Re: [tsvwg] Fwd: New Version Notification for draft-herbert-fast-06.txt

"C. M. Heard" <heard@pobox.com> Mon, 07 August 2023 04:08 UTC

Return-Path: <heard@pobox.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 175A2C15106B for <tsvwg@ietfa.amsl.com>; Sun, 6 Aug 2023 21:08:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.806
X-Spam-Level:
X-Spam-Status: No, score=-2.806 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pobox.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WSpSz7j56oE4 for <tsvwg@ietfa.amsl.com>; Sun, 6 Aug 2023 21:08:44 -0700 (PDT)
Received: from pb-smtp2.pobox.com (pb-smtp2.pobox.com [64.147.108.71]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5127DC14F75F for <tsvwg@ietf.org>; Sun, 6 Aug 2023 21:08:43 -0700 (PDT)
Received: from pb-smtp2.pobox.com (unknown [127.0.0.1]) by pb-smtp2.pobox.com (Postfix) with ESMTP id 84D03191AE4 for <tsvwg@ietf.org>; Mon, 7 Aug 2023 00:08:42 -0400 (EDT) (envelope-from heard@pobox.com)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=pobox.com; h= mime-version:references:in-reply-to:from:date:message-id:subject :to:cc:content-type; s=sasl; bh=I1nxf9WADRh8Ata2hEAsgUI59WswQU3H Gop6y0HZtKo=; b=VJVJGrO/R9T/YWpAjY4mUPr2wJz2R6DBacMP8L9oPwjrteHv iFbfg3WsLdXHoUA7iBE9jvwV5pXOk4ze5yPWRa2iQbyhEgWMWCRVN7QrI88X8Q/N 8bY6Tl3suYaH0S/5nLc4LL0Rti+jOIOnTu58alPriO6hs/Fsu+UrEEmTQrU=
Received: from pb-smtp2.nyi.icgroup.com (unknown [127.0.0.1]) by pb-smtp2.pobox.com (Postfix) with ESMTP id 6C1F0191AE3 for <tsvwg@ietf.org>; Mon, 7 Aug 2023 00:08:42 -0400 (EDT) (envelope-from heard@pobox.com)
Received: from mail-ed1-f46.google.com (unknown [209.85.208.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp2.pobox.com (Postfix) with ESMTPSA id C8A56191ADF for <tsvwg@ietf.org>; Mon, 7 Aug 2023 00:08:41 -0400 (EDT) (envelope-from heard@pobox.com)
Received: by mail-ed1-f46.google.com with SMTP id 4fb4d7f45d1cf-51e28cac164so10810296a12.1 for <tsvwg@ietf.org>; Sun, 06 Aug 2023 21:08:41 -0700 (PDT)
X-Gm-Message-State: AOJu0YzqPTzYfBW1I68gz1GEhqgFRqCSuuWK2vTpSmtELfvjwxvUHsUh XZMP3imnHV1KFAcms29/dbkagldq+bu1134x3ac=
X-Google-Smtp-Source: AGHT+IG/BJ96wImaUpCV+BpyXeJk21LSo6C1E+EpLCS3jvsMJrCW1XwPB7yo1JYG170xbunm7G4Z84KbS/afNET5Ntg=
X-Received: by 2002:aa7:cd93:0:b0:522:b876:9ef5 with SMTP id x19-20020aa7cd93000000b00522b8769ef5mr7082463edv.8.1691381320818; Sun, 06 Aug 2023 21:08:40 -0700 (PDT)
MIME-Version: 1.0
References: <169117515763.55726.13968317606848733819@ietfa.amsl.com> <CALx6S35teCfh41TTdc+HWPj4dZo1F7gwcRRZmKBprZeFyqUy5A@mail.gmail.com>
In-Reply-To: <CALx6S35teCfh41TTdc+HWPj4dZo1F7gwcRRZmKBprZeFyqUy5A@mail.gmail.com>
From: "C. M. Heard" <heard@pobox.com>
Date: Sun, 06 Aug 2023 21:08:29 -0700
X-Gmail-Original-Message-ID: <CACL_3VFnp7KLYPioquWYRxOMSdNGoUD6pUdgqJucNrPp1DnNsA@mail.gmail.com>
Message-ID: <CACL_3VFnp7KLYPioquWYRxOMSdNGoUD6pUdgqJucNrPp1DnNsA@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
Cc: tsvwg <tsvwg@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000cea3b606024d665f"
X-Pobox-Relay-ID: 182EEA9A-34D8-11EE-B878-307A8E0A682E-06080547!pb-smtp2.pobox.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/IMdqUWT3Mb4CgUmZDzoeJ0mwzRo>
Subject: Re: [tsvwg] Fwd: New Version Notification for draft-herbert-fast-06.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Aug 2023 04:08:48 -0000

On Fri, Aug 4, 2023 at 12:02 PM Tom Herbert wrote:
> At IETF117, there were a number of proposals to do host network
> signaling, and they are using various protocol mechanisms to
> annotate packets with the signals. I think this indicates a growing
> interest in finding a solution.
>
> Signaling requires a carrier and content. This draft focuses on the
> carrier and proposes a Hop-by-Hop option to be the common carrier of
> per packet host to network signaling. The typical concern raised with
> Hop-by-Hop options is that they are undeployable. The draft surveys
> other proposed methods and suggests mitigations for issues with
> Hop-by-Hop options. Despite the issues, the conclusion of this draft
> is that Hop-by-Hop options is the best option for an extensible,
> generic, transport stateless, and standardizable method for host to
> network signaling compared to any of the known alternatives.

I read the draft with interest, and I see that this version cites
both draft-kaippallimalil-tsvwg-media-hdr-wireless and
draft-reddy-tsvwg-explcit-signal, which were presented at IETF 117
and propose to use UDP options for network signalling.

Were it not for the well-known deployability issues associated with
Hop-by-Hop options in the general Internet, I would consider it the
method of choice, and for certain limited domain scenarios (like that
envisaged by draft-kaippallimalil-tsvwg-media-hdr-wireless in the short
term) it might well be viable today. But I think it's fair to ask
when -- if ever -- the ongoing efforts to fix the Hop-by-Hop option
deployability problems in the general Internet will bear fruit. That's
very much an open question. Perhaps, then, it's not unreasonable for
proponents of host-to-network signaling to look for methods that have
a less uncertain path to deployability.

Regarding the solution using UDP options: I do not disagree with the
draft's premise that asking network devices  to look for signals in
options that reside in a trailer and are (at least potentially)
intermixed with transport options is asking for a very heavy lift.
However, it is possible to get around that, if the WG wants to pursue
this use of UDP options, and that is to co-opt per-fragment options
for network signalling. I proposed that in

https://mailarchive.ietf.org/arch/msg/tsvwg/SpcVd6EB1Zi6FUhhyn2-o6nxuq4/

This isn't within the goals the UDP options specification set out to
achieve -- its title, after all, is "Transport Options for UDP" -- and
it does go against the grain by adding network signaling to a transport
protocol. On the other hand, some folks think we crossed that bridge a
long time ago; consider this 2015 quote from Brian Trammell on the SPUD
mailing list (that was the precursor to the PLUS effort):

On Fri, Jul 10, 2015 at 3:44 AM, Brian Trammell wrote:
> Coming back to the layering question:
>
> It does seem to me that what we're (the we that wrote the two
> documents starting this thread) trying to do is explicitly reinforce
> the boundary between the network layer and the transport layer, where
> this is defined as "things the path needs to see versus things only
> endpoints need to see". Asking nicely (i.e., publishing RFCs) did not
> work in this case: the transport ports are de facto part of the
> network layer now, and short of blowing the Internet up and starting
> over I can't see a way to get them back. So now we are left with
> enforcing the boundary cryptographically, leaving some space in the
> "new network layer" (in this case, IP + UDP (for ports) + SPUD) for
> those things now commonly done within the network.

I think it's incumbent on the advocates of the use of UDP options for
host to network signaling to speak up if they want to see the WG make
this change of direction.

Thanks,

Mike Heard