Re: [tsvwg] RDMA Support by UDP FRAG Option

Joseph Touch <touch@strayalpha.com> Mon, 21 June 2021 04:34 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9637E3A2116 for <tsvwg@ietfa.amsl.com>; Sun, 20 Jun 2021 21:34:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.455
X-Spam-Level:
X-Spam-Status: No, score=0.455 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.652, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LcqbQiVJNr_4 for <tsvwg@ietfa.amsl.com>; Sun, 20 Jun 2021 21:34:18 -0700 (PDT)
Received: from server217-4.web-hosting.com (server217-4.web-hosting.com [198.54.116.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D51CB3A2115 for <tsvwg@ietf.org>; Sun, 20 Jun 2021 21:34:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=2+XtVqPPCo9lZJeLIcA4te5/0aWbBx4nQJKpO9tN2Uo=; b=o1JMqoscuSJOiuQaUacNyd0Od+ nvNkb/r77+zaR069vnDby9YZNsB8LJdgSNG1onxs5IuJxTlSQGeFYPtdAzX6iyEFCK11K02XXJSwb EEq5XAo+TpQz9808a3/p4XqNxdKTejDlPdARzgZalCviVz3Y9W3Kj69Ha4XK8a+Xg6hW46heznUbM 62ChNIJROzwc+imgCzDZ0+zz8aVNnA9cB8v7pF3leaH1m0R/l539X1Pl8skueowxPHZCIXxZGl9kS GXLollcvp8aRMHOuzOysQgfSBKfMvMBipbrZGxvGCKGHDLyYrQX44EhOYKFNotTdy94OGSAZFAr8x rwnUwBSQ==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:58353 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <touch@strayalpha.com>) id 1lvBdT-0033uB-Tz; Mon, 21 Jun 2021 00:34:16 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_87F3CC10-9EE7-4EB6-8522-201FA000BBDC"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.100.0.2.22\))
From: Joseph Touch <touch@strayalpha.com>
In-Reply-To: <CALx6S35GJC_fq8wnehGSHY7WTW7YU7NA4wOSNoEGUF5w+pNx6g@mail.gmail.com>
Date: Sun, 20 Jun 2021 21:34:10 -0700
Cc: Gorry Fairhurst <gorry@erg.abdn.ac.uk>, TSVWG <tsvwg@ietf.org>
Message-Id: <4BA67B6B-E60F-474B-AD78-1FED2C3A58AD@strayalpha.com>
References: <CACL_3VEyLdQZ-3hvzXxyA8ehtWs2hXESZ2OqyAx+BeSg85+-cA@mail.gmail.com> <CACL_3VFE4TjKvmkfZjvNpWo6vVfKjz5w85=Q+yqnYZKcwbYLmQ@mail.gmail.com> <63FFC34B-2179-47F1-B325-21CAC3D1543A@strayalpha.com> <CACL_3VHTfxWaBj7TFEmBXBqovrrAj7XuFEZFUag_iBHr3Hx09g@mail.gmail.com> <0EBFC9B0-591A-4860-B327-6E617B83F4D1@strayalpha.com> <CALx6S34pT81TbfQDk2vKF8wBrXL312As79K=rEzUQ3Lmg7UvpA@mail.gmail.com> <7C51D926-9DBB-41F5-93B2-10F716F672B1@strayalpha.com> <CALx6S37uN8TsXQZ3cv5jmxwxSyBRjK=-GQ_MsWxPWSs21XoGHw@mail.gmail.com> <CACL_3VEx7+VnLz7OLdXyhZU41e+-oBz3dc8JdMV_7pLMfic6=w@mail.gmail.com> <fcc8762f-c042-7999-d2e4-f28384950a19@erg.abdn.ac.uk> <CALx6S36sWGcZmFpAhF4DfOMyf6Z0w5F9bemNfeM1yWV-r0M+BA@mail.gmail.com> <8af3abf9-943f-13c1-e239-5efca27cf68c@erg.abdn.ac.uk> <CACL_3VHdyLAmzMbWsTVfJD+4tTzsMvcTzKS1B1CAdZ3k5U957g@mail.gmail.com> <CALx6S34DUrUBYd94LPPg4Hgh0FnZYZjZ4eKEYuaxb-7zbzb=pQ@mail.gmail.com> <CACL_3VEq9R=HmWXGbu_zcrgWfG0=q0z+HWM3cQ9Vh68hTCUR-w@mail.gmail.com> <CALx6S35bdGwY8FagGn8x5CaO4O3zW3U+NnB5ejC7bB6BHsXtJg@mail.gmail.com> <CACL_3VFwUJzT7uiXh33gBffboqqb51uFWJAEh290SsD0=aAzaQ@mail.gmail.com> <CALx6S34Lai=YS8i1VTC1zKHqsCTt_XUeKfwob7Qe_BA49bHC3A@mail.gmail.com> <CACL_3VFZphux8uCqh6seVgTEjyjOhCjGd-jHtdGc0fR9opKWUg@mail.gmail.com> <CALx6S34Yrph523yd0vx9EsCscwrjJY2ek6VrEj+7zCDGTLyuPA@mail.gmail.com> <48E7C759-957B-4E96-8A55-581AC40E5B28@strayalpha.com> <CALx6S36diVj2cd3JKBhvhA7xv3X5Wne9YO+v2sThX9jD-5tbEQ@mail.gmail.com> <F3DA8FA4-D335-42D2-B5F4-7DFDC866A2CA@strayalpha.com> <CALx6S35GJC_fq8wnehGSHY7WTW7YU7NA4wOSNoEGUF5w+pNx6g@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.3654.100.0.2.22)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/bY7HXB1H7GM4rQi2NBOOJcaAdws>
Subject: Re: [tsvwg] RDMA Support by UDP FRAG Option
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Jun 2021 04:34:23 -0000


> On Jun 20, 2021, at 9:11 PM, Tom Herbert <tom@herbertland.com> wrote:
> 
> 
> 
> On Sun, Jun 20, 2021, 8:58 PM Joseph Touch <touch@strayalpha.com <mailto:touch@strayalpha.com>> wrote:
> 
> 
>> On Jun 20, 2021, at 8:43 PM, Tom Herbert <tom@herbertland.com <mailto:tom@herbertland.com>> wrote:
>> 
>> 
>> 
>> On Sun, Jun 20, 2021, 8:04 PM Joseph Touch <touch@strayalpha.com <mailto:touch@strayalpha.com>> wrote:
>> 
>> 
>>> On Jun 20, 2021, at 6:24 PM, Tom Herbert <tom@herbertland.com <mailto:tom@herbertland.com>> wrote:
>> …
>> 
>> Length  is the length  in octets  of this user datagram  including  this
>> header  and the data.   (This  means  the minimum value of the length is
>> eight.)
>> 
>> Please stop repeating any claim to the contrary, except to note an error in an existing implementation (which should be corrected, not propagated).
>> 
>> I am describing how real implementation actually *works*.
> 
> I do not doubt that, but you *are* propagating an error.
> 
> That is your opinion.

It is explicit in the text cited above. 

> 
> 
>> There is no error because the correct checksum per RFC768 can be produced.
> 
> That logic is equivalent to “we do math in base 6” because you only ever tried to add 2+2=4. 
> 
> It’s both faulty as logic and incorrect.
> 
> No, it's not. The algorithms I described are provably correct. One's complement addition is commutative and associative so:
> 
> Sum (whole_packet_from_UDP_header) = Sum(UDP_packet) + Sum(Surplus_area)

Agreed, where the first one is “whole ***IP** packet from UDP header”. The UDP packet has a length and that’s not it.

> So if Sum(Surplus_area == 0)

That is not a requirement anywhere in UDP, but note that there are two zeroes in ones complement arithmetic.

> then Sum (whole_packet_from_UDP_header) = Sum(UDP_packet),

Sure. And if Sum(Surplus_area == 1, then Sum(IP payload) == Sum(UDP packet) + 1.

> and therefore rather an offload performs the computation over the just the UDP packet or includes the surplus area they get the same correct result.

Said more specifically, an offload that is implemented INCORRECTLY will still work.

Yes.

Again, we already support that when OCS is included for many versions of the draft now. We don’t support it when it isn’t, but that’s only allowed when UDP CS=0. These two are coupled for reasons other than making erroneous checksum work.

What’s your point?

Joe