Re: [tsvwg] I-D Action: draft-ietf-tsvwg-udp-options-22.txt

"touch@strayalpha.com" <touch@strayalpha.com> Sat, 10 June 2023 18:29 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EA5FC1782B5 for <tsvwg@ietfa.amsl.com>; Sat, 10 Jun 2023 11:29:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.317
X-Spam-Level:
X-Spam-Status: No, score=-6.317 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NHAXvSIT6FUa for <tsvwg@ietfa.amsl.com>; Sat, 10 Jun 2023 11:29:07 -0700 (PDT)
Received: from server217-2.web-hosting.com (server217-2.web-hosting.com [198.54.115.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE7E4C1782BF for <tsvwg@ietf.org>; Sat, 10 Jun 2023 11:29:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id: Content-Transfer-Encoding:Cc:Date:In-Reply-To:From:Subject:Mime-Version: Content-Type:Sender:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=v5dJy/30EalUcunawsPdWLOXchrO01OC/uJxulF/LTE=; b=QIAdSyvQKDy6+uoFVKC+ZhSB6x rj2LvQk4oKUHke1CdCg0xa9k6/zz0GAyvav2GvL8qhcDx70odT8fx9A3AmGOY9Q8W22tahlV1VrWF a0pT5+w1IiS+K0rno7NT9UZzz7Bfm0TYEx9vr2XTn8kWD2o8rZP5q3rBFSBHrdw+sa8VuPReCPmMr +uoFC30p4CGNbg9vMuisDh3cS1hJL8sB9s/FJvpst0M1TZzM9gakXnQDU92EfJY7WS0apX5AR11hy MA82dBCz13IS5uaNevliPpQhDgDbmkQt6LFYn4fd45GzYEGoseVJcwAcMsYWfizXV5jxvgDT/4mmi +Kv1I6hw==;
Received: from [172.58.209.100] (port=18235 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from <touch@strayalpha.com>) id 1q83Kf-004TId-DX; Sat, 10 Jun 2023 14:29:05 -0400
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.600.7\))
From: "touch@strayalpha.com" <touch@strayalpha.com>
In-Reply-To: <CALx6S36uE_pZtQfkW+VTYjY4drvK26ZgUp64kKdzAoN4Bjo_0g@mail.gmail.com>
Date: Sat, 10 Jun 2023 11:28:49 -0700
Cc: tsvwg@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <3E23C6C2-2BF4-4C9D-A327-35CB4677FD52@strayalpha.com>
References: <168636765932.60931.17876556014123415544@ietfa.amsl.com> <2DFC6427-542D-4226-B11F-19D7F55BCD8C@strayalpha.com> <CALx6S35UE2TApueBPacjCou_GJqpU7=JCrtryu7YVPbeukg2Qw@mail.gmail.com> <9D908FAE-27EC-4CBC-8C56-C757374434F2@strayalpha.com> <CALx6S36uE_pZtQfkW+VTYjY4drvK26ZgUp64kKdzAoN4Bjo_0g@mail.gmail.com>
To: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3731.600.7)
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/zst4uuvtdvnoUMZOFWqAhcWjRTM>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-udp-options-22.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Jun 2023 18:29:11 -0000

….
> On Jun 10, 2023, at 10:41 AM, Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> wrote:
> 
> On Sat, Jun 10, 2023 at 10:10 AM touch@strayalpha.com
> <touch@strayalpha.com> wrote:
>> 
>> 
>> On Jun 10, 2023, at 8:40 AM, Tom Herbert <tom@herbertland.com> wrote:
>> 
>> On Fri, Jun 9, 2023 at 8:30 PM touch@strayalpha.com
>> <touch@strayalpha.com> wrote:
>> ...
>> By expecting implementations that do more to allow more, the current wording both avoids that lock-in and allows more modest implementations - e.g., that don’t have resources to enable 100 options - to not need to support packets with 100 options.
> 
> If different implementations are allowed to choose different protocol
> parameters then that reduces interoperability;

This isn’t a protocol parameter. Many protocols have different expectations for how widely each option is supported - see TCP, e.g.

>> ...
>> Adapted to the implementation. It does not talk about adaptive algorithms.
>> 
>> As above, this just indicates that lesser implementations can allow less, but full-featured ones need to accommodate more.
>> 
>> for a new protocol that hasn't yet seen any
>> deployment. So much simpler to just set a limit. So we can assume the
>> default limit will be locked in globally, and once systems are
>> deployed changing those limits takes years as legacy systems are
>> replaced.
>> 
>> 
>> How’s that working out for IPv6? (It doesn’t - once you set the bar low, that’s it).
> 
> You're asking the wrong question.The right question is "how did
> defining unlimited options work out for out for IPv6?”.

The right question is “how is treating every unexpected behavior as an attack working out”?

And it isn’t.

Further, IPv6 options involve intermediate nodes that need to invest resources. UDP options do not. 
(Which is why limited HBH options is appropriate, but limiting destination options is not).

> Conversely,
> one could ask "how did limited options work out for TCP?"

Well, then not so well:

See draft-ietf-tcpm-tcp-edo and the numerous attempts to extend an option space that isn’t sufficient now, but at the time “40 bytes” was a specific limitation.

See also MP-TCP and numerous methods to try to treat other portions of TCP segments as option space as well.

Joe