Comments on draft-ietf-tsvwg-sctp-udp-encaps-03

Brian Trammell <trammell@tik.ee.ethz.ch> Tue, 24 April 2012 11:35 UTC

Return-Path: <trammell@tik.ee.ethz.ch>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FCA821F86C9 for <tsvwg@ietfa.amsl.com>; Tue, 24 Apr 2012 04:35:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2VGx5Qt1PfwC for <tsvwg@ietfa.amsl.com>; Tue, 24 Apr 2012 04:35:21 -0700 (PDT)
Received: from smtp.ee.ethz.ch (smtp.ee.ethz.ch [129.132.2.219]) by ietfa.amsl.com (Postfix) with ESMTP id F3E1121F86C8 for <tsvwg@ietf.org>; Tue, 24 Apr 2012 04:35:20 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by smtp.ee.ethz.ch (Postfix) with ESMTP id 2BD3DD9308 for <tsvwg@ietf.org>; Tue, 24 Apr 2012 13:35:19 +0200 (MEST)
X-Virus-Scanned: by amavisd-new on smtp.ee.ethz.ch
Received: from smtp.ee.ethz.ch ([127.0.0.1]) by localhost (.ee.ethz.ch [127.0.0.1]) (amavisd-new, port 10024) with LMTP id FeWTAOzBC1hJ for <tsvwg@ietf.org>; Tue, 24 Apr 2012 13:35:18 +0200 (MEST)
Received: from pb-10243.ethz.ch (pb-10243.ethz.ch [82.130.102.152]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: briant) by smtp.ee.ethz.ch (Postfix) with ESMTPSA id EF5D7D9304 for <tsvwg@ietf.org>; Tue, 24 Apr 2012 13:35:18 +0200 (MEST)
From: Brian Trammell <trammell@tik.ee.ethz.ch>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Subject: Comments on draft-ietf-tsvwg-sctp-udp-encaps-03
Date: Tue, 24 Apr 2012 13:35:18 +0200
Message-Id: <E3B0F09A-F560-4B4B-AB1E-62655FBD5630@tik.ee.ethz.ch>
To: tsvwg@ietf.org
Mime-Version: 1.0 (Apple Message framework v1257)
X-Mailer: Apple Mail (2.1257)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tsvwg>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Apr 2012 11:35:21 -0000

Greetings, all,

Apologies for missing the WGLC end on this draft; however as it appears it may be rev'd anyway on the MTU DF question, I hope the following comments prove useful.

I've reviewed the document. It fills a need and the approach makes sense, so I'm in favor of its publication. I do have a couple of suggestions for clarification, though none of these change the normative content of the document. I'll state that my perspective here is as an SCTP application developer, and as someone interested both in this draft and draft-tuexen-tsvwg-sctp-dtls-encaps within the context of IPFIX over SCTP. (I'll also state that I didn't follow the WG discussion on this draft to date, as I only sporadically pay attention to tsvwg, so apologies if some of these comments are old news.)

I'm still a little confused about how exactly UDP port mappings to SCTP associations are meant to work in practice. Clearly, there is one UDP port per "stack": one per application with application-bound SCTP-over-UDP and one per host, defaulting to 9989, with SCTP-over-UDP in the kernel or via a (probably privileged) userspace SCTP-over-UDP daemon. This point might be made more clearly in section 4.1 -- that there are really two envisioned deployment scenarios (or three, depending on how you count), and explicitly spelling out the recommended port numbering for each.

(This opens an issue at the user interface level, though I am reasonably certain this is out of scope for this document. Now you potentially have one port that is exposed to the user or inherent to the application (the SCTP port), plus one port that may have to be exposed to the client or not based on the deployment scenario in use at the server. There are ways for dealing with this with a single port in user- or administrator-exposed names (URIs, DNS SRV...) but I don't know how well this works for two ports. 
Again, I'm not sure it fits in this document at all, but some discussion of this issue (and suggested solutions) somewhere would keep each application developer or specifier of application protocols from having to solve it themselves. This issue would appear to apply to draft-tuexen-tsvwg-sctp-dtls-encaps as well.)

There are a couple of other bits that were terse to the point of being a little unclear on a first reading. In section 4.2 it may be helpful to point out that the point of UDP checksumming is to reduce the chance of UDP header corruption. (I had to think about this for a couple of seconds; SCTP has its own reliability mechanisms, after all...) Likewise, section 4.8 might benefit from a note that you're talking about ECN bits in the IP header, and that ECN over SCTP works otherwise as specified in draft-stewart-tsvwg-sctpecn (with an informative reference).

Best regards,

Brian