2oGt/cb+/plUjh3zM=; b=LziL+rWvX5wOXHV6T7y2BY7uaTeVPJYa2iwgJFmqS+fIh/vcQQBODSURnaZNjOW5Di EXpWc43FmjPEgpGFmQ+GCsgqucg7pvsC88DBlt1dLBWMBWpq+fzI+KZDZ79Fq+MW6DjR HjeJfqW5VHsNJlpvkcHJd0aD/rxGASN52dfPZlpCSOeYZ5NYBwP6cGUUGCYcoE1D/rP9 dA6EP9dP97OBUjDWV1CJ1cB5uo1/hZsv3azaRo5kutupEBaimBdQmh82mhow6/zffB/M xk7a4Re9q1Qhm81fJ1bmbnCOEfW1YlkYwfhGmq4XNCiHdkNctf2I5U8RzhwnWUtDpIoO mBjA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=DBCyu/RSJAXOLeNEnQ4YFFcA2r2oGt/cb+/plUjh3zM=; b=BGSAFQ64zht+0osrFQFY+uN+bfO3nXZfrWhngv9/zfdZ9YkZICfl2Y9/jpEOJxt5FV uY8X2qCepvK9P1e6qtjWKfxASbJiRO1EX5C8ssJS4FME1J+gGVgz5cqHW148nc0KNMrG z59w9K5vm+orT+G36P+KDBHM/+q04pKQ1vs6bjBE4aYw5dxsDWEvea0IG8dQ8HTCe+kC Ayg2XhSikVlj6UA17+p5r8b7W00zqwd/DZmHPosfQo/doXbLrzZh9o3B8tnTPKwbuONG P57CKUQ0tqtMaGyaMJ0NXxL+Ojtd7GDEWLRyMH9vDEZJoJwC/AZSw1sA8V/bWO6XQvQ7 XPjw==
X-Gm-Message-State: APjAAAWok+s80M2DCdQma5MEVJ6RG99GJ2Cij2XJEwoyTH/Y+CJqK8aE 9Hl1n1c0IYESoqJTipaKehUAu8GddaEtrsuz1EzXsQ==
X-Google-Smtp-Source: APXvYqxI0IKpoaoTX02dMaOFSU/LRtjJGHRp8gP49Pl5qHTUIgInT/QdV/sv4D3P7LovP9rKXuR1wZrxrM0a0964VSk=
X-Received: by 2002:a50:b1db:: with SMTP id n27mr11690471edd.62.1562966831061; Fri, 12 Jul 2019 14:27:11 -0700 (PDT)
MIME-Version: 1.0
References: <156262970360.865.13042807682366763561.idtracker@ietfa.amsl.com> <CAPDqMeoMqsB8=tH5TBaq5Tw-sLW3HNc8tpfUU3htV=sWo7pJcA@mail.gmail.com> <D7E52D2B-3912-4897-80C6-0150CDE10218@strayalpha.com> <CAPDqMep9MYqjFvvJSVbqYwo-xJ1pUocYszNukveaZODhf9+75A@mail.gmail.com> <e73919f08202937bf45418cbf8bcc38c@strayalpha.com> <CAPDqMeoh3n5fL1k6Fw9D8rCpy4a9eWyUZvgStyzYfFuJbuWudw@mail.gmail.com> <3f6f54e0b828e2628af964d6ee7f33e1@strayalpha.com> <CALx6S37rt7OJtH5a2ZH23R21ATETuwTeFS-mZQECtgxPQ3nSZA@mail.gmail.com> <ccc386aa429bfe301998f39eb7fccfbf@strayalpha.com> <140f11c854e0ad96c51639f830cbb688@strayalpha.com> <CALx6S35MC_fj+fL6Ax9a-9=-QX0-mHLmMQ7cUs2Rir+AvYE=zA@mail.gmail.com> <5b35e91dd510119672a0836f868ade24@strayalpha.com> <CALx6S36AVbKfvb-6dj07rcGjsVsCz0daFM9qZOBSSstZOM-Ukg@mail.gmail.com> <8A584FFF-6C86-4154-8D9D-CF407CA77145@strayalpha.com> <CAPDqMeq9GjEQKukH1pZOTdE50e_rc3U6gpdxT-5qrS5phD0RGw@mail.gmail.com> <646D45AD-D79B-4BD2-A084-7DA97CE2C415@strayalpha.com> <7EC37B50-45D5-4CF1-B113-205E55BF244E@strayalpha.com> <CALx6S34s7L7xo+26bt5Cdaqi4Es5Aci42GHk1WNKzugr5st-Gw@mail.gmail.com> <B525BF50-EFCC-44A5-A604-6CDDA914A1CB@strayalpha.com> <CAPDqMep3R6z9PRKkHyOvrh6sV9n5Sc0B++-zVz0FYJCwE6swrQ@mail.gmail.com> <E42A2AE2-F499-465E-BDE6-5EFC0AB20042@strayalpha.com> <CE03DB3D7B45C245BCA0D24327794936306138E9@MX307CL04.corp.emc.com> <f9f1701c2196c5db520d025294202353@strayalpha.com> <CE03DB3D7B45C245BCA0D24327794936306153C4@MX307CL04.corp.emc.com> <CALx6S37U5Q9qkxDFfR6w9MpN4qvRagThb+p0GqnAS118cKDuZw@mail.gmail.com> <CE03DB3D7B45C245BCA0D2432779493630615838@MX307CL04.corp.emc.com> <CALx6S36SL2X5StJ59zyKKwNafS1WXh0HMDqbYs+OaDdMLoNTmg@mail.gmail.com> <33045f76897978c01208266c831318c2@strayalpha.com> <CALx6S34BmOefkEMKHLasmUoiWx6P+5yUG_v=Cdzdtw_H1cD7KQ@mail.gmail.com> <88dbe43611a5d7bc487ef76cfab3b26b@strayalpha.com> <CALx6S364Hmf5YUf2cF0xXkkyU3iqddEf6M4PTjyfewPbct5AYQ@mail.gmail.com> <25493093-480C-46C0-A91D-45DCCFB9D77F@strayalpha.com> <CALx6S34tiBMNpM-yBXGzTznP_J=OpYNas+HtpAX4+BKJc5=CVQ@mail.gmail.com> <8731c0849335dc0b427e1af7b445916f@strayalpha.com>
In-Reply-To: <8731c0849335dc0b427e1af7b445916f@strayalpha.com>
From: Tom Herbert <tom@herbertland.com>
Date: Fri, 12 Jul 2019 14:26:57 -0700
Message-ID: <CALx6S34Na+Byf2AacB0KS7Mq81f5oPXYsCFLZcw83cT6FZC-Vw@mail.gmail.com>
To: Joe Touch <touch@strayalpha.com>
Cc: tsvwg <tsvwg@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Emz7bVYgk7o-0BkNYsv7sP07S7A>
Subject: Re: [tsvwg] draft-ietf-udp-options issues from IETF 104
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jul 2019 21:27:16 -0000

On Fri, Jul 12, 2019 at 12:40 PM Joe Touch <touch@strayalpha.com> wrote:
>
>
>
>
>
> On 2019-07-12 12:10, Tom Herbert wrote:
>
> ...
>
>
> "baked in" or not, it a bug according to the requirements as of RFC6936 - and it needs to be addressed.
>
>
> What is the bug?
>
>
> Intermediate devices Dropping UDP packets with zero checksums.
>
> They have been doing this for years
>
>
> It's been wrong for years...
>
>
> and it is consistent with the
> Internet standard, i.e. RFC2460
>
>
> Yes, but not since RFC6936 (granted, that should have updated 2460)...
>
>
>
> and now RFC8200 are very clear that
> checksums are required for UDPv6.
>
>
> It's also very clear that they are NOT always required, as per Sec 8.1.
>
>
>
> RFC6935 is also clear that it's the
> responsibility of the tunnel protocols to deal with any
> incompatibility that the use of UDPv6 zero checksums creates:
>
> "Tunnel protocols intending to use a zero UDP checksum need to ensure
> that they have defined a method for handling cases when a middlebox
> prevents the path between the tunnel ingress and egress from
> supporting transmission of datagrams with a zero UDP checksum.  This
> is especially important as middleboxes that conform to RFC 2460 are
> likely to discard datagrams with a zero UDP checksum."
>
>
> That recognizes existing deployment *at that time*. It doesn't provide for continued ignorance of the change.
>
> Further, middleboxes that conform to RFC 2460 shouldn't be modifying the headers anyway...
>
And yet they do... have you ever heard of NAT?

In any case, I don't get the point of this coversation. We already
_have_ a working solution for the Internet. Non-zero UDP checksums
have long been accounted for and optimized. We have no users clamoring
to use zero UDP checksums. Turning up UDPv6 zero checksums is not a
leap forward any more than trying to make TCP checksums optional.

Tom