Re: [tsvwg] Rregarding soft-state and UDP options

Joe Touch <touch@strayalpha.com> Sat, 04 January 2020 18:11 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7214120088 for <tsvwg@ietfa.amsl.com>; Sat, 4 Jan 2020 10:11:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.219
X-Spam-Level:
X-Spam-Status: No, score=-1.219 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RAv4mHdOyFbw for <tsvwg@ietfa.amsl.com>; Sat, 4 Jan 2020 10:11:48 -0800 (PST)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7806612000F for <tsvwg@ietf.org>; Sat, 4 Jan 2020 10:11:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id: Content-Transfer-Encoding:Cc:Date:In-Reply-To:From:Subject:Mime-Version: Content-Type:Sender:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=/WjN3oLTLLOdfqW6qV+R/hdtwnuMFwiKOxbf8CSMdPM=; b=pZ3zwVItY8okEESxF/q7Z1Uxm D7/3iEOMg2Qj+aKN5I9n+xBD9gbnDqqIZHI3j67xAFA0j8Ka66o1tiiPpZjznprlEMex/H+tEopeF 1Ok6LEYOd0UOnt/ftt0UC7nIgAotNMTM0WKKQlKiK12Tp3Rssn8zgEVmlZVaABz374DPAT1lRe+UI z7c4rL9aVLk+tLVv9Dmhy3uZVKsJkVN6okGw+EhPyz5rEFYIZ0UY6okbL5RJiiToQx6UBtsBJ4asJ 3nk1jaZVWcBFyelhVi3vVMmTjPMAYPth77+tYhkAOma6GFiuJ5cTc2D53zkBR4g6w0HTuKzQSbas7 q2Hh8m45A==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:56963 helo=[192.168.1.10]) by server217.web-hosting.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1inntm-0049fD-IB; Sat, 04 Jan 2020 13:11:47 -0500
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Joe Touch <touch@strayalpha.com>
In-Reply-To: <CALx6S35VgZZ+jv1eStLaZb-Qr=T2j7CzOFkyFi0Wf1OC1V9nAw@mail.gmail.com>
Date: Sat, 04 Jan 2020 10:11:41 -0800
Cc: TSVWG <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <D9C159B8-8C56-4136-81B5-D24586DA8A17@strayalpha.com>
References: <CALx6S36227JnMkaZtPUvJoY5Pw-rQgy2R6tqt1PF_L=bgCjxCA@mail.gmail.com> <85C8C994-3FEA-4DF4-8C46-75CB205D09EA@strayalpha.com> <CALx6S34EfhcthoG4Qtr0JtfsdqQPr-2=havTvq_7nh9K8XDhJA@mail.gmail.com> <5E21B9BD-3148-43C9-BCB8-E6F5DFCE69C3@strayalpha.com> <CALx6S35VgZZ+jv1eStLaZb-Qr=T2j7CzOFkyFi0Wf1OC1V9nAw@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/U448p5PegNS_P2jAf2pJAxww-tY>
Subject: Re: [tsvwg] Rregarding soft-state and UDP options
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jan 2020 18:11:50 -0000


> On Jan 4, 2020, at 9:09 AM, Tom Herbert <tom@herbertland.com> wrote:
> 
> On Fri, Jan 3, 2020 at 8:35 PM Joe Touch <touch@strayalpha.com> wrote:
>> 
>> Lost in this discussion has been an example to motivate the need for “drop if not supported”.
>> 
>> I’ve been asking for this for over a year and yet NO new existing transport examples have been cited.
>> 
>> The only hypotheticals proposed are content encryption and content compression. Encryption is already supported by the AE option. TCP has a content compression option code point. It was assigned in 1999 with an experimental draft (Bellovin’s) that never made it past -00 individual.
>> 
>> The existing architecture already supports both these examples (i.e., that modify content) using FRAG+LITE as follows:
>> 
>>        - each frag (even if only one) is decrypted/decompressed as processed
>>        - the frags are OCS-verified after reassembly (frag completion)
>>        - if decompression or decryption is silently ignored (i.e., if not supported), then the reassembly OCS would fail
>> 
> 
> Joe,
> 
> Section 11 of the draft describes the handling of the unrecognized
> options, specifically it says:
> 
> "The above requirements prevent using any option that cannot be
> safely ignored unless that capability has been negotiated with an
> endpoint in advance for a socket pair."
> 
> The referenced requirements are different than what you are describing
> here.

Yes. That and other issues will be addressed when the draft is revised. These include:

- clarifying the use of soft state (it is NOT the sole means for ensuring unknown options are used, but it remains useful for other optimizations).
- allowing a code point to create a separate table of options that don’t modify the FRAG+LITE data to cause that data to be dropped if not supported
- updating the design goals to explain they are motivated by the unsupported claim that they may be needed in the future and that no examples are given because none have been offered
- and not necessarily using that code point for AE because it the frag reassembly check has always protected against the modified variant (encryption) and it is the receiver’s discretion whether to ever enforce the unmodified variant (authentication) anyway

I.e., yes, once the changes are made, they do assume update *throughout the document* to address related issues.

I have agreed to these changes even though you and others continue to lack any example of the need for such a feature.

What point are you now arguing?

Joe