Re: Review in WGLC for draft-ietf-dccp-udpencap-02.txt.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Gorry,

Thanks for the close read and the comments.  See inline...

Tom P.

> -----Original Message-----
> From: dccp-bounces@xxxxxxxx [mailto:dccp-bounces@xxxxxxxx] On Behalf
Of
> Gorry Fairhurst
> Sent: Tuesday, August 31, 2010 2:42 PM
> To: 'dccp' working group
> Cc: Phelan, Tom
> Subject:  Review in WGLC for draft-ietf-dccp-udpencap-02.txt.
> 
> 
> I have read the latest version of this specification during the WGLC
and
> believe this is an important topic to publish a document.
> 
> The current draft appears to have addressed issues I think were
> important and would seem nearly ready for publication, however I do
have
> some queries, as listed below.
> 
> Best wishes,
> 
> Gorry
> 
> ---
> Section 3.3
> - I think some sections miss context on why the decision was made,
e.g.
> in 3.3, please do say briefly why the WG chose to do this.

[TomP] I'm not sure what you mean here.  Do you mean that we chose not
to support partial checksums?

> ---
> Section 3.3.1:
> - Have you thought about whether this section should also reaffirm
that
> the checksum value in the encapsulated DCCP header is always zero?
> - replace /Chesksums/ with /Checksums/

[TomP] I don't see a reason to say that receiver should verify that the
DCCP checksum is zero.

I've fixed the typo.

> ---
> Section 6:
> /The option is a binary one however; either allow all DCCP
>     applications or allow none./
> - This seems a little harsh. The options based on the UDP-header are
as
> stated. A firewall than interprets this specification could in
principle
> look inside the UDP encaps and filter based on DCCP information.
> 
> It doesn't sound that implausible given the sophistication of many
> current firewalls, however it would be extra complexity that would
need
> to be justified. In my opinion, we should encourage this, so that
> firewalls can open pin-holes for DCCP in the same way as they do for
> other transports.
> 
[TomP] Well, I do think that will be the case in many situations, and it
is the case with security implications, so I think it should be
mentioned.  How about adding a parenthetical, "(unless the firewall
supports flexible deep packet inspection rules)".

> ---
> - I see the value of the IANA-specified destination port for a client
> server app using a NAPT, where the NAPT changes only the src port as
it
> leaves the client, and does this differently for each sender address
> behind the NAPT. What is the expected port usage at the receiver? Does
> it listen on the IANA port bound to any source port? Can you say more
> here?
> 
[TomP] So section 3.1 says:
   Source and Dest(ination) Ports: 16 bits each

      These fields identify the UDP ports on which the source and
      destination (respectively) of the packet are listening for
      incoming DCCP-UDP packets (normally both are the default port to
      be assigned by IANA).  Note that they do not identify the DCCP
      source and destination ports.

I don't know that I see any necessary changes here, except it should
probably mention that the port values can be changed along the way by
NAPT boxes.  You say, "Does it listen on the IANA port bound to any
source port?"  I assume by this you mean will it accept an incoming
packet with any source port?  Do we need to open this UDP can of worms?

> ---
> References
> 
> - The references have not been split between normative and
informative,
> the normative refs should have been agreed by the WGLC.
> 
> - I think the following are not normative to this specification:
> RFC4787, RFC5597, RFC5238, RFC5596, RFC5595

[TomP] My first take was that these were normative, but I think I see
your point.  I'll make them informative.

> ---
> UPDATES Line?
> - The document explicitly says this updates RFC 5762, but the boilere
> text at the head of the ID does not identify this as an update.
Please
> add a boiler  plate line that explicitly states what is updated by
this
> specification.
> 
> - Are there issues with an Experimental RFC updating a standards-track
> RFC???
> 

[TomP] I see your issue.  We probably should not update a standards
track RFC with an experimental one.  Does anyone have any advice?
Extends rather than updates?  Adds capabilities to those specified in
RFC 5762?

> - Is this intended to update RFC 4340? - if so, same question as
above.
> 

[TomP] It was not my intention to update RFC 4340.

> ----
> Note:
> /(default port awaiting IANA action)/
> - As I understand the IETF procedure, this could now be allocated by
an
> IANA request. I'm assuming this is a "registered" port, rather than a
> "well-known" port?
> - The RFC-to-be can then say this document allocates port XX for use
by
> this method.
> 
[TomP] OK

> ----
> 
> The following additional comments seem to be NiTs:
> 
> ---
> 3.  DCCP-UDP
> /insert a UDP ([RFC0768]) /
>                ^         ^
> -The brackets around the citation seem odd to me.

[TomP] You mean '()' not '[]' right?  I agree.

> ---
> /and there are no other IP addresses embedded./
> - There are no other IP addresses embedded in the encapsulation
header,
> there could be in the DCCP application data, with all that implies.

[TomP] OK

> ---
>      |      Application Data Area        |  Variable length (could be
0)
> - I prefer straight /Application Data/
> rather than /Application Data Area/
> - but I recall both being used in RFC 4340, so I guess this is
personal
> preference.

[TomP] RFC 4340 uses "Application Data Area" in the basic packet format
definition, so I'll stick with that.

> ---
> 
> 
> --
> Prof Gorry Fairhurst, School of Engineering, University of Aberdeen.
> The University of Aberdeen is a charity registered in Scotland,
> No SC013683.



[Index of Archives]     [Linux Kernel Development]     [Linux DCCP]     [IETF Annouce]     [Linux Networking]     [Git]     [Security]     [Linux Assembly]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [DDR & Rambus]

  Powered by Linux