Re: [tsvwg] draft-ietf-udp-options issues from IETF 104

Joe Touch <touch@strayalpha.com> Thu, 18 July 2019 16:56 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6357120984 for <tsvwg@ietfa.amsl.com>; Thu, 18 Jul 2019 09:56:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.219
X-Spam-Level:
X-Spam-Status: No, score=-1.219 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dg68csJZwewo for <tsvwg@ietfa.amsl.com>; Thu, 18 Jul 2019 09:56:35 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2795E12098E for <tsvwg@ietf.org>; Thu, 18 Jul 2019 09:56:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=Message-ID:References:In-Reply-To:Subject:Cc: To:From:Date:Content-Type:MIME-Version:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=paBhGkimy940r+JscJGaQlaLIqcFni9QEwGwJeTdY0o=; b=K3ErbOoewJ3QjjUQClLGXL/WT WnVYtXTCxvdG8Phlz5B0CO+wFrQpuLewz05LVt07JF7I7WAn8kM60kczSjOoU8+9mjBDTQ6DmO+LN AJ6aGiyY7UXIS3mfCUa21Fa7iG+qgnMsGLvrsT/vRjuRoZ8z2LB/6YtrmBgytCtk8yj01Y1DxZ/I6 Jmpm6rDXK337ccA6dkuFh6bw+f1EYEzx7qaorw0AexKOdmk69t47YTmHbNVi2EyI1bAJR+wQ4LNT+ OypD/mhykg8JFa6gOIY97UWWoNxJu+D3U9cGvrTcpTQDdr2P3dy+54g+0j2iM0MPyCjc34gdP5WMA Msci515bA==;
Received: from [::1] (port=33322 helo=server217.web-hosting.com) by server217.web-hosting.com with esmtpa (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1ho9ha-000CkH-IE; Thu, 18 Jul 2019 12:56:22 -0400
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_e08c8e9af7e6c077b2f79b1fe6ef2b19"
Date: Thu, 18 Jul 2019 09:56:18 -0700
From: Joe Touch <touch@strayalpha.com>
To: Tom Herbert <tom@herbertland.com>
Cc: tsvwg <tsvwg@ietf.org>
In-Reply-To: <CALx6S34oOza3Z4Ymjsp+HLXnSTOKwh+SAQO8mt=a-1AbTTB0GQ@mail.gmail.com>
References: <30c17e9c174f6b0da3ecc6b503a8cb17@strayalpha.com> <CACL_3VGs7j+y5vFNT3OL9OKX8ue4rv-Cxi467KR-vbhnMdx86g@mail.gmail.com> <2f71a292f924a9b8de4227c4bbc2f809@strayalpha.com> <CACL_3VGrF5UnbVsSzZZoy1i57WKiQKBX2T3a16UyEVHY=Kr3XA@mail.gmail.com> <CE03DB3D7B45C245BCA0D243277949363061EF7A@MX307CL04.corp.emc.com> <CACL_3VE7+3WD3Uzubf8X9uQX9ZYPnZVhXjheUOuL9EfjT1JkGQ@mail.gmail.com> <CALx6S35V-d3Rn_wjrhbHUHgS=_+dVjR4hbMJ0-JBsG-1BuFuZg@mail.gmail.com> <B5CCEF58-38CE-4973-9CFD-002B404E4EF3@strayalpha.com> <CACL_3VEnJoV9N9i59fJXG1Nyt=mMWT7SuB8B=C-Y9a9QLtqP7Q@mail.gmail.com> <BB3FD9A5-8D30-4600-A7A7-DA3030BD34A3@strayalpha.com> <20190718100109.GA86292@clarinet.employees.org> <718EBD34-5B4A-4458-B9B4-0A94C33E019E@strayalpha.com> <CACL_3VGL2irCkZeEcP+9HLBHqtqaMPZM66youUsatzosUu=Aew@mail.gmail.com> <A07EA390-1A3A-4AE9-AFD7-2F22CD4B0E31@strayalpha.com> <CALx6S34oOza3Z4Ymjsp+HLXnSTOKwh+SAQO8mt=a-1AbTTB0GQ@mail.gmail.com>
Message-ID: <177233bb33272ce3b64298a005254724@strayalpha.com>
X-Sender: touch@strayalpha.com
User-Agent: Roundcube Webmail/1.3.7
X-OutGoing-Spam-Status: No, score=-0.5
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/dUTwBe1gzu6dM8BWTIGaXzu6wEo>
Subject: Re: [tsvwg] draft-ietf-udp-options issues from IETF 104
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jul 2019 16:56:37 -0000

On 2019-07-18 08:35, Tom Herbert wrote:

> ...
> 
> A single bit in the option type to indicate that the option can be
> skipped if unrecognized should be sufficient.
> 
> Tom

That bit has two meanings: 

- for legacy receivers, it's simply ignored for legacy data 

- for option-aware, if the flag is set, what does it mean? 
  - it should never mean drop the legacy data, otherwise an
options-aware endpoint can't decide to act as legacy 
  - it could mean drop non-legacy data 

Right now, the onus is on the receiver to decide what to do with the
data. The info is passed to the user - NOT decided by UDP. 

I.e., cuurrently: 

- unknown options are ignored by both legacy and option-aware endpoints 
- UDP processing skips over all such options 
- users can decide/negotiate what to do with those options on a per
endpoint basis 

Note: the first time you send something, if you want a response to help
you know what the endpoint will do, you need to set "ignore" anyway,
which is what the default does. Otherwise you won't get a response and
won't know why (the packet could have been dropped). 

So this only makes sense for negotiated soft-state anyway, at which
point the user can either configure the endpoint UDP socket to drop if
unknown or accept. 

Why would we NOT give the user this choice?

Joe