Re: [tsvwg] design assumptions - draft-ietf-udp-options

<mohamed.boucadair@orange.com> Thu, 18 July 2019 08:47 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E17F12016D for <tsvwg@ietfa.amsl.com>; Thu, 18 Jul 2019 01:47:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hpwX4B8uTFVY for <tsvwg@ietfa.amsl.com>; Thu, 18 Jul 2019 01:47:54 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF214120176 for <tsvwg@ietf.org>; Thu, 18 Jul 2019 01:47:52 -0700 (PDT)
Received: from opfedar07.francetelecom.fr (unknown [xx.xx.xx.9]) by opfedar22.francetelecom.fr (ESMTP service) with ESMTP id 45q77V6NCWz32fB; Thu, 18 Jul 2019 10:47:50 +0200 (CEST)
Received: from Exchangemail-eme3.itn.ftgroup (unknown [xx.xx.50.62]) by opfedar07.francetelecom.fr (ESMTP service) with ESMTP id 45q77V5b2bz5vNl; Thu, 18 Jul 2019 10:47:50 +0200 (CEST)
Received: from OPEXCNORMAE.corporate.adroot.infra.ftgroup ([fe80::897f:9a74:3898:db87]) by OPEXCNORM2E.corporate.adroot.infra.ftgroup ([fe80::c505:acb8:89e0:c6d6%20]) with mapi id 14.03.0439.000; Thu, 18 Jul 2019 10:47:50 +0200
From: mohamed.boucadair@orange.com
To: Joe Touch <touch@strayalpha.com>
CC: tsvwg <tsvwg@ietf.org>
Thread-Topic: [tsvwg] design assumptions - draft-ietf-udp-options
Thread-Index: AQHVPLCjXz8gDua9PU2lwHRDTvyc16bQCT+g
Date: Thu, 18 Jul 2019 08:47:49 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B93302FA63BED@OPEXCNORMAE.corporate.adroot.infra.ftgroup>
References: <CAPDqMeq9GjEQKukH1pZOTdE50e_rc3U6gpdxT-5qrS5phD0RGw@mail.gmail.com> <646D45AD-D79B-4BD2-A084-7DA97CE2C415@strayalpha.com> <7EC37B50-45D5-4CF1-B113-205E55BF244E@strayalpha.com> <CALx6S34s7L7xo+26bt5Cdaqi4Es5Aci42GHk1WNKzugr5st-Gw@mail.gmail.com> <B525BF50-EFCC-44A5-A604-6CDDA914A1CB@strayalpha.com> <CAPDqMep3R6z9PRKkHyOvrh6sV9n5Sc0B++-zVz0FYJCwE6swrQ@mail.gmail.com> <E42A2AE2-F499-465E-BDE6-5EFC0AB20042@strayalpha.com> <CE03DB3D7B45C245BCA0D24327794936306138E9@MX307CL04.corp.emc.com> <CAPDqMeoyNb7vQTdqxLpZpnKb9S7QKeDJNLyQJBmq95yXhB+xfQ@mail.gmail.com> <7D365770-64FE-40BC-901D-B4D7DF6B484B@strayalpha.com> <20190713182554.GB39770@clarinet.employees.org> <CALx6S36mH2M6SYnRSecWXa7k_d1u8O43+CXE-=KqeO0x2e5+qw@mail.gmail.com> <82FF6486-FABF-4D2C-B5E2-178779C720A4@strayalpha.com> <30c17e9c174f6b0da3ecc6b503a8cb17@strayalpha.com> <CACL_3VGs7j+y5vFNT3OL9OKX8ue4rv-Cxi467KR-vbhnMdx86g@mail.gmail.com> <2f71a292f924a9b8de4227c4bbc2f809@strayalpha.com> <CACL_3VGrF5UnbVsSzZZoy1i57WKiQKBX 2T3a16UyEVHY=Kr3XA@mail.gmail.com> <0ce46e21249f0dc55310b192d382f50a@strayalpha.com> <CALx6S36gaMqNRo_hYKr45T_vTkUB-vRrYRYJz2_KgvejNsJtLQ@mail.gmail.com> <efbf65646a0e0d2535dc5726b34f3472@strayalpha.com> <CALx6S37sZxmGQJq5mxDiF88NeUjj2HMRnQG5KyZA_4ujrLJkqg@mail.gmail.com> <079d7d849d0e6260497a6c0ed37595a2@strayalpha.com> <CALx6S37wOkz0436CmevOjSe=VwAxKstSR9Jc66PUmXwUKK4vBw@mail.gmail.com> <075C3166-DF88-4160-8E6C-1C32511F4D46@strayalpha.com> <811C4C35-48D8-4382-A4B4-784FAC1B9F1D@strayalpha.com> <787AE7BB302AE849A7480A190F8B93302F797897@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <198F5F25-7ECE-431C-A7F2-F0CCFC0BDAA9@strayalpha.com>
In-Reply-To: <198F5F25-7ECE-431C-A7F2-F0CCFC0BDAA9@strayalpha.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.248]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/rfh1wBYzlIHIzeVQruT5BVd8BRA>
Subject: Re: [tsvwg] design assumptions - draft-ietf-udp-options
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jul 2019 08:47:56 -0000

Hi Joe, 

Your reply confirms my initial thinking. 

5#, 6#, and #8 are targeting a particular case and should not be considered as such as part of the core design requirements for UDP options.

BTWs, I don’t understand well what is specific to DNSSEC fragments here to traverse NATs. Such NATs will fail to handle any incoming fragment, not only DNS. NATs which are compliant with REQ#14 of RFC4787 will handle appropriately fragments (modulo DDoS protection features). 

If a firewall/NAT is explicitly configured to reject such fragments for whatever reason, these devices are likely to strip/reject the FRAG options (or UDP options in general).

We need to set first the foundations, and then build on it for particular usages.

Cheers,
Med

> -----Message d'origine-----
> De : Joe Touch [mailto:touch@strayalpha.com]
> Envoyé : mercredi 17 juillet 2019 17:02
> À : BOUCADAIR Mohamed TGI/OLN
> Cc : tsvwg
> Objet : Re: [tsvwg] design assumptions - draft-ietf-udp-options
> 
> FWIW, #5 Frag is a driving case for DNSSEC to allow UDP messages larger
> than the min MTU to traverse NATs. IP
> 
> And it should never interact with IP fragmentation any more than TCP
> segmentation does.
> 
> #6 is required to enable #5.
> 
> And thus far, #8 is required to support #5 in a way that satisfies #2.
> 
> I.e., the ones I listed can’t be teased out the way you’re suggesting.
> 
> Joe
> 
> > On Jul 17, 2019, at 7:46 AM, <mohamed.boucadair@orange.com>
> <mohamed.boucadair@orange.com> wrote:
> >
> > Hi Joe,
> >
> > IMO, the core requirements are #1, #2, #3, #4, and #7.
> >
> > #7 should be mandatory feature.
> >
> > 5#, 6#, and #8 are nice-to-have. I would even prefer if those are
> covered in a separate specification. For example, I'm not sure whether
> FRAG will be useful and how it can interacts with IP fragmentation.
> >
> > Cheers,
> > Med
> >
> >> -----Message d'origine-----
> >> De : tsvwg [mailto:tsvwg-bounces@ietf.org] De la part de Joe Touch
> >> Envoyé : mercredi 17 juillet 2019 02:31
> >> À : tsvwg
> >> Objet : [tsvwg] design assumptions - draft-ietf-udp-options
> >>
> >> Getting back to the core design assumptions:
> >>
> >> 1- support options
> >> 2- allow at least some options to be silently ignored by legacy
> receivers
> >> (to enable ‘“optionally enhanced” exchanges)
> >> 3- allow at least some options to be required
> >> 4- allow the options themselves to be protected
> >> 5- support for fragmentation/reassembly
> >> 6- support for MTU discovery
> >> 7- support (optional?) middlebox checksum/payload length bug traversal
> >> 8- support LITE, i.e., where some of the payload is not covered by at
> >> least some checksum processing
> >>
> >> AFAICT:
> >>
> >> #7 requires a CCO-like sum, but it MUST he calculated AFTER all other
> >> options are populated (it depends on the value of ALL other options and
> >> surplus data)
> >>
> >> #8 can depend on everything except CCO (it doesn’t need to protect
> CCO),
> >> but it depends on the value of all other options and needs to be
> computed
> >> next-to-last (or last if CCO isn’t present)
> >>
> >> And we need a way to know:
> >> 	- for #7, whether CCO is included or not used (at user’s peril, but
> >> to allow for transmitters to avoid work)
> >> 	- for #8, when to end the options (either a length field OR a EOL
> >> flag)
> >>
> >> Are there any other design requirements?
> >>
> >> Joe
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >