[tsvwg] Comments on recent UDP options work

"C. M. Heard" <heard@pobox.com> Sun, 25 November 2018 16:03 UTC

Return-Path: <heard@pobox.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BFBF12E043 for <tsvwg@ietfa.amsl.com>; Sun, 25 Nov 2018 08:03:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pobox.com; domainkeys=pass (1024-bit key) header.from=heard@pobox.com header.d=pobox.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AvxFBGvWT2UQ for <tsvwg@ietfa.amsl.com>; Sun, 25 Nov 2018 08:03:21 -0800 (PST)
Received: from pb-smtp21.pobox.com (pb-smtp21.pobox.com [173.228.157.53]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA81A1277D2 for <tsvwg@ietf.org>; Sun, 25 Nov 2018 08:03:21 -0800 (PST)
Received: from pb-smtp21.pobox.com (unknown [127.0.0.1]) by pb-smtp21.pobox.com (Postfix) with ESMTP id 0C65A2F60D for <tsvwg@ietf.org>; Sun, 25 Nov 2018 11:03:21 -0500 (EST) (envelope-from heard@pobox.com)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=pobox.com; h=mime-version :from:date:message-id:subject:to:content-type; s=sasl; bh=8mlExF o7Tso5QBaAbIfZJZEutxQ=; b=Bzqip+Uzq2FTnIL4wRyda2c7GfpS1wfrFeoDtG uM8+tHx/6xIwou73L3lckWsM+3HDdhs7u838mloPL13xZixsbtO+yQbD3Y0LD1JL qeQD1fClcHn3pto56SN+JGYBu+YqVko9xsVjbxrJ0kVrDjHFqCYgvKp75mhYRfSv pGAvU=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=pobox.com; h=mime-version :from:date:message-id:subject:to:content-type; q=dns; s=sasl; b= fuCRhdBW1SbRvPKaj7YBLn9x3dcDg7XZ+3vlcST4xJ3f+wloDNz5AutAW3pmX2xE 3AFlL39cLZpLzG4X3uJVwA/+j2U6VhIo5epqvswpUka7+MxJfKgnca3NLEMDAMUV 9bu1GC82qB1JCMEmCjOXahX7pNSaWYb2KipkB+NyL4k=
Received: from pb-smtp21.sea.icgroup.com (unknown [127.0.0.1]) by pb-smtp21.pobox.com (Postfix) with ESMTP id E54BD2F60C for <tsvwg@ietf.org>; Sun, 25 Nov 2018 11:03:20 -0500 (EST) (envelope-from heard@pobox.com)
Received: from mail-it1-f174.google.com (unknown [209.85.166.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp21.pobox.com (Postfix) with ESMTPSA id 5BA462F60B for <tsvwg@ietf.org>; Sun, 25 Nov 2018 11:03:18 -0500 (EST) (envelope-from heard@pobox.com)
Received: by mail-it1-f174.google.com with SMTP id g85so24664298ita.3 for <tsvwg@ietf.org>; Sun, 25 Nov 2018 08:03:18 -0800 (PST)
X-Gm-Message-State: AGRZ1gJvps1WeRtDGAANC9sJdeLjPbjVpejOzkfgl63Y+IBuAJqrsizd miiaTMMdCdNK3eUkLaThBiOsBDB2d71qB2+kp9E=
X-Google-Smtp-Source: AFSGD/V/Iz9AQTlOrpiQv/ELyS9OAM1MrggLmAynG5QPonehglRhE0q31tItjKqYML5/R0HRWjkKX+V5al2Gi00rQRY=
X-Received: by 2002:a24:ee83:: with SMTP id b125mr21025987iti.151.1543161797154; Sun, 25 Nov 2018 08:03:17 -0800 (PST)
MIME-Version: 1.0
From: "C. M. Heard" <heard@pobox.com>
Date: Sun, 25 Nov 2018 08:03:05 -0800
X-Gmail-Original-Message-ID: <CACL_3VFG+B1AZfC09XTTq0Ht8tM5RoZt8zy1c5aK2NLpQQwKGA@mail.gmail.com>
Message-ID: <CACL_3VFG+B1AZfC09XTTq0Ht8tM5RoZt8zy1c5aK2NLpQQwKGA@mail.gmail.com>
To: tsvwg <tsvwg@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000c0218a057b7f5a79"
X-Pobox-Relay-ID: 9FBE411E-F0CB-11E8-AB3D-CC883AD79A78-06080547!pb-smtp21.pobox.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/b25pgWeIkOoe6l9dEk37XUsiFWY>
Subject: [tsvwg] Comments on recent UDP options work
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 25 Nov 2018 16:03:24 -0000

After reviewing the IETF 103 meeting minutes and presentations and the
recent thread on "UDP Options Implementation Update" I have a few comments.

   1. First thanks to Tom Jones and collaborators for the pilot
   implementation and tests, In a way, the results are more interesting than
   reassuring, give that even with the checksum compensation option (CCO, see
   https://tools.ietf.org/html/draft-fairhurst-udp-options-cco-00) drop
   rates were in the 5% - 28% range.
   2. I would support adopting CCO as an alternative to OCS and making its
   use RECOMMENDED. Although CCO is a bit more expensive than OCS, the
   advantage i(for deployability) of having drop rates go from an average of
   greater than 50% to around 20% trumps the extra complexity. If we wish to
   retain LITE for for its originally intended purpose -- i.e., to allow for
   only partial checksum coverage -- I think we would also want to keep OCS as
   an alternative for this use case; using CCO with LITE would defeat that
   purpose. Of course, the high drop rates observed without CCO put into
   question the practical viability of the latter combination.
   3. The discussion of the use cases for the FRAG option as described in
   the minutes focused on tunnels. This overlooks DNS, which appears to me to
   be a potentially more important use case. A client could include a FRAG
   option indicating a complete datagram in a request as a signal that it
   supports the FRAG option; the server would then have the option to use UDP
   fragmentation to send a reply that would otherwise need IP fragmentation.
   Given the observed drop rates for UDP options with DNS over UDP this would
   definitely not be a panacea, but it might be one of a number of useful
   tools to combat the high drop rate of IPv6 fragments.
   4. In the thread on "UDP Options Implementation Update," Tom Jones said "The
   current spec puts data in the UDP payload, which does not seem correct." If
   I understand this comment correctly, I think the issue is addressed by
   using it in combination with LITE. If in the end we don't retain LITE, it
   would still be possible to re-specify the FRAG option to get the same
   effect (i.e., make all data in the fragment part of the option); in this
   case, we would need a separate option to signal that FRAG is understood, in
   order to support (3) above.
   5. In connection with (4) above I have a question for Tom and his
   colleagues: did any of your test cases include packets with options but no
   UDP user data (i.e., with UDP Length == 0)? If this particular case fails
   dramatically, even with CCS, it would IMHO be a nail in the coffin of
   FRAG+LITE (or the variant FRAG discussed above). On the other hand, if it
   works, it would confirm the viability of FRAG+LITE (or the variant FRAG)
   without having to do a full implementation.

Thanks and regards,

Mike Heard