Re: [tsvwg] OCS option in draft-ietf-tsvwg-udp-options-06

Gorry Fairhurst <gorry@erg.abdn.ac.uk> Fri, 08 March 2019 07:10 UTC

Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47942130E09 for <tsvwg@ietfa.amsl.com>; Thu, 7 Mar 2019 23:10:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R4a1vqcdLwIO for <tsvwg@ietfa.amsl.com>; Thu, 7 Mar 2019 23:10:05 -0800 (PST)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk [IPv6:2001:630:42:150::2]) by ietfa.amsl.com (Postfix) with ESMTP id E60A0129C6A for <tsvwg@ietf.org>; Thu, 7 Mar 2019 23:10:04 -0800 (PST)
Received: from Gs-MacBook-Pro.local (fgrpf.plus.com [212.159.18.54]) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPSA id 4C7AE1B0012D; Fri, 8 Mar 2019 07:09:59 +0000 (GMT)
Message-ID: <5C821546.1020401@erg.abdn.ac.uk>
Date: Fri, 08 Mar 2019 07:09:58 +0000
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Reply-To: gorry@erg.abdn.ac.uk
Organization: University of Aberdeen
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:12.0) Gecko/20120428 Thunderbird/12.0.1
MIME-Version: 1.0
To: Joe Touch <touch@strayalpha.com>
CC: Derek Fawcus <dfawcus+lists-tsvwg@employees.org>, tsvwg <tsvwg@ietf.org>
References: <CACL_3VE62sfpyF8CyCv4=XrzQDnJU=y11Rag_x0bXSpfLZZe5g@mail.gmail.com> <7D37562E-0375-4EDE-845C-013A4C2E56BC@strayalpha.com> <e8fbc82d70ff620b96d710e854285863@erg.abdn.ac.uk> <20190307212311.GA95604@bugle.employees.org> <EDEEEEAD-A139-4AD8-A5C0-AD1C84B31B22@strayalpha.com>
In-Reply-To: <EDEEEEAD-A139-4AD8-A5C0-AD1C84B31B22@strayalpha.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/rOPhjo6m4RSKZUDbujuLV9pYt3g>
Subject: Re: [tsvwg] OCS option in draft-ietf-tsvwg-udp-options-06
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Mar 2019 07:10:07 -0000

On 08/03/2019, 03:47, Joe Touch wrote:
> Hi, Derek,
>
>> On Mar 7, 2019, at 1:23 PM, Derek Fawcus 
>> <dfawcus+lists-tsvwg@employees.org 
>> <mailto:dfawcus+lists-tsvwg@employees.org>> wrote:
>>
>> I believe the result of the CCO experiment was that it, or this new OCS,
>> would always have to be present in order to guarentee a packet passes
>> through certain middleboxes.  Except possibly th the case where the
>> UDP header checksum is zero?
>>
>> Given that wouldn't it make sense for this option to be both mandatory to
>> implement, and always present in the options area?
>>
>> DF
>
> You’ve already partly answered your own question.
>
> The other case is ACS, in which case (currently) there would be no 
> OCS. It would be somewhat wasteful in both space and computation to 
> include both, unless passing such middle boxes is needed.
>
> Note - traversal of incorrectly implemented middle boxes is not a 
> primary design consideration for UDP options. We are absolutely not 
> designing a “byzantine” protocol, i.e., one that survives arbitrary 
> attacks by intermediate boxes, whether deliberate or accidental.
>
> Joe
>
To be clear: This is not just a middlebox, NAT, etc consideration, there 
are also hosts that offload UDP option checks, that can black-hole the 
UDP Options that do not have the "CCO" like OCS value.

As an individual in the IETF (rather than the WG Chair), I think your 
note is a fair point for more discussion about whether we should design 
for deployability. It seems that a large number of people in the QUIC WG 
are specifically designing their new transport to optimise the chance of 
working through network paths that have middleboxes. At least with 
respect to IPv4, I could see merit in requiring the OCS in the options area.

Gorry