Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12

"C. M. Heard" <heard@pobox.com> Sun, 13 June 2021 17:08 UTC

Return-Path: <heard@pobox.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92AD33A216E for <tsvwg@ietfa.amsl.com>; Sun, 13 Jun 2021 10:08:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pobox.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 28Z2hq0_gsOP for <tsvwg@ietfa.amsl.com>; Sun, 13 Jun 2021 10:08:27 -0700 (PDT)
Received: from pb-smtp20.pobox.com (pb-smtp20.pobox.com [173.228.157.52]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEEEE3A216C for <tsvwg@ietf.org>; Sun, 13 Jun 2021 10:08:27 -0700 (PDT)
Received: from pb-smtp20.pobox.com (unknown [127.0.0.1]) by pb-smtp20.pobox.com (Postfix) with ESMTP id 314B01499B5 for <tsvwg@ietf.org>; Sun, 13 Jun 2021 13:08:25 -0400 (EDT) (envelope-from heard@pobox.com)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=pobox.com; h= mime-version:references:in-reply-to:from:date:message-id:subject :to:cc:content-type; s=sasl; bh=Kl1ofj2nOO+wr6zAJuLbDk1R00xz7dUX Cqul4L2ilPk=; b=iOc5cCi80cW2RUiEjYWHDF1AtKDzdnpKZQCM8dH/PwJsdOM5 MAOG0J2TlE9H+um8qmDSbAfbvVk5MrUhjzQuLVktsSSYpe5fjwo7kUDw8KrcQh5N A0ybrEioCN3UJ4NWBevWJLpvmE1IYgvTbHTVXsxtgjTol5+qeeCB6daLNpw=
Received: from pb-smtp20.sea.icgroup.com (unknown [127.0.0.1]) by pb-smtp20.pobox.com (Postfix) with ESMTP id 1CEDF1499B4 for <tsvwg@ietf.org>; Sun, 13 Jun 2021 13:08:25 -0400 (EDT) (envelope-from heard@pobox.com)
Received: from mail-il1-f180.google.com (unknown [209.85.166.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp20.pobox.com (Postfix) with ESMTPSA id AA1A61499B3 for <tsvwg@ietf.org>; Sun, 13 Jun 2021 13:08:22 -0400 (EDT) (envelope-from heard@pobox.com)
Received: by mail-il1-f180.google.com with SMTP id x18so10165682ila.10 for <tsvwg@ietf.org>; Sun, 13 Jun 2021 10:08:22 -0700 (PDT)
X-Gm-Message-State: AOAM531A3wF5K/xNygxSWegNCmzFVyf8eqd0vTQU813c4Wb3N8EBL1Tj tDLKrgheo1/hXsPrDViGuKPJKYC7xpIiR+SEYCY=
X-Google-Smtp-Source: ABdhPJzrcqaasDDrcR7hk8ioBQRu8Ca+ROBCY1KmNnFy2l9Ze9IAg4Xc/HACc3nXg0PpLHBGEjGdBXFvrOIwJP7/llo=
X-Received: by 2002:a92:7510:: with SMTP id q16mr10559588ilc.291.1623604101413; Sun, 13 Jun 2021 10:08:21 -0700 (PDT)
MIME-Version: 1.0
References: <CACL_3VGb_9P5SfPGRJtf1ZBvEhgywc2ZEGr-qbgNOMXV20rFeA@mail.gmail.com> <CACL_3VHyoRr5ju8203DiLTUo-658DCj7ud+1dQE2o0hUPVhF0A@mail.gmail.com> <7D766992-AEEB-434F-BB1D-3817EE07DE61@strayalpha.com>
In-Reply-To: <7D766992-AEEB-434F-BB1D-3817EE07DE61@strayalpha.com>
From: "C. M. Heard" <heard@pobox.com>
Date: Sun, 13 Jun 2021 10:08:24 -0700
X-Gmail-Original-Message-ID: <CACL_3VGy-Fit+Hy5mwdnjS+Qqm8sEA=oDQPK_kpzsKNBeHjcUw@mail.gmail.com>
Message-ID: <CACL_3VGy-Fit+Hy5mwdnjS+Qqm8sEA=oDQPK_kpzsKNBeHjcUw@mail.gmail.com>
To: Joseph Touch <touch@strayalpha.com>
Cc: TSVWG <tsvwg@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b882fa05c4a8c99a"
X-Pobox-Relay-ID: F57C2130-CC69-11EB-83FD-D5C30F5B5667-06080547!pb-smtp20.pobox.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/n5UmzspcygsrcTRrba4A1OHdPBw>
Subject: Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Jun 2021 17:08:33 -0000

On Thu, Jun 10, 2021 at 9:08 PM Joseph Touch <touch@strayalpha.com> wrote:

> Hi, Mike,
>
> I’ve been waiting for others to participate, but given it’s been a week…
>
>
Joe, I share your desire to see greater WG participation. Silence is not a
good sign :-(


> On the primary issues, below summarizes my perspective. I hope others on
> the list will weigh in.
>
>
I will give a brief answer to each point and encourage others to weigh in.
These comments are mainly to clarify my position


> - regarding fragment/reassembly as being required
>         This is one of the primary current intended use cases and
> motivations for UDP options.
>         That’s why it’s currently a MUST support and why I do not think
> that should change.
>
>
There have been some other comments on this (thank you, Med and Gorry) and
I will respond separately.


> - regarding removing EOL
>         Removing EOL raises several questions: can other options use that
> data? Do we care if it’s a covert channel? etc.
>         It’s simpler to declare it zeroes and let EOL be the trigger to
> use a loop with a branch predictor hint (likely zero).
>         At a minimum, everything past EOL MUST be covered by OCS
> (otherwise OCS would need to parse all options to find EOL).
>
>
I would be satisfied if the sender MUST set all data past EOL to zero and a
provision that the receiver MAY check this.

IOW my major objection is requiring that the receiver check this. If the
receiver is required to check, the fill may as well be NOPs.

I agree that there is no need to make provision for other uses of this area
and that it MUST be covered by OCS.


> - regarding increasing NOPs
>         There was a concern in letting these be unlimited; we can increase
> to 7, 15, or even 31 (high enough for future-proof seems
>         to open a DOS problem; IMO, DOS detection should just check to see
> if this is a persistent load, not a specific number)
>
>
OK by me. All I asked for was to allow eight-octet alignment.


>
- regarding UNSAFE option format
>         Yes, we could pick a range rather than making them longer, but IMO
> they aren’t likely except as already accounted for, so
>         allocating space from the main range is a waste.
>         However, if we did allocate from the range, we should NOT do so
> with a single bit; that gives the false impression
>         that a given option value has two variants - safe and unsafe, and
> that’s not the case.
>
>
First, let me say that the method proposed in the -12 draft will work. I
just don't think it's an efficient way to go. If there is consensus in the
WG for what's in the -12 draft I can live with it.


>
- regarding AE being safe
>         This is not considered unsafe for two reasons:
>         1. A(authentication) isn’t unsafe
>         2. Encryption should only be used when sending packets to a party
> that is keyed; that can/should be known or checked before use anyway.
>         i.e., there’s never a case where you send encrypted text to a
> party you don’t know should be ready.
>
>
I do not agree that this behaviour is optimum ... I'm of the opinion that
authentication should be a contract between the two ends. TC-AO could not
have done anything else because unknown TCP options are ignored. UDP-AE can
do better. That being said, if there is consensus in the WG for what's in
the -12 draft I can live with it.

Mike Heard