Re: [tsvwg] I-D Action: draft-ietf-tsvwg-udp-options-13.txt

Joseph Touch <touch@strayalpha.com> Sun, 01 August 2021 01:32 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20BAA3A2471 for <tsvwg@ietfa.amsl.com>; Sat, 31 Jul 2021 18:32:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.317
X-Spam-Level:
X-Spam-Status: No, score=-1.317 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CayQc_hRbTZ0 for <tsvwg@ietfa.amsl.com>; Sat, 31 Jul 2021 18:32:51 -0700 (PDT)
Received: from server217-4.web-hosting.com (server217-4.web-hosting.com [198.54.116.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 089573A246F for <tsvwg@ietf.org>; Sat, 31 Jul 2021 18:32:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=4u698gRaj7hh7b+dHsbWlwaKRtSQdC2EDidcxo1Bvog=; b=C7kEQyFw6cWLJpDnZW5q3jVQEs bsbjG4dFnL6SK9iS2spjW0Yzj61X/JW6FiQVntbCXGHu8fcLzSx4o+80INZq+tC8I/oKe2XiUrAa1 TCtrjlzaB05PBDGC+FcC0BAgWh7QEF8vOvyDfZBakVYPOw9hXf+bFiidPt1NZv5yvLyXV1RvEEj42 DqXKpxXStML1LrisE9kDWINNVUZXTLPj6wcBu8czFXVutddSSfvIpRX5iOjUa81np1C/1DV2yTuoT RsNpPaThGjp7nMdMZTgo708ILnGTg3bTDYdP+JZN5DF0PPj4pWlxLES4cv32KO0SqQ46ESDtEd9Vf FuvS+xfw==;
Received: from cpe-172-114-237-88.socal.res.rr.com ([172.114.237.88]:62604 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <touch@strayalpha.com>) id 1mA0LM-000eBk-NI; Sat, 31 Jul 2021 21:32:49 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_3470E29B-86F4-42DB-85E5-D51920798E6C"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
From: Joseph Touch <touch@strayalpha.com>
In-Reply-To: <CACL_3VF=yW1D9MMMMAHtcQvANRpp0b_e3N41kTnO=_M=aW6X4A@mail.gmail.com>
Date: Sat, 31 Jul 2021 18:32:43 -0700
Cc: TSVWG <tsvwg@ietf.org>
Message-Id: <9C3C32BB-D823-4293-9141-43D086551C2C@strayalpha.com>
References: <162408795080.21706.5548660195641640175@ietfa.amsl.com> <C2C396E7-B728-496E-841B-D9F64004D3E3@strayalpha.com> <CACL_3VHC55cdu96=5OuNKmaaXrvDY5wkYid9a+j6=VtQrvJhZg@mail.gmail.com> <5086F1C2-55C9-4BD4-BB80-9C247E379204@strayalpha.com> <CACL_3VF=yW1D9MMMMAHtcQvANRpp0b_e3N41kTnO=_M=aW6X4A@mail.gmail.com>
To: "C. M. Heard" <heard@pobox.com>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Qt7uaJFbQ8XlBSaqZqqvVr-WRTc>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-udp-options-13.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Aug 2021 01:32:56 -0000

Hi, Mike,

> On Jul 31, 2021, at 4:28 PM, C. M. Heard <heard@pobox.com> wrote:
> 
> On Wed, Jul 7, 2021 at 10:25 PM Joseph Touch wrote:
> Hi, Mike,
> 
>> On Jun 26, 2021, at 10:13 PM, C. M. Heard wrote:
>> 
>> On Sat, Jun 19, 2021 at 12:39 AM Joseph Touch wrote:
>> Here’s a summary - I tried to catch both everything Mike provided feedback on as well as what I have proposed as a way forward.
>> 
>> This is much appreciated, thank you. My item-by-item responses follow.
> 
> 
>> OCS
>> Uses the standard 2-byte prefix (all but NOP and EOL do)
>> Added discussion of RFC 6935 regarding exception to requiring the UDP checksum and thus OCS
>> Allow OCS’s checksum to be precomputed, but still check in the order options occur
>> Occurs over the entire surplus area (doesn’t stop at EOL)
>> OK on most points, but I strongly object to the following when OCS is mandatory (as is the case when UDP CS <> 0):
>> 
>>    Note that a receiver can compute the OCS checksum before processing
>>    any UDP options, but that computation would assume OCS is used and
>>    would not be verified until the OCS option is interpreted.
>> 
>> If I perform the computation before processing any options, and OCS is mandatory, it would be foolish of me to waste any more effort seeking the OCS option in the TLV chain. I already know that the option area is invalid,
> 
> How exactly do you know this? If OCS is mandatory, you need to find it (seek it in the TLV chain) in order to know whether the value you compute differs from the value in the option.
> 
> This last statement is not true, and I think it's important to clarify that fact.
> 
> If OCS is mandatory (because UDP CS<>0), then I can determine whether the options area has an INVALID checksum by computing the 16-bit Internet checksum over the options area conceptually prepended by a 2-byte options area pseudo-header containing the options area length. If the result is not a 1s complement zero, then I KNOW that the option checksum is not valid. Full stop. Whether that is because the OCS TLV is absent or because it is present and has the wrong value makes no difference; the option checksum is not valid, and I do not need to parse a single TLV to determine that. I can immediately stop option processing and discard the contents of the option area.

OK - I see what you’re getting at now. We can adjust the text accordingly.

Joe