Re: [tsvwg] draft-ietf-udp-options issues from IETF 104

Tom Herbert <tom@herbertland.com> Mon, 15 July 2019 17:27 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 22FC61200EB for <tsvwg@ietfa.amsl.com>; Mon, 15 Jul 2019 10:27:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W8y60DOUzasf for <tsvwg@ietfa.amsl.com>; Mon, 15 Jul 2019 10:27:50 -0700 (PDT)
Received: from mail-ed1-x52f.google.com (mail-ed1-x52f.google.com [IPv6:2a00:1450:4864:20::52f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C71AA120026 for <tsvwg@ietf.org>; Mon, 15 Jul 2019 10:27:49 -0700 (PDT)
Received: by mail-ed1-x52f.google.com with SMTP id p15so16249508eds.8 for <tsvwg@ietf.org>; Mon, 15 Jul 2019 10:27:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=wt9pSyTuxkJ8kWbOGBM4w1AaraeE8i97cn3V56ihrIU=; b=d3RKGZrjSxxlmddEP9KPSf4dKLR3pHKJ4WvZGkeggU799llVVJrFMF0/4oUcWzDDYF ftS8wyJoEok6MT/4OKy8CRCFIOqUVwf+bTRP+d66zB4A8Lj9qHQx0Aco1Uv0NVH1XlMQ 5aOyRObzMcFhUmEcnSuRQdo2Cw6DLPUWclmiHfiHtFapnMwWl3MNCvMbXqi77cYAa+sT Fjhf3JKYiY2VR3odCKFPKINkLh2yDt/MqtdXmSQ/iRSqaF2bZ4azhbRcvP+TtHGyi8Oj D6qzlmEcHJ2VpAIIDexYYXX7uA39sxXLo9EihebmOhsgHLlXBf2oSlcMmx4khNotTNV5 tWXg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=wt9pSyTuxkJ8kWbOGBM4w1AaraeE8i97cn3V56ihrIU=; b=JBhLKV5ZvYb9xQOauT39NTKnIcDabU2wXFG9rtGgr6kM1nllgWUMLO4LRhgr6XXOGo 3MvjOFrJPkGrr94paB0852f3JeZ9Z7gcog9IQ9rSKQrvGyEVeEaBqz9cCduW9GhCTfOQ cblMdUi7rKgFFPEaY2AF1H6TCctSpdhUxZELIfBjdN/NrtbFv+pmGdE+AHO+j7lqjEcH /WnpGkQmmT8hDEmpqjS1m+XmMlNb0mNtOETMnwgVBzSDYMnCPyxEAbva5MBWBKMnsvHN yDelI1dsCIUpH7ReefwzHfAhUlylxMdPf0rpALZ/hBzTuPkufudaBk3UapQfklSMlLwU poBw==
X-Gm-Message-State: APjAAAXmncmO99jjrIbEO4SgDKrlLnd8jll8P0d/xHw6BvonYGO7vQl/ +FgekvhmKjSHp/ZmpEocSAMlw2EX6yUX8Kn6sWg=
X-Google-Smtp-Source: APXvYqwQoTZtcP7slJPRnLCzegJmX21w/RmyJp/5iqZg/dWURZlaiyh3p4Klab/G8JEcdYY0yxZ2Y9fOmCSTl2Pp6dQ=
X-Received: by 2002:a17:906:85d7:: with SMTP id i23mr21571292ejy.119.1563211668237; Mon, 15 Jul 2019 10:27:48 -0700 (PDT)
MIME-Version: 1.0
References: <CAPDqMeq9GjEQKukH1pZOTdE50e_rc3U6gpdxT-5qrS5phD0RGw@mail.gmail.com> <646D45AD-D79B-4BD2-A084-7DA97CE2C415@strayalpha.com> <7EC37B50-45D5-4CF1-B113-205E55BF244E@strayalpha.com> <CALx6S34s7L7xo+26bt5Cdaqi4Es5Aci42GHk1WNKzugr5st-Gw@mail.gmail.com> <B525BF50-EFCC-44A5-A604-6CDDA914A1CB@strayalpha.com> <CAPDqMep3R6z9PRKkHyOvrh6sV9n5Sc0B++-zVz0FYJCwE6swrQ@mail.gmail.com> <E42A2AE2-F499-465E-BDE6-5EFC0AB20042@strayalpha.com> <CE03DB3D7B45C245BCA0D24327794936306138E9@MX307CL04.corp.emc.com> <CAPDqMeoyNb7vQTdqxLpZpnKb9S7QKeDJNLyQJBmq95yXhB+xfQ@mail.gmail.com> <7D365770-64FE-40BC-901D-B4D7DF6B484B@strayalpha.com> <20190713182554.GB39770@clarinet.employees.org> <CALx6S36mH2M6SYnRSecWXa7k_d1u8O43+CXE-=KqeO0x2e5+qw@mail.gmail.com> <82FF6486-FABF-4D2C-B5E2-178779C720A4@strayalpha.com> <CALx6S34YhtgNNJtHazqJdsGRhiMa4PQXiSOuDz0JhqqyHWfNyA@mail.gmail.com> <757FDD92-EC4A-4AC2-B491-74B75119A951@strayalpha.com> <CALx6S36XCUs-oQVBSBX_KTg5qN4fgTBrrgqZqmwBwo75J3UqUA@mail.gmail.com> <3b6db46d21ac1bb7e6c6761df7501c92@strayalpha.com>
In-Reply-To: <3b6db46d21ac1bb7e6c6761df7501c92@strayalpha.com>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 15 Jul 2019 10:27:36 -0700
Message-ID: <CALx6S37L0gxaUmE5FT=ByvETY6FnzqXDPMU++RpCQaqpwPXEyA@mail.gmail.com>
To: Joe Touch <touch@strayalpha.com>
Cc: Derek Fawcus <dfawcus+lists-tsvwg@employees.org>, tsvwg <tsvwg@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/PQGt0UBEgh6LdcVW4xneA7DvP7k>
Subject: Re: [tsvwg] draft-ietf-udp-options issues from IETF 104
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Jul 2019 17:27:52 -0000

On Mon, Jul 15, 2019 at 10:02 AM Joe Touch <touch@strayalpha.com> wrote:
>
>
>
>
>
> On 2019-07-15 09:39, Tom Herbert wrote:
>
> On Mon, Jul 15, 2019 at 9:15 AM Joe Touch <touch@strayalpha.com> wrote:
>
>
>
>
> On Jul 15, 2019, at 8:50 AM, Tom Herbert <tom@herbertland.com> wrote:
>
> On Sun, Jul 14, 2019 at 8:52 AM Joe Touch <touch@strayalpha.com> wrote:
>
> So, *given* that we *are* different from UDP and TCP, i.e., we do NOT have the luxury of a fixed-offset location for this checksum
>
>
> Joe,
>
> There's no requirement that precludes defining a fixed header that
> precedes the surplus space.
>
>
> It clearly can't be a fixed location. Thats all I was asserting.
>
> Or do you disagree?
>
> In draft-herbert-udp-space-hdr-01 the checksum is a header that
> precedes the surplus space.
>
>
> I don't understand why this is confusing, so I'll be blunt:
>
> - OCS WILL NOT come at a *fixed offset* from the UDP header
>
Joe,

On that I agree. But, draft-herbert-udp-space-hdr-01 proposes to put a
checksum, which is not OCS, in a fixed header at the beginning of the
surplus space that covers the whole surplus. The motivations for this
are articulated in section 4 of that draft, have been brought several
times on the mailing list, as well as tsvwg meeting @IETF104.

Tom


> If you disagree, explain why you think that's true in your previous doc or any other.
>
> It also can't come at a fixed offset from the start of the surplus space UNLESS you assume that alignment doesn't matter.
>
> Is this clear enough?
>
>
>
> The surplus space header is the head of
> the surplus space aligned to a four byte offset (in case of UDP
> Extended Header no padding is required). The location and presence of
> the checksum field is deterministic.
>
>
> It's a deterministic EQUATION, but that equation is variable.
>
> I.e., the checksum is NOT at a fixed location from the *start of the packet*, as it is in the UDP and TCP headers.
>
>
>
> - why does the offset distance matter, i.e., front vs. end?
>
>
> Because some implementations assume that checksums are in protocol
> headers towards the beginning of the packet. For instance, for
> checksum offload the e1000e NIC stores offsets of checksum start and
> checksum field in a byte. If either offset is greater than 255 then
> the checksum can't be offloaded to the hardware.
>
>
> That's a nonstarter. We cannot make that limit. Any other reason?
>
>
> Well, this "nonstarter" has been in widescale deployment for many
> years with proven benefits.
>
>
> That works fine for the fixed headers in TCP and UDP, which are less than 255 bytes from the front of the packet in most cases (though not all). They're certainly less than 255 bytes from the front of the TCP or UDP packet start.
>
> However, are you also now asserting that we need to put OCS no more than 255 bytes from the front of the TCP or UDP packet?
>
> You do realize that widescale deployment of UDP and TCP use packet sizes of 500+ byte payloads, which means WE CANNOT BE STUCK WITH THAT LIMIT.
>
> Yes, OCS comes less than 255 bytes *from the beginning of the surplus space*, which itself comes some offset (>255) from the packet start.
>
> That's all I'm saying.
>
>
> This is just one example of how
> implementations have been tuned to work on protocol headers as opposed
> to protocol trailers,
>
>
> Sure, but if that's the limit AND it applies to the distance from the front of the UDP packet, are you claiming it is now a limit for how far OCS can be from the start?
>
> If that's the case, you're now claiming packets need to have payloads smaller than 255 bytes, which IS A NONSTARTER.
>
> So again, if that's where you're getting the limits of using CS offload, then use of that offload is already OFF THE TABLE. If not, please explain.
>
> Joe
>