Re: [tsvwg] I-D Action: draft-ietf-tsvwg-udp-options-dplpmtud-02.txt

mohamed.boucadair@orange.com Thu, 09 December 2021 14:00 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 121623A0CC7 for <tsvwg@ietfa.amsl.com>; Thu, 9 Dec 2021 06:00:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HJQlezErqI09 for <tsvwg@ietfa.amsl.com>; Thu, 9 Dec 2021 06:00:51 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 320163A0CC9 for <tsvwg@ietf.org>; Thu, 9 Dec 2021 06:00:51 -0800 (PST)
Received: from opfednr06.francetelecom.fr (unknown [xx.xx.xx.70]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfednr26.francetelecom.fr (ESMTP service) with ESMTPS id 4J8wfm6D8Gzylx; Thu, 9 Dec 2021 15:00:48 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1639058448; bh=p1AGyaufg7jsPQW5D0UKTeqfUFjJsd2j+NnHOh1dib0=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=BLziAgHuSq8cPqApe++oueikkcRDK2HtocxwxiMBeekezYnkEL5uGNXj9YWxnqHAm SwVISAnj3TRrzF0djlINOcnOTomq2qWyckrAn+pcSMEkg7zYNr+byRp0OLfM7aEdcO D9Fe/VQbJ5ZJJazABxsd0aHiTyWKG1c5Gu9ZIpVOUA5XsIe2SCyZxqTSfPdmH8c+X4 9VqGfGqTwUmKgDwO2jlMU69/ssR6t08kblmlTExxblayOBJ0liQiAQeAm4Qm6t0DkA u7hdv19ddyNNMr16Sh+K2J4j8/HnXTNO+c6xW4Nwtr1aS7jveqdN668qqD/CAqeI3v MzaFKi0JH7yVQ==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfednr06.francetelecom.fr (ESMTP service) with ESMTPS id 4J8wfm5HlpzDq7Q; Thu, 9 Dec 2021 15:00:48 +0100 (CET)
From: mohamed.boucadair@orange.com
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: I-D Action: draft-ietf-tsvwg-udp-options-dplpmtud-02.txt
Thread-Index: AQHX7Oau+V2bOKsLpES519yRvAUiVKwqJTVw
Content-Class:
Date: Thu, 09 Dec 2021 14:00:47 +0000
Message-ID: <22260_1639058448_61B20C10_22260_249_1_787AE7BB302AE849A7480A190F8B933035461A08@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <163785494316.17506.9044882518269944059@ietfa.amsl.com> <24268_1638965971_61B0A2D3_24268_138_1_787AE7BB302AE849A7480A190F8B933035460D95@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <250f239f-edeb-eaab-d67f-92c672d78a77@erg.abdn.ac.uk>
In-Reply-To: <250f239f-edeb-eaab-d67f-92c672d78a77@erg.abdn.ac.uk>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2021-12-09T13:21:14Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=8751c96a-84a8-406d-9ad7-e9c78299c797; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.114.13.245]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/lv23iJuJiFLd5gMzyd6G1fAZdu0>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-udp-options-dplpmtud-02.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Dec 2021 14:00:56 -0000

Hi Gorry, 

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Gorry Fairhurst <gorry@erg.abdn.ac.uk>
> Envoyé : jeudi 9 décembre 2021 11:22
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
> Cc : tsvwg@ietf.org
> Objet : Re: I-D Action: draft-ietf-tsvwg-udp-options-dplpmtud-02.txt
> 
> On 08/12/2021 12:19, mohamed.boucadair@orange.com wrote:
> > Hi Gorry,
> >
> > Thank you for taking into account the first set of comments. Please find
> below some additional comments. Most of them are nits.
> >
> > * Consider updating Section 2 to indicate that the reader should be
> familiar with the terms defined in Sections 2 and 5 of RFC8899.

[Med] seems this one was missed. 

> > * Section 3:
> > (1) (nit)
> >
> > OLD: An upper PL (or application ..
> > NEW: An upper PL (or application) ..
> Done in author's version.
> > (2) (nit)
> > OLD: at multiple levels, so, when when ...
> > NEW: at multiple levels, so, when ...
> Done in author's version.
> > (3) (nit)
> > OLD: This section describes packet formats and procedures for DPLPMTUD
> using UDP Options ..
> > NEW: This document describes packet formats and procedures for DPLPMTUD
> using UDP Options ..
> 
> We changed to:
> 
>     The packet formats and procedures for DPLPMTUD using UDP Options are
> described in this document.
> 
> > * Section 4:
> >
> > (1) ".. as noted in bullet 2 of Section 2 in [RFC8899]": I checked that
> section but failed to see the relevant part to which this text refers to.
>   Section /2/3/
> > (2) You may change "token" to "nonce" to align with the udp-options
> > I-D
> 
> Yes, good idea. Also to align:
> 
> /Section 6 of I-D.ietf-tsvwg-udp-options"/Section 5.11 of I-D.ietf-tsvwg-
> udp-options"/
> 
> > (3) (nit) s/to reception of a previously received REQ Option/to a
> > received REQ Option
> 
> Reworded.
> 
> > (4) (nit) s/reception of a specific received probe/reception of a
> > specific probe
> /Reception of a RES Option confirms that a
>          specific probe has been received by the remote UDP
>          Options receiver./
> > (5) "The initial value of the four byte token field SHOULD... ": not
> sure why "initial" is mentioned here. I would reword this to require that
> each nonce value is randomly generated.
> 
> This I wonder - if really this is necessary that all probes carry a random
> nonce, in the past we have managed with sequentially numbered probes -
> initialised with a hard to guess value 

[Med] If you have the initial random value close to the nonce bounds (0, 2^32 - 1), randomness does not add much because of nonce wraps around. A more efficient approach to prevent off-path attacks is to use random nonces per request. 

(RFC9085 gives one example of a

[Med] I guess you meant 8085.

> random port field)?

[Med] Random source port numbers may not be sufficient for IPv4 as the randomness can be nullified by an on-path NAT in some cases. Think about NATs that assign contiguous port set for an internal source. Having random nonces is much more efficient.  

 You may wish to explain more, but for the moment I
> have replaced this by:
> 
> /The value of the four byte nonce field SHOULD be initialised to a
> randomised value/
> 
> > (6) (nit) s/A probe to confirm the path can support the BASE_PLPMTU see
> Section 5.1.4 of [RFC8899])/A probe to confirm the path can support the
> BASE_PLPMTU (Section 5.1.4 of [RFC8899]).
> Done
> >
> > (7) Section 4.2.4 "Sending Packet Probes that include Application Data"
> says the following:
> >
> >     The method can be designed to only use probes that are formed of a
> >     UDP datagram that includes application data (which could be
> >     applications control information), padded to the required size and
> >     include a RES Option.  This implements "Probing using padding data",
> >     and avoids having to retransmit application data when a probe fails.
> >
> > There is a disconnect between the first sentence and the second one.
> 
> Yes - this wasn't really finished. The idea was to be simple, but allow
> people to
> 
> use application keep alives etc as probes in implementations in future,
> that may be
> 
> complicated - but would be more efficient for black hole detection.
> 
> I propose to restructure like this:
> 
>    <section title="Processing Probe Packets that do not include
> Application Data">
>        <t>
>        A simple implementation of the method might be designed
>        to only probe packets formed of a UDP datagram that include no
>        application data. Each probe packet is padded to the required
>        probe size and including a RES Option

[Med] why RES is included in a probe packet? Also, why this is discussed given that the section title is about processing a received probe?

. This implements
>         "Probing using padding data"

[Med] Please add a pointer to Section 4.1 of RFC8899. 

, and avoids having to retransmit
>        application data when a probe fails.
>        In this use, the probe packets do not form a part of the end-to-end
>        transport data and a receiver does not deliver them to the upper
> layer protocol.
>        </t>
>   </section>
> 
> <section title="Processing Probe Packets that include Application Data">
>        <t>
>        An implmentation always uses the format in the previous section
>        when DPLPMTUD searches to increase the PLPMTU.</t>
>        <t>
>            An alternative format is permitted for a probe that confirm

[Med] change to "confirms"

>        connectivity or that validates the path.
>            These probes are permitted to carry application data.
>        (The data is permitted because these probes perform blackhole
> detection
>        and will therefore usually have a higher probability of successful
>        transmission, similar to other packets sent by the upper layer
> protocol.)
>         Section 4.1 of <xref target="RFC8899"></xref> provides a
> discussion of
>      the merits and demerits of including application data. For example,
> this
>      reduces the need to send additional datagrams.
>      </t>
>      <t> The probe could utilise
>      a control message format defined by the upper layer protocol that
> does not need to
>      be delivered reliably. The RES and REQ Options need to be
>      included by the sending upper layer protocol and the values of nonces
> need to be coordinated
>      with values used for other DPLPMTUD probe packets.
>      The DPLPMTUD method tracks the transmission and reception of these
> probe packets.
>      Probes with this format form a part of the end-to-end
>      transport data and a receiver needs to deliver the RES and REQ
> Options to the
>      upper layer protocol.</t>
> </section>
> 
> 
> > * Section 7: I would a mention about nonce guards for off-path attacks.
> It does.
> > Thank you.
> >
> > Cheers,
> > Med
> 
> The above will be in the next revision, please let us know if anything
> else we should consider,
> 
> Best wishes,
> 
> Gorry
> 
> >> -----Message d'origine-----
> >> De : I-D-Announce <i-d-announce-bounces@ietf.org> De la part de
> >> internet- drafts@ietf.org Envoyé : jeudi 25 novembre 2021 16:42 À :
> >> i-d-announce@ietf.org Cc : tsvwg@ietf.org Objet : I-D Action:
> >> draft-ietf-tsvwg-udp-options-dplpmtud-02.txt
> >>
> >>
> >> A New Internet-Draft is available from the on-line Internet-Drafts
> >> directories.
> >> This draft is a work item of the Transport Area Working Group WG of the
> >> IETF.
> >>
> >>          Title           : Datagram PLPMTUD for UDP Options
> >>          Authors         : Godred Fairhurst
> >>                            Tom Jones
> >> 	Filename        : draft-ietf-tsvwg-udp-options-dplpmtud-02.txt
> >> 	Pages           : 11
> >> 	Date            : 2021-11-25
> >>
> >> Abstract:
> >>     This document specifies how a UDP Options sender implements
> Datagram
> >>     Packetization Layer Path Maximum Transmission Unit Discovery
> >>     (DPLPMTUD) as a robust method for Path Maximum Transmission Unit
> >>     discovery.  This method uses the UDP Options packetization layer.
> It
> >>     allows a datagram application to discover the largest size of
> >>     datagram that can be sent across a specific network path.
> >>
> >>
> >> The IETF datatracker status page for this draft is:
> >> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options-dplpmtud/
> >>
> >> There is also an htmlized version available at:
> >> https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-udp-options-
> >> dplpmtud-02
> >>
> >> A diff from the previous version is available at:
> >> https://www.ietf.org/rfcdiff?url2=draft-ietf-tsvwg-udp-options-
> dplpmtud-02
> >>
> >>
> >> Internet-Drafts are also available by anonymous FTP at:
> >> ftp://ftp.ietf.org/internet-drafts/
> >>


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.