> -----Original Message-----
> From: Hao Zhou (hzhou) [mailto:hz...@cisco.com]
> Sent: Thursday, October 04, 2012 2:56 PM
> To: Jim Schaad; emu@ietf.org; draft-ietf-emu-eap-tunnel-
> met...@tools.ietf.org
> Subject: Re: [Emu] More comments for eap-tunnel-method
> 
> Jim:
> 
> Thanks for the review. Please see my comments below.
> 
> On 9/30/12 2:01 PM, "Jim Schaad" <i...@augustcellars.com> wrote:
> 
> >1.  Should the Message Length field be present if the TLS Data field is
> >absent?
> [HZ] According to the text in the draft, the message length field should
only
> be present if the L bit is set, usually for fragmented packets. In those
cases,
> the TLS data field will be present, not absent. The only case TLS data
will be
> absent is when empty TEAP packet it is used to
>          indicate TEAP acknowledgement for either a fragmented message,
>          a TLS Alert message or a TLS Finished message. So the message
length
> field is not needed. We can clarify that in the draft.
> 

[JLS]  I am not clear - are you saying that the first sever message sent
with just TLVs cannot be fragmented?

[JLS]  There is a potential issue in the way that the Message Length field
is described.  For finding the location of the Outer TLVs it provides the
length of the TLS Data field, but the internal description says that it
gives the length of the message data in the event of a fragmented message.
If the first client response message is both fragmented on length and
contains TLVs, then the message length field must be the length of the TLS
data in order to find the Outer TLV data but that means it is not the length
of all of the fragmented data.  This is not an issue after the first pair of
messages as the Outer TLVs are no longer allowed at that point.

[JLS] I presume that the Length needs to be present only if the message is
fragmented as a hint to the receiver on the length of the buffer to allocate
as I don't remember any error checks that the length of the message match
the re-constructed message from the fragments (and if it did then the
previous paragraph makes that faulty).  Should there be an error check on
the message length w/ the length of the re-constructed buffer?


> >
> >2.  There is nothing to say which TLVs can and cannot occur in the
> >Outer TLVs in any easily findable method.  Either a table or the string
> >outer in descriptions would be helpful.  As an example,  does the
> >Authority-ID TLV in the outer TLV make sense?
> [HZ] We will add that table.
> >
> >3.  I have gone through the fragmentation and did an implementation
> >rather than just reading it.  The questions that I have on it now are
> >slightly different.  Do TLVs need to be on a fragment boundary? Or do
> >we just build the entire message, fragment it into convenient sizes
> >regardless of the actual content of the message contents and sent the
> >pieces across?  If so then the text should probably be re-written to be
> >clearer.  Specifically, the message length is not useful for allocating
> >the buffer on the first round trip of messages where one can have a TLV
> added in to the content.
> >[HZ] Message length covers the whole TEAP packet even if fragmented.
> >TLVs do not need to be on a fragment boundary. Just build the whole
> >message contents and send the pieces across. We will provide some text
> >to clarify this.

[JLS] - see note above about finding the start of the Outer TLV data block
on the first pair of messages.

> >
> >
> >_______________________________________________
> >Emu mailing list
> >Emu@ietf.org
> >https://www.ietf.org/mailman/listinfo/emu

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to