Re: [tsvwg] Rregarding soft-state and UDP options

Joe Touch <touch@strayalpha.com> Sun, 05 January 2020 20:46 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C36712004F for <tsvwg@ietfa.amsl.com>; Sun, 5 Jan 2020 12:46:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.219
X-Spam-Level:
X-Spam-Status: No, score=-1.219 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IEf-unOhp4If for <tsvwg@ietfa.amsl.com>; Sun, 5 Jan 2020 12:46:27 -0800 (PST)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 03A54120020 for <tsvwg@ietf.org>; Sun, 5 Jan 2020 12:46:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=B1V+8S1rCsvT2bbRCEyqF0HQ0BEQwRoLTPQ27yyoSck=; b=yZ8HZuBxe/uScfF5F+ydVFW/Z 4NdRMRKQvK/Y7Z3/vmWOFmJsz1UjpRkgtwD4lpjWt90mQnq8ApwOU6YLsmFEMcRyr7kKd7tJp2XMt q964kOjl2CZUAUtbdarRVNQLBxa0KfAIy7SLFG/iwt35+8Ko/w17gHlipfTwR+RoS933jJDF/REzw GYRLPFc9zMWegg2Aa85u5vMDWwb8LaqFgKI2UjBnJI814na1unP3XqFT8GRmSuXY+WHD8bTTk6hAM SBqQA30PtiUpDJm6iCy7WU7UwDMf2cepG4YfKVKyppqnYwV3rPAauNV7jc2+JLnjBrMXMOC+ugNa7 MFk5mnbuw==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:50264 helo=[192.168.1.10]) by server217.web-hosting.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1ioCn0-003Sfm-7i; Sun, 05 Jan 2020 15:46:26 -0500
Content-Type: multipart/alternative; boundary="Apple-Mail=_F1C9F923-D2AE-4538-BC56-53500A15B050"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Joe Touch <touch@strayalpha.com>
In-Reply-To: <CALx6S372xi1rTiAw6ZmLAU-yN6RvF7PEcg6sNqS=WcNVvYMTZw@mail.gmail.com>
Date: Sun, 05 Jan 2020 12:46:20 -0800
Cc: TSVWG <tsvwg@ietf.org>
Message-Id: <FEFC49BC-0D34-419D-818E-D80A85B1C74E@strayalpha.com>
References: <CALx6S37oZK8urwN-TCpZxs9F_+QXzobT8-rObPH112NkqSpUVQ@mail.gmail.com> <418EE20D-387B-48C1-BC08-614D28D7849E@strayalpha.com> <CALx6S372xi1rTiAw6ZmLAU-yN6RvF7PEcg6sNqS=WcNVvYMTZw@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/j5C7a1sgXh5MHsFWxOHn1ittzyE>
Subject: Re: [tsvwg] Rregarding soft-state and UDP options
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 05 Jan 2020 20:46:28 -0000


> On Jan 5, 2020, at 12:13 PM, Tom Herbert <tom@herbertland.com> wrote:
> 
> On Sun, Jan 5, 2020 at 11:21 AM Joe Touch <touch@strayalpha.com> wrote:
>> 
>> Malformed packets are dropped as with TCP and the base UDP spec.
>> 
> And packet with unknown options that cannot be ignored need be dropped
> (IPv6 HBH and destination options for instance).

You keep citing network protocols, not transport.

Transport protocols don’t have this behavior - and it’s IMPOSSIBLE to implement for legacy UDP receivers.

> Such a packet is
> equivalent to a malformed packet since these packet cannot be
> correctly processed by the receiver.

I cited the section of RFC 1122 that indicates this is incorrect. It is also reiterated as incorrect in both TCP-MD5 and TCP-AO.

TCP receivers silently and individually ignore unknown options unless they indicate a parsing error.

To put it more directly, malformed != unknown. That’s true for ALL protocols of which I am aware.

> In any case, send a malformed UDP options to an options aware receiver
> then the packet is dropped, send the same packet to a legacy receiver
> then a zero length packet is received. There is no consistency there,
> and neither does that conform to the requirement in normative language
> that you just proposed

UDP options are supposed to *ignore all options* if the options are malformed - NEVER just drop the packet. The packet and its body data (NOT the FRAG data, the conventional body data) would still be received, just without the options (and no, that’s not yet in the doc, but should have been).

This is the relevant existing text:
   >> Receivers MUST silently ignore unknown options. That includes
   options whose length does not indicate the specified value.
The text that follows regarding options that are too long is incorrect in v08; it should say that the options are all silently ignored when any are malformed.

Joe