Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12

Gorry Fairhurst <gorry@erg.abdn.ac.uk> Fri, 11 June 2021 14:37 UTC

Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20A1F3A46A9 for <tsvwg@ietfa.amsl.com>; Fri, 11 Jun 2021 07:37:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cqPowD75aqGG for <tsvwg@ietfa.amsl.com>; Fri, 11 Jun 2021 07:37:18 -0700 (PDT)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk [137.50.19.135]) by ietfa.amsl.com (Postfix) with ESMTP id 45D233A4689 for <tsvwg@ietf.org>; Fri, 11 Jun 2021 07:37:10 -0700 (PDT)
Received: from GF-MBP-2.lan (fgrpf.plus.com [212.159.18.54]) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPSA id 6E8211B003B1; Fri, 11 Jun 2021 15:37:04 +0100 (BST)
To: mohamed.boucadair@orange.com, Joseph Touch <touch@strayalpha.com>, "C. M. Heard" <heard@pobox.com>
Cc: TSVWG <tsvwg@ietf.org>
References: <CACL_3VGb_9P5SfPGRJtf1ZBvEhgywc2ZEGr-qbgNOMXV20rFeA@mail.gmail.com> <CACL_3VHyoRr5ju8203DiLTUo-658DCj7ud+1dQE2o0hUPVhF0A@mail.gmail.com> <7D766992-AEEB-434F-BB1D-3817EE07DE61@strayalpha.com> <11037_1623411791_60C34C4F_11037_1_3_787AE7BB302AE849A7480A190F8B9330353A9C56@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Message-ID: <7aaa39d3-0431-e4b0-36bd-1db0686b24dc@erg.abdn.ac.uk>
Date: Fri, 11 Jun 2021 15:37:03 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:78.0) Gecko/20100101 Thunderbird/78.10.0
MIME-Version: 1.0
In-Reply-To: <11037_1623411791_60C34C4F_11037_1_3_787AE7BB302AE849A7480A190F8B9330353A9C56@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-GB
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Wnj09H2E4AZp2uiTq7OA_enEhVg>
Subject: Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Jun 2021 14:37:30 -0000

Hi all,

On 11/06/2021 12:43, mohamed.boucadair@orange.com wrote:
> Hi Joe, all,
>
> Regarding the FRAG option, I'm not sure there was a consensus this is a MUST to implement/support.
>
> Unless I'm mistaken, I didn't even remember a conclusion for one of the main threads when FRAG and other "design assumptions" were discussed back in 07/2019.
As I recall, this is the last fragmentation is the last thing we need to 
nail-down. I'm  unsure
> As indicated in https://mailarchive.ietf.org/arch/msg/tsvwg/rfh1wBYzlIHIzeVQruT5BVd8BRA/, I do still think that we would better focus on key foundations and build over them. FRAG can be defined properly in a separate document. It can be tagged as unsafe but it does not need to be mandatory to implement.

On the one hand: I can ses it would be nice to have many things in the 
common standard and immediately available to use.

On the other hand: There seems to me to be singificantly more complexity 
and choice in managing reassembly than in the other aspects of UDP 
options- I can see how this could vary depending on usage: how much 
memory to use for reassembly, and what size is considered acceptable. To 
me, that makes it seems reasonable to ask whether a minimal implemention 
needs to offer this.

I know when someone in Aberdeen University implemented an earlier rev. 
of UDP-Options, this was the part that wasn't done.

> Likewise, I do still think it is weird to assign codepoints for REQ/RES, but no details about the processing of these options is provided. These options are better covered in Gorry's draft and kinds assigned there. BTW, I'm still hoping a call for adoption can be issued for it.

I'd also like to see adoption:-). I think it would be nice if the 
UDP-Opt and UDP-DPLPMTUD could be published together with consecutive 
RFC numbers!

One way to avoid fragmentation can be to discover and cache a larger 
PMTU:-).

Gorry (as an individual tsvwg'er)

> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : tsvwg [mailto:tsvwg-bounces@ietf.org] De la part de Joseph
>> Touch
>> Envoyé : vendredi 11 juin 2021 06:08
>> À : C. M. Heard <heard@pobox.com>
>> Cc : TSVWG <tsvwg@ietf.org>
>> Objet : Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12
>>
>> Hi, Mike,
>>
>> I’ve been waiting for others to participate, but given it’s been a
>> week…
>>
>> First, I want to thank you for the deep review - it’s sincerely
>> appreciated.
>>
>> I’ll also be the first to admit there are more than a few places
>> where it needs another pair of eyes and may have inconsistencies. So
>> let’s start by assuming that those are dealt with separately. At a
>> minimum, assume that most of the obvious corrections will be
>> included in the next update.
>>
>> I will respond  to the revised LITE option in reply to your other
>> post.
>>
>> On the primary issues, below summarizes my perspective. I hope
>> others on the list will weigh in.
>>
>> Joe
>>
>> -----
>>
>> - regarding fragment/reassembly as being required
>> 	This is one of the primary current intended use cases and
>> motivations for UDP options.
>> 	That’s why it’s currently a MUST support and why I do not
>> think that should change.
>>
>> - regarding removing EOL
>> 	Removing EOL raises several questions: can other options use
>> that data? Do we care if it’s a covert channel? etc.
>> 	It’s simpler to declare it zeroes and let EOL be the trigger
>> to use a loop with a branch predictor hint (likely zero).
>> 	At a minimum, everything past EOL MUST be covered by OCS
>> (otherwise OCS would need to parse all options to find EOL).
>>
>> - regarding increasing NOPs
>> 	There was a concern in letting these be unlimited; we can
>> increase to 7, 15, or even 31 (high enough for future-proof seems
>> 	to open a DOS problem; IMO, DOS detection should just check to
>> see if this is a persistent load, not a specific number)
>>
>> - regarding UNSAFE option format
>> 	Yes, we could pick a range rather than making them longer, but
>> IMO they aren’t likely except as already accounted for, so
>> 	allocating space from the main range is a waste.
>> 	However, if we did allocate from the range, we should NOT do
>> so with a single bit; that gives the false impression
>> 	that a given option value has two variants - safe and unsafe,
>> and that’s not the case.
>>
>> - regarding AE being safe
>> 	This is not considered unsafe for two reasons:
>> 	1. A(authentication) isn’t unsafe
>> 	2. Encryption should only be used when sending packets to a
>> party that is keyed; that can/should be known or checked before use
>> anyway.
>> 	i.e., there’s never a case where you send encrypted text to a
>> party you don’t know should be ready.
>>
>> ----
>
> _________________________________________________________________________________________________________________________
>
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.
>