Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12

mohamed.boucadair@orange.com Fri, 11 June 2021 11:43 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 461293A34B0 for <tsvwg@ietfa.amsl.com>; Fri, 11 Jun 2021 04:43:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.796
X-Spam-Level:
X-Spam-Status: No, score=-2.796 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5JKtAlDfBZsp for <tsvwg@ietfa.amsl.com>; Fri, 11 Jun 2021 04:43:14 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.39]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA9A43A34AC for <tsvwg@ietf.org>; Fri, 11 Jun 2021 04:43:13 -0700 (PDT)
Received: from opfedar07.francetelecom.fr (unknown [xx.xx.xx.9]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar23.francetelecom.fr (ESMTP service) with ESMTPS id 4G1f9W4hjKzBsKx; Fri, 11 Jun 2021 13:43:11 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1623411791; bh=dNY0TzDMxIYoGGj0XENlSZu8ME9P40R1bLPIMatWYGE=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=TRzx32TYSankZXWH1xDCcmv2gEId4Y8CpcSjdQ5qaoEpf05hEeDe8qngxmlonY9fc Pqs9aZqBpQR5Paz+jLxSIuItifLiQRa7mxlIGoQhz7frDXuvz8rDvDxGBXgynTfB62 ZOBUrUoV5xcrc6vZ5k1x7r/qG/NFpbFdZCaZYPTvQY1wCkdc5qHmVZNe+QHPF8+YOz Lnl3pQrFA35v+P5aY85EvMxS21cZ7aKQc4mQ5JuYBpT9n3GaCxzZyvG8JV7Pdqrvg9 TggAp4CynXdy5kN8HrLFd5zSeVfcXtFKvi5OsJnC30PsBX/0/5G5LkU7mv4fVWiQbA XeDK2a489xtrg==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfedar07.francetelecom.fr (ESMTP service) with ESMTPS id 4G1f9W3fpjz5vNH; Fri, 11 Jun 2021 13:43:11 +0200 (CEST)
From: mohamed.boucadair@orange.com
To: Joseph Touch <touch@strayalpha.com>, "C. M. Heard" <heard@pobox.com>
CC: TSVWG <tsvwg@ietf.org>
Thread-Topic: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12
Thread-Index: AQHXXndsPcdnyu0kaEW72BgRc7q1H6sOrQ5Q
Date: Fri, 11 Jun 2021 11:43:11 +0000
Message-ID: <11037_1623411791_60C34C4F_11037_1_3_787AE7BB302AE849A7480A190F8B9330353A9C56@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <CACL_3VGb_9P5SfPGRJtf1ZBvEhgywc2ZEGr-qbgNOMXV20rFeA@mail.gmail.com> <CACL_3VHyoRr5ju8203DiLTUo-658DCj7ud+1dQE2o0hUPVhF0A@mail.gmail.com> <7D766992-AEEB-434F-BB1D-3817EE07DE61@strayalpha.com>
In-Reply-To: <7D766992-AEEB-434F-BB1D-3817EE07DE61@strayalpha.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.245]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/d8h3YbjLWsjFixsWB8IEsOksf7M>
Subject: Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Jun 2021 11:43:18 -0000

Hi Joe, all,

Regarding the FRAG option, I'm not sure there was a consensus this is a MUST to implement/support. 

Unless I'm mistaken, I didn't even remember a conclusion for one of the main threads when FRAG and other "design assumptions" were discussed back in 07/2019.

As indicated in https://mailarchive.ietf.org/arch/msg/tsvwg/rfh1wBYzlIHIzeVQruT5BVd8BRA/, I do still think that we would better focus on key foundations and build over them. FRAG can be defined properly in a separate document. It can be tagged as unsafe but it does not need to be mandatory to implement. 

Likewise, I do still think it is weird to assign codepoints for REQ/RES, but no details about the processing of these options is provided. These options are better covered in Gorry's draft and kinds assigned there. BTW, I'm still hoping a call for adoption can be issued for it. 

Cheers,
Med

> -----Message d'origine-----
> De : tsvwg [mailto:tsvwg-bounces@ietf.org] De la part de Joseph
> Touch
> Envoyé : vendredi 11 juin 2021 06:08
> À : C. M. Heard <heard@pobox.com>
> Cc : TSVWG <tsvwg@ietf.org>
> Objet : Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12
> 
> Hi, Mike,
> 
> I’ve been waiting for others to participate, but given it’s been a
> week…
> 
> First, I want to thank you for the deep review - it’s sincerely
> appreciated.
> 
> I’ll also be the first to admit there are more than a few places
> where it needs another pair of eyes and may have inconsistencies. So
> let’s start by assuming that those are dealt with separately. At a
> minimum, assume that most of the obvious corrections will be
> included in the next update.
> 
> I will respond  to the revised LITE option in reply to your other
> post.
> 
> On the primary issues, below summarizes my perspective. I hope
> others on the list will weigh in.
> 
> Joe
> 
> -----
> 
> - regarding fragment/reassembly as being required
> 	This is one of the primary current intended use cases and
> motivations for UDP options.
> 	That’s why it’s currently a MUST support and why I do not
> think that should change.
> 
> - regarding removing EOL
> 	Removing EOL raises several questions: can other options use
> that data? Do we care if it’s a covert channel? etc.
> 	It’s simpler to declare it zeroes and let EOL be the trigger
> to use a loop with a branch predictor hint (likely zero).
> 	At a minimum, everything past EOL MUST be covered by OCS
> (otherwise OCS would need to parse all options to find EOL).
> 
> - regarding increasing NOPs
> 	There was a concern in letting these be unlimited; we can
> increase to 7, 15, or even 31 (high enough for future-proof seems
> 	to open a DOS problem; IMO, DOS detection should just check to
> see if this is a persistent load, not a specific number)
> 
> - regarding UNSAFE option format
> 	Yes, we could pick a range rather than making them longer, but
> IMO they aren’t likely except as already accounted for, so
> 	allocating space from the main range is a waste.
> 	However, if we did allocate from the range, we should NOT do
> so with a single bit; that gives the false impression
> 	that a given option value has two variants - safe and unsafe,
> and that’s not the case.
> 
> - regarding AE being safe
> 	This is not considered unsafe for two reasons:
> 	1. A(authentication) isn’t unsafe
> 	2. Encryption should only be used when sending packets to a
> party that is keyed; that can/should be known or checked before use
> anyway.
> 	i.e., there’s never a case where you send encrypted text to a
> party you don’t know should be ready.
> 
> ----


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.