Last Call Review of draft-ietf-quic-transport-32
review-ietf-quic-transport-32-genart-lc-bryant-2020-10-28-00
Request | Review of | draft-ietf-quic-transport |
---|---|---|
Requested revision | No specific revision (document currently at 34) | |
Type | Last Call Review | |
Team | General Area Review Team (Gen-ART) (genart) | |
Deadline | 2020-11-16 | |
Requested | 2020-10-21 | |
Authors | Jana Iyengar , Martin Thomson | |
I-D last updated | 2020-10-28 | |
Completed reviews |
Opsdir Last Call review of -32
by Ron Bonica
(diff)
Genart Last Call review of -32 by Stewart Bryant (diff) Intdir Telechat review of -33 by Bernie Volz (diff) Genart Telechat review of -33 by Stewart Bryant (diff) |
|
Assignment | Reviewer | Stewart Bryant |
State | Completed | |
Request | Last Call review on draft-ietf-quic-transport by General Area Review Team (Gen-ART) Assigned | |
Posted at | https://mailarchive.ietf.org/arch/msg/gen-art/1-mFhB2hF2pp-ciZEm_TEivYTyQ | |
Reviewed revision | 32 (document currently at 34) | |
Result | Ready w/issues | |
Completed | 2020-10-28 |
review-ietf-quic-transport-32-genart-lc-bryant-2020-10-28-00
I am the assigned Gen-ART reviewer for this draft. The General Area Review Team (Gen-ART) reviews all IETF documents being processed by the IESG for the IETF Chair. Please treat these comments just like any other last call comments. For more information, please see the FAQ at <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>. Document: draft-ietf-quic-transport-32 Reviewer: Stewart Bryant Review Date: 2020-10-28 IETF LC End Date: 2020-11-16 IESG Telechat date: Not scheduled for a telechat Summary: I would like to remind the reader that the Genart reviewer is someone was not involved with the design and is ideally reading the text for the first time rather than an expert. In this regard I hope that I am accuracy modelling the reaction of such a reader in the future. This is a very clever, well written and innovative body of work, and could be published as is. However, I am not sure it services the needs of all of the communities that will need to read the document and as such ought to have additional text, or point to another supplementary document. Specifically as the base document for the protocol it is the one that people will naturally start with, and I found that it was not until I got to past page 100 that I started to appreciate how it worked. Not everyone needs to know the whole protocol in detail, and some will just need to dip into important sections. A tutorial/introduction explaining the basics of operation to provide a framework for the rest of the document would help a lot of readers. The text uses a new notation which is clever and succinct for representing the detail of the transmitted protocol, but I suspect that the use of conventional diagrams or at least a tutorial appendix that includes them would be appreciated by other new readers looking at this for the first time. I amplify this in the comments below. Major issues: Section 1 provides an ultrafast introduction to the problem, and very little on the fundamentals of how the protocol works. It would be useful if there a process by which the reader is gradually immersed in the detail. ======== Section 1 is the first place that you introduce the term "Frame". I got very confused about frames and packets, and I thing the taxonomy needs to be clearly explained. You have UDP/IP packets that carry one or more QUIC PDUs, but the frame/packet notation made it unclear what was being discussed and whether the terms were being used consistently. Some clarification would be useful, or if it is in the text then making it more obvious would help. ======= Packet and frame diagrams in this document use a custom format. The purpose of this format is to summarize, not define, protocol elements. SB> I found this confusing, because in a ST protocol specification I was looking for a protocol definition ======= Streams are identified within a connection by a numeric value, referred to as the stream ID. A stream ID is a 62-bit integer (0 to 2^62-1) that is unique for all streams on a connection. SB> I found the 62 bits pulled out of a hat very confusing. Eventually the reader realises that this is 64 bits with the two lowest bits signifying the parameters below. Some explanatory text would help. ====== Stream IDs are encoded as variable-length integers; see Section 16. A QUIC endpoint MUST NOT reuse a stream ID within a connection. The least significant bit (0x1) of the stream ID identifies the SB> This was a common problem throughout the text. I found the use of (0x1) and similar confusing in the text. Where you use this notation you mean the bit manipulated by the mask 0x1 (and similar). It would be helpful to the reader to be a little more pedantic in the use of the term in each case. We will get to it later, in the comments but a lot of readers would be helped by the use of the classic ASCII art style representation of bit fields. ========== =========== SB> When I read the text around table 1, I found this to be confusing and was not clear whether the object is a 64 bit object with a 62 bit instance ID or a 62 bit object with a 60 bit instance ID. If the former I am not sure what the name of the whole is vs the name of the 62 bit instance ID is. This could usefully be clarified. =========== QUIC depends upon a minimum IP packet size of at least 1280 bytes. This is the IPv6 minimum size ([IPv6]) and is also supported by most modern IPv4 networks. Assuming the minimum IP header size of 40 bytes for IPv6 and 20 bytes for IPv4 and a UDP header size of 8 bytes, this results in a maximum datagram size of 1232 bytes for IPv6 and 1252 bytes for IPv4. The maximum datagram size MUST be at least 1200 bytes. SB> The previous two paras are quite confusing. I think the first para refers to the max packet size in the network layer, but the second para is not clear, nor is the next para. Any maximum datagram size larger than 1200 bytes can be discovered using Path Maximum Transmission Unit Discovery (PMTUD; see Section 14.2.1) or Datagram Packetization Layer PMTU Discovery (DPLPMTUD; see Section 14.3). Enforcement of the max_udp_payload_size transport parameter (Section 18.2) might act as an additional limit on the maximum datagram size. A sender can avoid exceeding this limit, once the value is known. However, prior to learning the value of the transport parameter, endpoints risk datagrams being lost if they send datagrams larger than the smallest allowed maximum datagram size of 1200 bytes. SB> Again unclear. Are you saying that the network must support a network layer packet of at least 1200B which is used to carry Ip + UDP + UDP payload? UDP datagrams MUST NOT be fragmented at the IP layer. In IPv4 ([IPv4]), the DF bit MUST be set if possible, to prevent fragmentation on the path. Datagrams are required to be of a minimum size under some conditions. However, the size of the datagram is not authenticated. Therefore, an endpoint MUST NOT close a connection when it receives a datagram that does not meet size constraints, though the endpoint MAY discard such datagrams. SB> I really think this section needs re-writing for clarity. ============ 14.2.1. Handling of ICMP Messages by PMTUD SB> I am worried about the text in this section. ICMP and UDP paths may not be congruent as a result of different RTG ECMP treatment. The only packet you can trust to explore the path is a QUIC packet. ============ 22.1.1. Provisional Registrations Provisional registration of codepoints are intended to allow for private use and experimentation with extensions to QUIC. Provisional registrations only require the inclusion of the codepoint value and contact information. However, provisional registrations could be reclaimed and reassigned for another purpose. SB> Experience in other WGs suggests that reclaiming is very hard. We really needed to do this in MPLS where we had a 16 value field and found it impossible. ============ Additionally, each value of the format "31 * N + 27" for integer values of N (that is, 27, 58, 89, ...) are reserved and MUST NOT be assigned by IANA. SB> We do not normally ask IANA to run an algorithm to check a value. Are we sure that this will work? ============= Minor issues: SB> In looking at "Figure 2: States for Sending Parts of Streams" it occurred to me that this was the major states but there were possibly a number of error states missing. It would be useful to clarify. ========= It is necessary to limit the amount of data that a receiver could buffer, to prevent a fast sender from overwhelming a slow receiver, or to prevent a malicious sender from consuming a large amount of memory at a receiver. SB> Surely it is also necessary to do this to prevent the network from being overwhelmed? ======= If a max_streams transport parameter or a MAX_STREAMS frame is received with a value greater than 2^60, SB> This pulling of 2^60 out of a hat is too cryptic. As I understand it this is because you need 2 bits to express the size of the object that holds to identifier and two bits to hold the control parameters that go in the LSBs. It would be helpful to the new reader to call all this out earlier rather than making them figure it all out. ======= 6. Version Negotiation SB> I am surprised that there is no IANA version registry ======== For a server to use a new version in the future, clients need to correctly handle unsupported versions. Some version numbers (0x?a?a?a?a as defined in Section 15) are reserved for inclusion in fields that contain version numbers. SB> The value 0x?a?a?a?a is somewhat pulled out of a hat, it would be useful to explain the rational. SB> and then in Section 15 I wondered why this pattern which leaves all sorts of holes in the version space? ======= Implementations need to maintain a buffer of CRYPTO data received out of order. Because there is no flow control of CRYPTO frames, an endpoint could potentially force its peer to buffer an unbounded amount of data. SB> What are the congestion consequences of this? ========== validation_timeout = max(3*PTO, 6*kInitialRtt) SB>A quick look in the reference did not show what units of time you are using in the protocol - maybe I missed it? ======= Stateless Reset { Fixed Bits (2) = 1, Unpredictable Bits (38..), Stateless Reset Token (128), } Figure 10: Stateless Reset Packet SB> When I first met this my reaction was that I was sure it sends a lot more bits on the wire than this, but so far I have not see a packet definition nor a pointer to a packet definition. Please could you clarify what is happening? ===== 10.3.1. Detecting a Stateless Reset An endpoint detects a potential stateless reset using the trailing 16 bytes of the UDP datagram. SB> I find this rather opaque given that so far we do not know what a packet looks like, and I cannot see what the encoding of this is. SB> To add to the confusion over packets and frames we now have datagrams. ======= SB> Having read to the end of section 10 I made a note that I was still trying to figure out what a reset token actually looked like. ===== 12.3. Packet Numbers The packet number is an integer in the range 0 to 2^62-1. SB> It would save a bit of wondering until later if this was described as a non-reusable number space ======= A QUIC endpoint MUST NOT reuse a packet number within the same packet number space in one connection. If the packet number for sending reaches 2^62 - 1, the sender MUST close the connection without sending a CONNECTION_CLOSE frame or any further packets; an endpoint MAY send a Stateless Reset (Section 10.3) in response to further packets that it receives. SB> I know that this is a lot of space, although you subdivide it so its smaller, but I would be useful is the fact that there was a maximum data size was stated up from and it was specified. There are some applications that expect to send continuously without disruption and would need to take action prior to termination of the transfer. ===== 12.4. Frames and Frame Types The payload of QUIC packets, after removing packet protection, Packet Payload { Frame (8..) ..., } consists of a sequence of complete frames, as shown in Figure 11. Version Negotiation, Stateless Reset, and Retry packets do not contain frames. SB> At this point (page 82) I am still not sure what a packet or a frame is and have no idea what is going on on the wire. ======= 14. Datagram Size A UDP datagram can include one or more QUIC packets. SB> There is some confusion in the text between packets, frames and datagrams. That could be helped by earlier clarification. ====== 17.2. Long Header Packets SB> How is the following encoded? It is not clear how long the fields are. SB> If the notation is that (x) means x bits it would be good to remind the reader. It may have been called up earlier but that was 100 pages ago with no back pointer. This would be so much clearer to most readers with a conventional packet diagram Long Header Packet { Header Form (1) = 1, Fixed Bit (1) = 1, Long Packet Type (2), Type-Specific Bits (4), Version (32), Destination Connection ID Length (8), Destination Connection ID (0..160), Source Connection ID Length (8), Source Connection ID (0..160), } ======= The layout of a Version Negotiation packet is: Version Negotiation Packet { Header Form (1) = 1, Unused (7), Version (32) = 0, Destination Connection ID Length (8), Destination Connection ID (0..2040), Source Connection ID Length (8), Source Connection ID (0..2040), Supported Version (32) ..., } Figure 14: Version Negotiation Packet The value in the Unused field is selected randomly by the server. SB> When I first met this text the following questions arose. SB> What does the (7) in unused mean? SB> What length is Destination/Source Connection ID/What does (0..2040) mean? SB> Now I have figured this out, but I really worry about how difficult this is for the new/casual reader of the text. ======== The server includes a connection ID of its choice in the Source Connection ID field. This value MUST NOT be equal to the Destination Connection ID field of the packet sent by the client. SB> It would be helpful to explain why ======== 18.1. Reserved Transport Parameters Transport parameters with an identifier of the form "31 * N + 27" for integer values of N are reserved to exercise the requirement that unknown transport parameters be ignored. These transport parameters have no semantics, and may carry arbitrary values. SB> Which hat did that come out of? It would be helpful to the reader to explain the rational. =========== 19.1. PADDING Frames SB> The choice of padding values is itself an interesting problem, but as far as I can see the text is silent on the subject. ========== 22.1.2. Selecting Codepoints New uses of codepoints from QUIC registries SHOULD use a randomly selected codepoint that excludes both existing allocations and the first unallocated codepoint in the selected space. Requests for multiple codepoints MAY use a contiguous range. SB> Doesn’t this lead to fragment code-spaces where it becomes progressively harder to get blocks. Why this policy? SB> Related to which I am not sure the process in para 2 of 22.1.3 is realistic and wonder of it is really needed. ========= Appendix A. Sample Packet Number Decoding Algorithm The pseudo-code in Figure 45 shows how an implementation can decode packet numbers after header protection has been removed. SB> The variable in the code need to be defined. SB> There should also be some commentary to make it understandable to the new reader. SB> It would be useful for this to have a back reference to the body of the document. ========== Nits/editorial comments: SB> "Example Structure" SB> The use of white space coupled name components was strange to me and it too a while and a look late in the text to realise that Structure was part the name and not part of the syntax (i.e. that a structure was not Structure {}) ======= Table 3: Frame Types SB> The notation used in the table took a while to figure out. A little more explanation, and possibly before the table itself might make it clearer. ========= Table 4: Summary of Integer Encodings For example, the eight byte sequence c2 19 7c 5e ff 14 e8 8c (in hexadecimal) decodes to the decimal value 151288809941952652; the four byte sequence 9d 7f 3e 7d decodes to 494878333; the two byte sequence 7b bd decodes to 15293; and the single byte 25 decodes to 37 (as does the two byte sequence 40 25). SB> The SB> Some hex & decimal indication would help. SB> A picture is worth a thousand words and save the reader drawing this out themselves to understand it and getting confused. SB> The conversion pseudo code would be helpful, possibly in an appendix. ============== As a result, the size of the packet number encoding is at least one bit more than the base-2 logarithm of the number of contiguous unacknowledged packet numbers, including the new packet. SB> That is really hard to parse. For example, if an endpoint has received an acknowledgment for packet 0xabe8bc, sending a packet with a number of 0xac5c02 requires a packet number encoding with 16 bits or more; whereas the 24-bit packet number encoding is needed to send a packet with a number of 0xace8fe. SB> and so is that. SB> Indeed I found the remaining paras of the section difficult to follow. ========= With this mechanism, the server reflects the spin value received, while the client 'spins' it after one RTT. On-path observers can measure the time between two spin bit toggle events to estimate the end-to-end RTT of a connection. SB> It would be clearer to the reader if the explanation of operation proceeded the detail. ========= The Transport Parameter Length field contains the length of the Transport Parameter Value field. SB> Presumably the length in bytes. ======== 21. Security Considerations SB> An introduction to this long section would be useful ========= 21.13. Overview of Security Properties SB> I find it strange that having read 12 previous security analysis subsections I arrive at this section. I am surprised that the overview is not section 21.1 ============