Re: [tsvwg] Rregarding soft-state and UDP options

Joe Touch <touch@strayalpha.com> Mon, 06 January 2020 00:37 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F1FF1200D5 for <tsvwg@ietfa.amsl.com>; Sun, 5 Jan 2020 16:37:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.218
X-Spam-Level:
X-Spam-Status: No, score=-1.218 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kthlQCzO3xD5 for <tsvwg@ietfa.amsl.com>; Sun, 5 Jan 2020 16:37:44 -0800 (PST)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 07188120043 for <tsvwg@ietf.org>; Sun, 5 Jan 2020 16:37:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=P7nhBSkFNwsy39HlH5N/Z4GWLTggJH2bQ7CqZKhKAro=; b=mhPN3tZ7z5EUY66TILhJ5dQnQ wmRyHYAygnGBa7FvHHZusdnrbnehHBM0AZAdnFiAbBSxmhS08iYyOPhQNQpKHWDd/ASx2vo5PdLG4 hW254BDa4zec8uRgFKTlLwclxTfr9N9qWz2tug4LLkwv8cxyEr7YsF8OMnzEoaAy+TmkuDXbJy7Q9 caIdfHkT/Nw9AgCLu67n+s7JP5s0AOrOqSbxF5DcQuM9d9Q1V+/tRSrZeQuI57OOD13zfD2rVNGzO R753Ux5UyZtJVCD/1VmWUEJqGqP2q+wxgcoN1e8B85+L8e6N+e7kWM+UgfZgDKnvVykwiRRCHMBgl T7/g+jyLA==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:54149 helo=[192.168.1.10]) by server217.web-hosting.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1ioGOp-002h4l-3Y; Sun, 05 Jan 2020 19:37:43 -0500
Content-Type: multipart/alternative; boundary="Apple-Mail=_CBBD07B6-8A70-4354-B189-2489E01E9044"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Joe Touch <touch@strayalpha.com>
In-Reply-To: <CALx6S36Og0c73eQUW57M4ZH0BL=82CciJAmKujP=gJ3XbhcWwA@mail.gmail.com>
Date: Sun, 05 Jan 2020 16:37:38 -0800
Cc: TSVWG <tsvwg@ietf.org>
Message-Id: <2365408B-9216-47FB-BBAC-B64A60CD58B5@strayalpha.com>
References: <CALx6S37oZK8urwN-TCpZxs9F_+QXzobT8-rObPH112NkqSpUVQ@mail.gmail.com> <418EE20D-387B-48C1-BC08-614D28D7849E@strayalpha.com> <CALx6S372xi1rTiAw6ZmLAU-yN6RvF7PEcg6sNqS=WcNVvYMTZw@mail.gmail.com> <FEFC49BC-0D34-419D-818E-D80A85B1C74E@strayalpha.com> <CALx6S35jhAoKHttijzqQNxQL8WJfbu=fun3EivCCOmxfXcw0QA@mail.gmail.com> <49C20EDE-9AD1-4577-B097-2ED2BB7CFC19@strayalpha.com> <CALx6S36Og0c73eQUW57M4ZH0BL=82CciJAmKujP=gJ3XbhcWwA@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/qaNVxSNINMx6pXh0IJm-mAW2WKo>
Subject: Re: [tsvwg] Rregarding soft-state and UDP options
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jan 2020 00:37:45 -0000


> On Jan 5, 2020, at 3:28 PM, Tom Herbert <tom@herbertland.com> wrote:
> 
> On Sun, Jan 5, 2020 at 1:57 PM Joe Touch <touch@strayalpha.com> wrote:
>> 
>> ...
>> It is TCP SYNs. They have to be interpreted without context.
> 
> TCP SYNs is the best you could come up with? One small part of a
> protocol that typically doesn't carry user data, doesn't work with
> multicast and is part of a stateful protocol 3WHS. Nope, IPv6 is the
> better model.

TCP SYNs are transport and stateless. Yes, they’re the right model.

IPv6 is largely designed for intermediate devices - that’s not what we’re designing for here.

>> ...
>> First, it fails to be motivated by an example.
>> 
> Encryption option.

We already have a solution for that with FRAG+LITE.

Is there any example of a packet whose contents aren’t modified but MUST NOT be accepted if the option fails?

>> ...
>> Fail. That causes the same packet to be silently dropped by option-aware receivers and received as zero-length by legacy receivers.
> 
> There is no such requirement.

I’m claiming there should be a requirement to behave the same in these cases and I explained why.

> And as I pointed out if there were the
> draft would need to be changed to eliminate all cases where packets
> are dropped on error since that too  "causes the same packet to be
> silently dropped by option-aware receivers and received as zero-length
> by legacy receivers."

I already said that text was being changed. 

...
> 
>> 
>>> - If an option is received with [he needed signal]
>> 
>> (again, the rest of this sentence is implementation, not requirement)
>> 
>>> and the receiver does not recognize the option,
>>> then the packet MUST be dropped.
>> 
>> Same problem. Different behavior for legacy and option-aware.
> 
> Same response. Show me the requirement established by consensus of the
> WG that this violates.

We’re designing a system that has to work with legacy receivers. Having two distinctly different behaviors in those cases creates protocol complexity. 

> 
>> 
>> Declaring that an option CANNOT BE IGNORED affects ONLY THAT OPTION. We can decide to make it trash all other options, but we can’t make it drop a packet as a whole.
>> 
> The whole point of an option that cannot be ignored is that it is
> incorrect to process the packet if ignored.

The whole point is that it is incorrect to process the OPTIONS if ignored. Not the packet We can’t claim that it’s incorrect to process a packet if options are ignored - exactly because that’s what legacy receivers already do.

Joe