Skip to main content

Unicast UDP Usage Guidelines for Application Designers
draft-ietf-tsvwg-udp-guidelines-11

Revision differences

Document history

Date Rev. By Action
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Cullen Jennings
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for David Ward
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2008-10-14
11 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2008-10-13
11 (System) IANA Action state changed to No IC from In Progress
2008-10-13
11 (System) IANA Action state changed to In Progress
2008-10-13
11 Amy Vezza IESG state changed to Approved-announcement sent
2008-10-13
11 Amy Vezza IESG has approved the document
2008-10-13
11 Amy Vezza Closed "Approve" ballot
2008-10-12
11 David Ward [Ballot Position Update] Position for David Ward has been changed to No Objection from Discuss by David Ward
2008-10-11
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2008-10-11
11 (System) New version available: draft-ietf-tsvwg-udp-guidelines-11.txt
2008-09-12
11 (System) Removed from agenda for telechat - 2008-09-11
2008-09-11
11 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2008-09-11
11 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded by Amy Vezza
2008-09-11
11 David Ward
[Ballot discuss]
Another DISCUSS-DISCUSS that would be better deemed a "question."

There is no mention of policing, shaping flows nor is there any mention of …
[Ballot discuss]
Another DISCUSS-DISCUSS that would be better deemed a "question."

There is no mention of policing, shaping flows nor is there any mention of DSCP, DIFFSERV, TOS or packet marking. Given application designers can work w/ hosts to set specific QOS parameters including the above on the host. I would have thought that should be mention.

Also, there is limited mention of filtering and creating filters on the host in 3.6. I would have thought that this should take on a larger treatment in the security section. For applications that reside on networking nodes, the use of GTSM should be called out.

Last, in section 3.6 there is only mention of programming to the UDP socket. It is very frequent that programmers will construct UDP packets and send them via a raw socket. There is no mention. Why not?
2008-09-11
11 David Ward
[Ballot discuss]
Another DISCUSS-DISCUSS that would be better deemed a "question."

There is no mention of policing, shaping flows nor is there any mention of …
[Ballot discuss]
Another DISCUSS-DISCUSS that would be better deemed a "question."

There is no mention of policing, shaping flows nor is there any mention of DSCP, DIFFSERV, TOS or packet marking. Given application designers can work w/ hosts to set specific QOS parameters including the above on the host. I would have thought that should be mention.

Also, there is limited mention of filtering and creating filters on the host in 3.6. I would have thought that this should take on a larger treatment in the security section. For applications that reside on networking nodes, the use of GTSM should be called out.

Last, in section 3.6 there is only mention of programming to the UDP socket. It is very frequent that programmers will construct UDP packets and send them via a raw socket. There is no mention. Why not?
2008-09-11
11 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to No Objection from Discuss by Cullen Jennings
2008-09-11
11 Lisa Dusseault
[Ballot comment]
Section 3.4:
  "This results in a relatively weak
  protection from in terms of coding theory"

I think some noun is missing …
[Ballot comment]
Section 3.4:
  "This results in a relatively weak
  protection from in terms of coding theory"

I think some noun is missing after the word "from"

Same section:

  "This check is not strong from a coding or cryptographic
  perspective, and is not designed to detect physical-layer errors or
  malicious modification of the datagram"

Is it that it can't detect or can't distinguish between?
2008-09-11
11 David Ward
[Ballot discuss]
Another DISCUSS-DISCUSS that would be better deemed a "question."

There is no mention of policing, shaping flows nor is there any mention of …
[Ballot discuss]
Another DISCUSS-DISCUSS that would be better deemed a "question."

There is no mention of policing, shaping flows nor is there any mention of DSCP, DIFFSERV, TOS or packet marking. Given application designers can work w/ hosts to set specific QOS parameters including the above on the host. I would have thought that should be mention.

Also, there is limited mention of filtering and creating filters on the host in 3.6. I would have thought that this should take on a larger treatment in the security section.

Last, in section 3.6 there is only mention of programming to the UDP socket. It is very frequent that programmers will construct UDP packets and send them via a raw socket. There is no mention. Why not?
2008-09-11
11 David Ward [Ballot Position Update] New position, Discuss, has been recorded by David Ward
2008-09-11
11 Cullen Jennings
[Ballot discuss]
This is discuss DISCUSS which means it is being entered to flag that I would like to discuss this point on the IESG …
[Ballot discuss]
This is discuss DISCUSS which means it is being entered to flag that I would like to discuss this point on the IESG phone call. I will be clearing the discuss once the call is over.

I was trying to figure out what made me uncomfortable about this draft and I think it comes down to it has some advice that I would not actually give. I made a list of some deployed protocols that use UDP. Things that come to mind are:

DNS
RTP
SIP
STUN
bitTorrent
mdns
tftp
nfs
bootp

All these things seem to me that they were not compliant with the SHOULDs of this BCP, had would never migrate to be any closer to compliant with this BCP.  I think this document is a good list of things to think about when designing a  UDP based protocol and I am in favor of publishing it (along with all the SHOULDs as they are now) but I would like to have a clear understanding of what IESG will be looking for from future protocols that use UDP as a transport and what they will be looking for from updates to existing protocols that use UDP.
2008-09-11
11 Cullen Jennings [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings
2008-09-11
11 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2008-09-11
11 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2008-09-10
11 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2008-09-08
11 Magnus Westerlund State Changes to IESG Evaluation from IESG Evaluation::AD Followup by Magnus Westerlund
2008-09-05
11 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2008-09-02
11 Magnus Westerlund Placed on agenda for telechat - 2008-09-11 by Magnus Westerlund
2008-08-27
11 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu
2008-08-22
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2008-08-22
10 (System) New version available: draft-ietf-tsvwg-udp-guidelines-10.txt
2008-08-14
11 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2008-08-14
11 Magnus Westerlund [Ballot Position Update] New position, Yes, has been recorded for Magnus Westerlund
2008-08-14
11 Magnus Westerlund Ballot has been issued by Magnus Westerlund
2008-08-14
11 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2008-08-14
11 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2008-08-14
11 Jari Arkko
[Ballot comment]
I don't quite understand how the tracker brought this document to the
telechat without having Magnus vote "Yes". Presumably Magnus is happy
with …
[Ballot comment]
I don't quite understand how the tracker brought this document to the
telechat without having Magnus vote "Yes". Presumably Magnus is happy
with the document, no?
2008-08-14
11 Jari Arkko [Ballot Position Update] New position, Yes, has been recorded by Jari Arkko
2008-08-13
11 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2008-08-13
11 Cullen Jennings
[Ballot comment]
I'd really like to talk a little bit about the MSL - the implementation I see code for a MSL much shorter than …
[Ballot comment]
I'd really like to talk a little bit about the MSL - the implementation I see code for a MSL much shorter than the 2 minutes recommended here. The result is that it's very hard to predict how long anything will wait. We would be much better off to revise the MSL to some realistic number - then people might implement that and one would count on it. All you can count on today is that if you have a MSL of 2 minutes, lots of equipment will time out long before that.
2008-08-13
11 Dan Romascanu
[Ballot discuss]
This DISCUSS is based upon a comment in the DNS-DIR review by Peter Koch. I would like to discuss this during the telechat …
[Ballot discuss]
This DISCUSS is based upon a comment in the DNS-DIR review by Peter Koch. I would like to discuss this during the telechat and get the advice from the Security ADs whether a change in the document (probably in the Security Considerations section) is needed. 

There is a potential size related issue with asymmetry between requests and responses in UDP based protocols intended for Internet wide use.  Under particular circumstances, this asymmetry can be abused for "amplification attacks". We know this for a subset of DNS, but any UDP based protocol that would respond with large chunks to arbitrary data would be vulnerable.

Pointing out the issue to be addressed in that particular protocol's security considerations would be sufficient and useful.
2008-08-13
11 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu
2008-08-11
11 Lars Eggert [Ballot Position Update] New position, Recuse, has been recorded by Lars Eggert
2008-08-11
11 Pasi Eronen [Ballot comment]
There's some repetition of text in Sections 3.1.2 and 3.5, but
presumably RFC editor copyediting will take care of that.
2008-08-11
11 Pasi Eronen [Ballot Position Update] New position, No Objection, has been recorded by Pasi Eronen
2008-08-11
11 Pasi Eronen Created "Approve" ballot
2008-08-05
11 Magnus Westerlund Placed on agenda for telechat - 2008-08-14 by Magnus Westerlund
2008-08-05
11 Magnus Westerlund State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Magnus Westerlund
2008-08-04
11 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2008-07-31
11 Amanda Baber IANA Last Call comments:

As described in the IANA Considerations section, we understand this document
to have NO IANA Actions.
2008-07-09
11 Cindy Morgan Last call sent
2008-07-09
11 Cindy Morgan State Changes to In Last Call from Last Call Requested by Cindy Morgan
2008-07-09
11 Magnus Westerlund State Changes to Last Call Requested from AD Evaluation::AD Followup by Magnus Westerlund
2008-07-09
11 Magnus Westerlund Last Call was requested by Magnus Westerlund
2008-07-09
11 (System) Ballot writeup text was added
2008-07-09
11 (System) Last call text was added
2008-07-09
11 (System) Ballot approval text was added
2008-07-08
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2008-07-08
09 (System) New version available: draft-ietf-tsvwg-udp-guidelines-09.txt
2008-07-04
11 Magnus Westerlund State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Magnus Westerlund
2008-07-04
11 Magnus Westerlund
This is writeup for the Unicast UDP Usage Guidelines to BCP
draft-ietf-tsvwg-udp-guidelines-08

  (1.a)  Who is the Document Shepherd for this document?  Has the
  …
This is writeup for the Unicast UDP Usage Guidelines to BCP
draft-ietf-tsvwg-udp-guidelines-08

  (1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?
         
Magnus Westerlund is the Document shepherd. It is basically ready. A few
very minor issue was raised in AD review.

  (1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?
         
This document has been well reviewed both within the WG and from people
in other areas. Clearly one of the better reviewed documents that have
come through transport area.

  (1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization, or XML?
         
No.

  (1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it.  In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here.  Has an IPR disclosure related to this document
          been filed?  If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.
       
No. 

  (1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?
         
Very solid.           

  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
          discontent?  If so, please summarize the areas of conflict in
          separate email messages to the Responsible Area Director.  (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)
         
No         

  (1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/.)  Boilerplate checks are
          not enough; this check needs to be thorough.  Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type, and URI type reviews?  If the document
          does not already indicate its intended status at the top of
          the first page, please indicate the intended status here.

Yes, no issues found

  (1.h)  Has the document split its references into normative and
          informative?  Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state?  If such normative references exist, what is the
          strategy for their completion?  Are there normative references
          that are downward references, as described in [RFC3967]?  If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].
         
Yes         

  (1.i)  Has the Document Shepherd verified that the document's IANA
          Considerations section exists and is consistent with the body
          of the document?  If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?  Are the IANA registries clearly identified?  If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?  Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process, has the Document
          Shepherd conferred with the Responsible Area Director so that
          the IESG can appoint the needed Expert during IESG Evaluation?
         
Yes, IANA section is okay.         

  (1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?
         
No formal language used.         

  (1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up.  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

Technical Summary
         
  The User Datagram Protocol (UDP) provides a minimal, message-passing
  transport that has no inherent congestion control mechanisms.
  Because congestion control is critical to the stable operation of the
  Internet, applications and upper-layer protocols that choose to use
  UDP as an Internet transport must employ mechanisms to prevent
  congestion collapse and establish some degree of fairness with
  concurrent traffic.  This document provides guidelines on the use of
  UDP for the designers of unicast applications and upper-layer
  protocols.  Congestion control guidelines are a primary focus, but
  the document also provides guidance on other topics, including
  message sizes, reliability, checksums and middlebox traversal.

Working Group Summary
  There is strong consensus in publishing this document.

Document Quality
  This document has been well reviewed both within the TSVWG and by
  people from other areas due to an extensive announcement and review
  requests at important points in the documents life time.
           
Personnel
  WG Shepherd and responsible AD is Magnus Westerlund.
2008-07-04
11 Magnus Westerlund State Changes to AD Evaluation from Publication Requested by Magnus Westerlund
2008-06-23
11 Magnus Westerlund Responsible AD has been changed to Magnus Westerlund from  Unassigned
2008-06-23
11 Magnus Westerlund State Changes to Publication Requested from AD is watching by Magnus Westerlund
2008-06-23
11 Magnus Westerlund Intended Status has been changed to BCP from None
2008-06-13
08 (System) New version available: draft-ietf-tsvwg-udp-guidelines-08.txt
2008-05-21
07 (System) New version available: draft-ietf-tsvwg-udp-guidelines-07.txt
2008-04-03
06 (System) New version available: draft-ietf-tsvwg-udp-guidelines-06.txt
2008-02-05
05 (System) New version available: draft-ietf-tsvwg-udp-guidelines-05.txt
2008-01-23
11 Samuel Weiler Request for Early review by SECDIR Completed. Reviewer: Blake Ramsdell.
2007-12-07
11 Mark Townsley Draft Added by Mark Townsley in state AD is watching
2007-11-19
04 (System) New version available: draft-ietf-tsvwg-udp-guidelines-04.txt
2007-09-29
11 Samuel Weiler Request for Early review by SECDIR is assigned to Blake Ramsdell
2007-09-29
11 Samuel Weiler Request for Early review by SECDIR is assigned to Blake Ramsdell
2007-09-19
03 (System) New version available: draft-ietf-tsvwg-udp-guidelines-03.txt
2007-07-09
02 (System) New version available: draft-ietf-tsvwg-udp-guidelines-02.txt
2007-06-11
01 (System) New version available: draft-ietf-tsvwg-udp-guidelines-01.txt
2007-05-29
00 (System) New version available: draft-ietf-tsvwg-udp-guidelines-00.txt