Re: [tsvwg] I-D Action: draft-ietf-tsvwg-udp-options-31.txt

"touch@strayalpha.com" <touch@strayalpha.com> Wed, 06 March 2024 04:31 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16A8EC14CF0D for <tsvwg@ietfa.amsl.com>; Tue, 5 Mar 2024 20:31:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.325
X-Spam-Level:
X-Spam-Status: No, score=-1.325 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W-hoL_9LyumK for <tsvwg@ietfa.amsl.com>; Tue, 5 Mar 2024 20:31:25 -0800 (PST)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EAEF1C14CE4B for <tsvwg@ietf.org>; Tue, 5 Mar 2024 20:30:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=95WI1jV/3qs/20IQZqTSUIkYV0+Ba9OdszEqKWYT/qA=; b=SW9F3IKZcyAN0ovLjWWFZhBNgk g1hhg0rO1PfevVEcq3MvgPqSEp39UuFgnfODko+W/f0BW2SKT8DtsUKIPBS6/EeyEsPz35Uo4w72y WPT29oVKoyChEs83JXo02D5BUlbV2LXgs/QfM8ciMasZZhmbMYL7YIoil+BMAjRJE+tjRJb4KW2O9 iOkkCCna8j09LfO775ZRC9X/30RBielmOx0NjbWjqdEmTI2YJqkIZ9alX+cU4PUVb+ZmLq5V2do+P g7xlrKvd7i8NjJKG2XNl6S9krpEOj5A17jPdsfaLDMjypWHHwhcbC2ncSOY69c6Zk6VM7WUjk8KU+ XN063efg==;
Received: from [172.56.187.185] (port=7890 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.96.2) (envelope-from <touch@strayalpha.com>) id 1rhivP-005jSb-0K; Tue, 05 Mar 2024 23:30:44 -0500
Content-Type: multipart/alternative; boundary="Apple-Mail=_C9489891-318C-4DBD-9C4C-A67B29A42417"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\))
From: "touch@strayalpha.com" <touch@strayalpha.com>
In-Reply-To: <CACL_3VFnTweiisfWw=Kz+ju_O6GbxHTzVanuASjkX9N9FZuemA@mail.gmail.com>
Date: Tue, 05 Mar 2024 20:30:26 -0800
Cc: Tom Herbert <tom@herbertland.com>, TSVWG <tsvwg@ietf.org>
Message-Id: <1F54A8DE-6F7E-46FA-895F-D1B3CD41A10E@strayalpha.com>
References: <170959656644.33419.9287184380133878464@ietfa.amsl.com> <CALx6S36KofxYq1H1iiUG-rSgEAZ+XSqB4S5A_9jaRbUMUy_wEg@mail.gmail.com> <CACL_3VFnTweiisfWw=Kz+ju_O6GbxHTzVanuASjkX9N9FZuemA@mail.gmail.com>
To: "C. M. Heard" <heard@pobox.com>
X-Mailer: Apple Mail (2.3774.400.31)
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/nPOAdb5lzzn1-na82UR_3UFk8aw>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-udp-options-31.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Mar 2024 04:31:29 -0000

And, regarding 7605, although NAT boxes at arbitrary midpoints in the net cannot reliably interpret port numbers, there are NATs at the edges of deployments or even embedded inside machines (e.g., within hypervisors) that can reliably do so.

Joe

—
Dr. Joe Touch, temporal epistemologist
www.strayalpha.com

> On Mar 5, 2024, at 8:22 PM, C. M. Heard <heard@pobox.com> wrote:
> 
> On Tue, Mar 5, 2024 at 5:57 PM Tom Herbert wrote:
>> I don't understand the intent of this new text:
>> 
>> "Another reason is because APC may fail even where the user data has
>> not been corrupted, such as when its contents have been overwritten.
>> Such overwrites could be intentional and not widely known; defaulting
>> to silent ignore ensures that option-aware endpoints do not change how
>> users or applications operate unless explicitly directed to do
>> otherwise."
> 
> I had a similar question and commented on that when closing Issue #25.
> 
> See https://github.com/tsvwg/draft-ietf-tsvwg-udp-options/issues/25#issuecomment-1977823570
> and https://github.com/tsvwg/draft-ietf-tsvwg-udp-options/issues/25#issuecomment-1977982512
> 
> The gist is that middleboxes have been known to overwrite embedded IP
> addresses and ports. In that case the middlebox could reasonably be
> expected to update the UDP checksum, but an implementation that predates
> the specification of APC could not be expected to update it. I see that
> a clarification is forthcoming in -32, but we are now past the I-D
> submission cutoff date, so it won't appear for a couple of weeks.
> 
>> I am not familiar with any IETF protocol that allows UDP payload to be
>> updated in flight. In fact, RFC7605 states that UDP port numbers
>> cannot be correctly interpreted in the network, so there is no way to
>> implement a robust protocol that changes UDP payload inflight. Because
>> of this, an intermediate node that is overwriting the UDP payload *is*
>> in fact corrupting the UDP payload. So this new provision is seemingly
>> accommodating this non-standard, potentially harmful behavior as the
>> default.
> 
> There are middleboxes that are known to rewrite the embedded IP
> addresses in FTP. That's not endorsed by any standard, but it's
> a fact of life that we live with. And I see that Dan Wing has named
> some UDP-based protocols that do this, too.
> 
> Mike Heard
>