[tsvwg] draft-ietf-udp-options issues from IETF 104

Joe Touch <touch@strayalpha.com> Thu, 11 July 2019 05:16 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 645911200E5 for <tsvwg@ietfa.amsl.com>; Wed, 10 Jul 2019 22:16:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.218
X-Spam-Level:
X-Spam-Status: No, score=-1.218 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RJCntxW8zSEz for <tsvwg@ietfa.amsl.com>; Wed, 10 Jul 2019 22:16:10 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD06E1200D7 for <tsvwg@ietf.org>; Wed, 10 Jul 2019 22:16:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=HI6e3aswAbG9FGuRHOh78AFPSkyQrOESwGRc+wopsZo=; b=XGWqv4V8qkfjT1S8vNlgVzFao lSX4BdcGpcaa0zFY+lFzCCJHIbV24GuHC5YJCfajrwSu24fjhCsQsl6ly9bHbwUB2wtBwwvK2WFd1 zA0H/qe+tXDUGKAyEN4sbt5aHJDoN3DL+Io/XkPm6CqRbeDiiZF4ik2tO0CxkdTFf9i0mCua+tFkP nBfqI1oKTcPZ8xVcHEUwJuD5YKdMOE6FJtAv1a1PLtSYpToP8oq+BMGJxiu5pJEcP9Hq7072i3H35 FtRO5SuHVgpaVGBMBxl7lC/dHV5eUjaZvZdeNsjYTbpCujVV7uM1yQSzxNmqCFm3Wnw5QeBejCaUj FPoRzDRAQ==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:57364 helo=[192.168.1.10]) by server217.web-hosting.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1hlRR7-004CiF-6O; Thu, 11 Jul 2019 01:16:09 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_DC530358-547C-4E61-B0AA-77F00C48FC30"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Joe Touch <touch@strayalpha.com>
In-Reply-To: <CALx6S35grMA4uLYRGs4ioLfXBbS8zYN5ygprr=RKQ0hDk=Q1CQ@mail.gmail.com>
Date: Wed, 10 Jul 2019 22:16:04 -0700
Cc: Tom Herbert <tom@quantonium.net>, tsvwg <tsvwg@ietf.org>
Message-Id: <7EC37B50-45D5-4CF1-B113-205E55BF244E@strayalpha.com>
References: <156262970360.865.13042807682366763561.idtracker@ietfa.amsl.com> <CAPDqMeoMqsB8=tH5TBaq5Tw-sLW3HNc8tpfUU3htV=sWo7pJcA@mail.gmail.com> <D7E52D2B-3912-4897-80C6-0150CDE10218@strayalpha.com> <CAPDqMep9MYqjFvvJSVbqYwo-xJ1pUocYszNukveaZODhf9+75A@mail.gmail.com> <e73919f08202937bf45418cbf8bcc38c@strayalpha.com> <CAPDqMeoh3n5fL1k6Fw9D8rCpy4a9eWyUZvgStyzYfFuJbuWudw@mail.gmail.com> <3f6f54e0b828e2628af964d6ee7f33e1@strayalpha.com> <CALx6S37rt7OJtH5a2ZH23R21ATETuwTeFS-mZQECtgxPQ3nSZA@mail.gmail.com> <ccc386aa429bfe301998f39eb7fccfbf@strayalpha.com> <140f11c854e0ad96c51639f830cbb688@strayalpha.com> <CALx6S35MC_fj+fL6Ax9a-9=-QX0-mHLmMQ7cUs2Rir+AvYE=zA@mail.gmail.com> <5b35e91dd510119672a0836f868ade24@strayalpha.com> <CALx6S36AVbKfvb-6dj07rcGjsVsCz0daFM9qZOBSSstZOM-Ukg@mail.gmail.com> <8A584FFF-6C86-4154-8D9D-CF407CA77145@strayalpha.com> <CAPDqMeq9GjEQKukH1pZOTdE50e_rc3U6gpdxT-5qrS5phD0RGw@mail.gmail.com> <646D45AD-D79B-4BD2-A084-7DA97CE2C415@strayalpha.com> <CALx6S35grMA4uLYRGs4ioLfXBbS8zYN5ygprr=RKQ0hDk=Q1CQ@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-OutGoing-Spam-Status: No, score=-0.5
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/NAJvlaiCmj4Z11r1HqLOT1aRfkk>
Subject: [tsvwg] draft-ietf-udp-options issues from IETF 104
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jul 2019 05:16:12 -0000

Updating the subject line...

> On Jul 10, 2019, at 8:56 PM, Tom Herbert <tom@herbertland.com> wrote:
> ...
> So it took the better part of a day and quite a few emails to conclude that the only remaining issue in this proposal is one that we’ve already discussed at length.
> 
> Hardly the only remaining issue if you're referring to UDP options.

> Please look at minutes from last IETF. Both the subject of disambiguation of surplus space
> as well as negotiation of UDP options was raised (i.e. if the receiver requires checksum how
> does sender know that). I haven't seen these addressed by UDP options draft at least…

If you review the minutes from IETF 104, you will note that the next steps were yours and QUICs, not mine.

But let me jump in:

- regarding other uses of the option space:
	- as I’ve already noted in this thread, this was discussed on this list long before IETF 104
	- past uses (if there are any) would be protected (if necessary) by use of OCS (when OCS is used)
	- future uses need not be differentiated independently; they should be using the UDP option code points instead

Regarding soft-state coordination:
	- Sec 13 already addresses the general notion of soft state in a general sense.
	- on 3/20/19, I noted on the list that soft state mechanisms are not specified because each option might vary in how this is achieved
	- if this isn’t sufficient, can you please clarify?

Regarding use of options with encrypted transports:
	- I don’t know what “encrypted transports” means
	- UDP options includes AE, which is encryption and compatible with UDP options
	- transport *payload* encryption is independent of transport encryption and should have no impact on UDP AE
	- nobody from QUIC has contacted me on this issue

Joe