Re: [tsvwg] draft-ietf-udp-options issues from IETF 104

Joe Touch <touch@strayalpha.com> Fri, 12 July 2019 17:22 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 19DE4120370 for <tsvwg@ietfa.amsl.com>; Fri, 12 Jul 2019 10:22:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.219
X-Spam-Level:
X-Spam-Status: No, score=-1.219 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pJWEovz87QfQ for <tsvwg@ietfa.amsl.com>; Fri, 12 Jul 2019 10:22:54 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01F611202F0 for <tsvwg@ietf.org>; Fri, 12 Jul 2019 10:22:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=Message-ID:References:In-Reply-To:Subject:Cc: To:From:Date:Content-Type:MIME-Version:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=cZNyiUYhns90YydicubUjgJ4LW6WvkhmC6qhlM1vg5o=; b=y5T6Nn0lTFg/Xq9DHoOVtbNXq RatF+MXAjqxn+dxG0bXVkhOTjujpatz9fMYMajlQg0BiqxHjrDS7l3h4Yu6oW+HvtvWXbbxfYqziK Z7/cGYNadC/z+KnzSJ3bL4DwYZU7D+MZy3WOpaMzF1zl2BHx/Iz5cnVNlC+2I6zR/HDRp50e/u/Gm a2OXIyAR/d4biyXUVegqdStCOLBCcJC6/SuvjRRGfUzvjiz2FG4OZD50wRP02FKhoRGYSSoRJ1GHU sEF7pSrTQ0UxApgF98B6DLKUkAaKG2umahOC8i75Y6GTLmKtr+5HrUWwVLbSKwm7uy2UclwKYi/XM QXr9D41kg==;
Received: from [::1] (port=33356 helo=server217.web-hosting.com) by server217.web-hosting.com with esmtpa (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1hlzFw-003WEk-Dz; Fri, 12 Jul 2019 13:22:53 -0400
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_761006e38a32ea7f09618d81d8711890"
Date: Fri, 12 Jul 2019 10:22:48 -0700
From: Joe Touch <touch@strayalpha.com>
To: Tom Herbert <tom@quantonium.net>
Cc: Tom Herbert <tom@herbertland.com>, tsvwg <tsvwg@ietf.org>
In-Reply-To: <CAPDqMeonRvtncCreKrOYmafAGu79-MEHTp63y0X4y1cUs5SnWw@mail.gmail.com>
References: <156262970360.865.13042807682366763561.idtracker@ietfa.amsl.com> <CAPDqMeoMqsB8=tH5TBaq5Tw-sLW3HNc8tpfUU3htV=sWo7pJcA@mail.gmail.com> <D7E52D2B-3912-4897-80C6-0150CDE10218@strayalpha.com> <CAPDqMep9MYqjFvvJSVbqYwo-xJ1pUocYszNukveaZODhf9+75A@mail.gmail.com> <e73919f08202937bf45418cbf8bcc38c@strayalpha.com> <CAPDqMeoh3n5fL1k6Fw9D8rCpy4a9eWyUZvgStyzYfFuJbuWudw@mail.gmail.com> <3f6f54e0b828e2628af964d6ee7f33e1@strayalpha.com> <CALx6S37rt7OJtH5a2ZH23R21ATETuwTeFS-mZQECtgxPQ3nSZA@mail.gmail.com> <ccc386aa429bfe301998f39eb7fccfbf@strayalpha.com> <140f11c854e0ad96c51639f830cbb688@strayalpha.com> <CALx6S35MC_fj+fL6Ax9a-9=-QX0-mHLmMQ7cUs2Rir+AvYE=zA@mail.gmail.com> <5b35e91dd510119672a0836f868ade24@strayalpha.com> <CALx6S36AVbKfvb-6dj07rcGjsVsCz0daFM9qZOBSSstZOM-Ukg@mail.gmail.com> <8A584FFF-6C86-4154-8D9D-CF407CA77145@strayalpha.com> <CAPDqMeq9GjEQKukH1pZOTdE50e_rc3U6gpdxT-5qrS5phD0RGw@mail.gmail.com> <646D45AD-D79B-4BD2-A084-7DA97CE2C415@strayalpha.com> <7EC37B50-45D5-4CF1-B113-205E55BF244E@strayalpha.com> <CALx6S34s7L7xo+26bt5Cdaqi4Es5Aci42GHk1WNKzugr5st-Gw@mail.gmail.com> <B525BF50-EFCC-44A5-A604-6CDDA914A1CB@strayalpha.com> <CAPDqMep3R6z9PRKkHyOvrh6sV9n5Sc0B++-zVz0FYJCwE6swrQ@mail.gmail.com> <E42A2AE2-F499-465E-BDE6-5EFC0AB20042@strayalpha.com> <CE03DB3D7B45C245BCA0D24327794936306138E9@MX307CL04.corp.emc.com> <CAPDqMeoyNb7vQTdqxLpZpnKb9S7QKeDJNLyQJBmq95yXhB+xfQ@mail.gmail.com> <7D365770-64FE-40BC-901D-B4D7DF6B484B@strayalpha.com> <CAPDqMeqHHUnMCDc6FFoZ=+5EeLPiJJZ2Msqo6OS9wGFUeNH=HQ@mail.gmail.com> <23DDA223-8A4F-49B3-A564-389CE5C68B75@strayalpha.com> <CALx6S35aRWonM5XhSLwV51bLwaDHiHhC6q6CFwMB8SD3BBrpJg@mail.gmail.com> <0DE7ECE5-7DA7-4625-ABB0-A5C1E585547D@strayalpha.com> <CAPDqMeonRvtncCreKrOYmafAGu79-MEHTp63y0X4y1cUs5SnWw@mail.gmail.com>
Message-ID: <17f2fdc144511e71a50acbe74c51fcf0@strayalpha.com>
X-Sender: touch@strayalpha.com
User-Agent: Roundcube Webmail/1.3.7
X-OutGoing-Spam-Status: No, score=-0.5
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/qF0ygpeUgfO_zs0Geal5YIlAld4>
Subject: Re: [tsvwg] draft-ietf-udp-options issues from IETF 104
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jul 2019 17:22:55 -0000

On 2019-07-12 09:16, Tom Herbert wrote: 

...

>> Neither TCP nor UDP require their payloads to end on a word boundary. So transport checksums already need to deal with up to 3 bytes of "cleanup".
> Per RFC768, a zero byte is appended if the UDP data length is odd.

That's in the description of how the checksum calculation works; there's
no requirement to make the payload of actual even length. 

Padding with a single zero byte is equivalent to dealing with the
"cleanup" (which for IP checksum, is only ever 1 byte anyway). 

>> Given that, why force the front alignment? At most it only doubles that cleanup, which ought to be nominal anyway.
> 
> It's a straightforward application of sending clause the robustness
> principle. Other IP protocols ensure checksum and headers aligned so
> this protocol should too in order to maximize robustness.

That's not the robustness principle. That's ossification. 

Joe