Re: [tsvwg] draft-ietf-tsvwg-rfc6040update-shim: Suggested Fragmentation/Reassembly text

Joe Touch <touch@strayalpha.com> Wed, 09 October 2019 14:29 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59E3112010E for <tsvwg@ietfa.amsl.com>; Wed, 9 Oct 2019 07:29:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.22
X-Spam-Level:
X-Spam-Status: No, score=-1.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rOUNVIx1p66X for <tsvwg@ietfa.amsl.com>; Wed, 9 Oct 2019 07:29:22 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2640312006E for <tsvwg@ietf.org>; Wed, 9 Oct 2019 07:29:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id: Content-Transfer-Encoding:Cc:Date:In-Reply-To:From:Subject:Mime-Version: Content-Type:Sender:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=DsKbLQcNNJQA1Gu4x0LBr+nZBBWYVgpug4G9q1ZKvWc=; b=luETwfj42pJxVMI+wHD2ni6nh vAzUXveJOYglh3BVU5zm6sQalEh6JRrMjAeupXEPBTGy4ZvbSZ/I/l6WrFSNttvBP9hmAPa2fFDT2 Q8/1cZsB/j5zGp/XUvLtyGdiQL55zz6mbC0Rknv9vWbNOMq6KJXnFrKMPHWrG1aPlq/eMlmdaMhA8 dk8PAkoWEzRo9X4fnR5dB8OdCBugUTvqshpZ7cTzIYHoTsjm7N+OCpX42qOBp0fhiwBiwjTgu0T3F rkMV3n/4nkCiKCJKidN3YO/JoXI+fqEWmggiIoZMgf9KHD9wdSjH67sj8YviIxhYMXNNKADoTtWuf /wrA2omGQ==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:61269 helo=[192.168.1.10]) by server217.web-hosting.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1iICxo-000Dhm-Lc; Wed, 09 Oct 2019 10:29:21 -0400
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Joe Touch <touch@strayalpha.com>
In-Reply-To: <CE03DB3D7B45C245BCA0D2432779493630768173@MX307CL04.corp.emc.com>
Date: Wed, 09 Oct 2019 07:29:13 -0700
Cc: Jonathan Morton <chromatix99@gmail.com>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <6D176D4A-C0A7-41BA-807A-5478D28A0301@strayalpha.com>
References: <CE03DB3D7B45C245BCA0D243277949363076629A@MX307CL04.corp.emc.com> <CE03DB3D7B45C245BCA0D24327794936307662EA@MX307CL04.corp.emc.com> <1920ABCD-6029-4E37-9A18-CC4FEBBFA486@gmail.com> <CE03DB3D7B45C245BCA0D2432779493630768173@MX307CL04.corp.emc.com>
To: "Black, David" <David.Black@dell.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/b66KHgy7r8RvDUDK_FBnKHrvEz0>
Subject: Re: [tsvwg] draft-ietf-tsvwg-rfc6040update-shim: Suggested Fragmentation/Reassembly text
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Oct 2019 14:29:23 -0000

Hi, all,

I disagree with the suggestion below.

Pushing this “under the rug” for an indeterminate later date only serves to undermine the importance of this issue.

At a MINIMUM, there needs to be direct guidance in place until a “better” solution can be developed. For now, that would mean one of the following:
- use the max of the frag code point values
- use the min of the frag code point values
- use “any” of the frag code point values
- pick some other way (first, the one in the initial fragment i.e., offset 0), etc.

One of these needs to be *included at this time*.

If a clean up doc needs to be issued, it can override individual “scattered” recommendations later.

Joe

> On Oct 9, 2019, at 6:33 AM, Black, David <David.Black@dell.com> wrote:
> 
>> The one case this doesn't really cover is what happens when a fragment set
>> has a mixture of ECT(0) and ECT(1) codepoints.  This probably isn't very
>> relevant to current ECN usage, but may become relevant with SCE, in which
>> middleboxes on the tunnel path may introduce such a mixture to formerly
>> "pure" packets.  From my perspective, a likely RFC-3168 compliant
>> implementation of arbitrarily choosing one fragment's ECN codepoint as
>> authoritative (where it doesn't conflict with other rules) is acceptable, but
>> this doesn't currently seem to be mandatory.
>> 
>> With the above language, it should be sufficient to update RFC-3168 to cover
>> this case at an appropriate time, rather than scattering further requirements
>> in many documents.
> 
> I would concur that using a separate draft to cover that case at the appropriate time would be the better course of action.
> 
> Thanks, --David
> 
>> -----Original Message-----
>> From: Jonathan Morton <chromatix99@gmail.com>
>> Sent: Tuesday, October 8, 2019 6:55 PM
>> To: Black, David
>> Cc: tsvwg@ietf.org
>> Subject: Re: [tsvwg] draft-ietf-tsvwg-rfc6040update-shim: Suggested
>> Fragmentation/Reassembly text
>> 
>> 
>> [EXTERNAL EMAIL]
>> 
>>> On 8 Oct, 2019, at 10:51 pm, Black, David <David.Black@dell.com> wrote:
>>> 
>>> **NEW**: Beyond those first two paragraphs, I suggest deleting the rest
>> of Section 5 of the rfc6040update-shim draft and substituting the following
>> paragraph:
>>> 
>>>   As a tunnel egress reassembles sets of outer fragments
>>>   [I-D.ietf-intarea-tunnels] into packets, it MUST comply with
>>>   the reassembly requirements in Section 5.3 of  RFC 3168 in
>>>   order to ensure that indications of congestion are not lost.
>>> 
>>> It is certainly possible to continue from that text to paraphrase part or all of
>> Section 5.3 of RFC 3168, but I think the above text crisply addresses the
>> problem, and avoids possibilities of subtle divergence.  I do like the
>> “reassembles sets of outer fragments” lead-in text (which I copied from the
>> current rfc6040shim-update draft) because that text makes it clear that
>> reassembly logically precedes decapsulation at the tunnel egress.
>>> 
>>> Comments?
>> 
>> Looks good to me.
>> 
>> The one case this doesn't really cover is what happens when a fragment set
>> has a mixture of ECT(0) and ECT(1) codepoints.  This probably isn't very
>> relevant to current ECN usage, but may become relevant with SCE, in which
>> middleboxes on the tunnel path may introduce such a mixture to formerly
>> "pure" packets.  From my perspective, a likely RFC-3168 compliant
>> implementation of arbitrarily choosing one fragment's ECN codepoint as
>> authoritative (where it doesn't conflict with other rules) is acceptable, but
>> this doesn't currently seem to be mandatory.
>> 
>> With the above language, it should be sufficient to update RFC-3168 to cover
>> this case at an appropriate time, rather than scattering further requirements
>> in many documents.
>> 
>> - Jonathan Morton
>