Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12
Gorry Fairhurst <gorry@erg.abdn.ac.uk> Fri, 11 June 2021 14:37 UTC
Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20A1F3A46A9 for <tsvwg@ietfa.amsl.com>; Fri, 11 Jun 2021 07:37:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cqPowD75aqGG for <tsvwg@ietfa.amsl.com>; Fri, 11 Jun 2021 07:37:18 -0700 (PDT)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk [137.50.19.135]) by ietfa.amsl.com (Postfix) with ESMTP id 45D233A4689 for <tsvwg@ietf.org>; Fri, 11 Jun 2021 07:37:10 -0700 (PDT)
Received: from GF-MBP-2.lan (fgrpf.plus.com [212.159.18.54]) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPSA id 6E8211B003B1; Fri, 11 Jun 2021 15:37:04 +0100 (BST)
To: mohamed.boucadair@orange.com, Joseph Touch <touch@strayalpha.com>, "C. M. Heard" <heard@pobox.com>
Cc: TSVWG <tsvwg@ietf.org>
References: <CACL_3VGb_9P5SfPGRJtf1ZBvEhgywc2ZEGr-qbgNOMXV20rFeA@mail.gmail.com> <CACL_3VHyoRr5ju8203DiLTUo-658DCj7ud+1dQE2o0hUPVhF0A@mail.gmail.com> <7D766992-AEEB-434F-BB1D-3817EE07DE61@strayalpha.com> <11037_1623411791_60C34C4F_11037_1_3_787AE7BB302AE849A7480A190F8B9330353A9C56@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Message-ID: <7aaa39d3-0431-e4b0-36bd-1db0686b24dc@erg.abdn.ac.uk>
Date: Fri, 11 Jun 2021 15:37:03 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:78.0) Gecko/20100101 Thunderbird/78.10.0
MIME-Version: 1.0
In-Reply-To: <11037_1623411791_60C34C4F_11037_1_3_787AE7BB302AE849A7480A190F8B9330353A9C56@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-GB
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Wnj09H2E4AZp2uiTq7OA_enEhVg>
Subject: Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Jun 2021 14:37:30 -0000
Hi all, On 11/06/2021 12:43, mohamed.boucadair@orange.com wrote: > Hi Joe, all, > > Regarding the FRAG option, I'm not sure there was a consensus this is a MUST to implement/support. > > Unless I'm mistaken, I didn't even remember a conclusion for one of the main threads when FRAG and other "design assumptions" were discussed back in 07/2019. As I recall, this is the last fragmentation is the last thing we need to nail-down. I'm unsure > As indicated in https://mailarchive.ietf.org/arch/msg/tsvwg/rfh1wBYzlIHIzeVQruT5BVd8BRA/, I do still think that we would better focus on key foundations and build over them. FRAG can be defined properly in a separate document. It can be tagged as unsafe but it does not need to be mandatory to implement. On the one hand: I can ses it would be nice to have many things in the common standard and immediately available to use. On the other hand: There seems to me to be singificantly more complexity and choice in managing reassembly than in the other aspects of UDP options- I can see how this could vary depending on usage: how much memory to use for reassembly, and what size is considered acceptable. To me, that makes it seems reasonable to ask whether a minimal implemention needs to offer this. I know when someone in Aberdeen University implemented an earlier rev. of UDP-Options, this was the part that wasn't done. > Likewise, I do still think it is weird to assign codepoints for REQ/RES, but no details about the processing of these options is provided. These options are better covered in Gorry's draft and kinds assigned there. BTW, I'm still hoping a call for adoption can be issued for it. I'd also like to see adoption:-). I think it would be nice if the UDP-Opt and UDP-DPLPMTUD could be published together with consecutive RFC numbers! One way to avoid fragmentation can be to discover and cache a larger PMTU:-). Gorry (as an individual tsvwg'er) > Cheers, > Med > >> -----Message d'origine----- >> De : tsvwg [mailto:tsvwg-bounces@ietf.org] De la part de Joseph >> Touch >> Envoyé : vendredi 11 juin 2021 06:08 >> À : C. M. Heard <heard@pobox.com> >> Cc : TSVWG <tsvwg@ietf.org> >> Objet : Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12 >> >> Hi, Mike, >> >> I’ve been waiting for others to participate, but given it’s been a >> week… >> >> First, I want to thank you for the deep review - it’s sincerely >> appreciated. >> >> I’ll also be the first to admit there are more than a few places >> where it needs another pair of eyes and may have inconsistencies. So >> let’s start by assuming that those are dealt with separately. At a >> minimum, assume that most of the obvious corrections will be >> included in the next update. >> >> I will respond to the revised LITE option in reply to your other >> post. >> >> On the primary issues, below summarizes my perspective. I hope >> others on the list will weigh in. >> >> Joe >> >> ----- >> >> - regarding fragment/reassembly as being required >> This is one of the primary current intended use cases and >> motivations for UDP options. >> That’s why it’s currently a MUST support and why I do not >> think that should change. >> >> - regarding removing EOL >> Removing EOL raises several questions: can other options use >> that data? Do we care if it’s a covert channel? etc. >> It’s simpler to declare it zeroes and let EOL be the trigger >> to use a loop with a branch predictor hint (likely zero). >> At a minimum, everything past EOL MUST be covered by OCS >> (otherwise OCS would need to parse all options to find EOL). >> >> - regarding increasing NOPs >> There was a concern in letting these be unlimited; we can >> increase to 7, 15, or even 31 (high enough for future-proof seems >> to open a DOS problem; IMO, DOS detection should just check to >> see if this is a persistent load, not a specific number) >> >> - regarding UNSAFE option format >> Yes, we could pick a range rather than making them longer, but >> IMO they aren’t likely except as already accounted for, so >> allocating space from the main range is a waste. >> However, if we did allocate from the range, we should NOT do >> so with a single bit; that gives the false impression >> that a given option value has two variants - safe and unsafe, >> and that’s not the case. >> >> - regarding AE being safe >> This is not considered unsafe for two reasons: >> 1. A(authentication) isn’t unsafe >> 2. Encryption should only be used when sending packets to a >> party that is keyed; that can/should be known or checked before use >> anyway. >> i.e., there’s never a case where you send encrypted text to a >> party you don’t know should be ready. >> >> ---- > > _________________________________________________________________________________________________________________________ > > Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. > > This message and its attachments may contain confidential or privileged information that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and delete this message and its attachments. > As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. > Thank you. >
- [tsvwg] A review of draft-ietf-tsvwg-udp-options-… C. M. Heard
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… mohamed.boucadair
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Gorry Fairhurst
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… C. M. Heard
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… C. M. Heard
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… C. M. Heard
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… C. M. Heard
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Paul Vixie
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… C. M. Heard
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… C. M. Heard
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Gorry Fairhurst
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Gorry Fairhurst
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Tom Herbert
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Gorry Fairhurst
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… C. M. Heard
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joe Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Tom Herbert
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joe Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joe Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Tom Herbert
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Gorry Fairhurst
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Tom Herbert
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… C. M. Heard
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Tom Herbert
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… C. M. Heard
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Paul Vixie
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… C. M. Heard
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Tom Herbert
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Tom Herbert
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Joseph Touch
- Re: [tsvwg] A review of draft-ietf-tsvwg-udp-opti… Paul Vixie
- [tsvwg] UDP Options - per segment or per datagram C. M. Heard
- Re: [tsvwg] UDP Options - per segment or per data… Joseph Touch
- Re: [tsvwg] UDP TIME Option - per segment or per … C. M. Heard
- Re: [tsvwg] UDP REQ/RES Options - per segment or … C. M. Heard
- Re: [tsvwg] UDP TIME Option - per segment or per … Joseph Touch
- Re: [tsvwg] UDP REQ/RES Options - per segment or … Joseph Touch