[CCWG] Review of RFC5033bis

Michael Welzl <michawe@ifi.uio.no> Fri, 23 February 2024 11:14 UTC

Return-Path: <michawe@ifi.uio.no>
X-Original-To: ccwg@ietfa.amsl.com
Delivered-To: ccwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4F97C14F5E6 for <ccwg@ietfa.amsl.com>; Fri, 23 Feb 2024 03:14:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.005
X-Spam-Level:
X-Spam-Status: No, score=-2.005 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ifi.uio.no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kva9CMwZAQu1 for <ccwg@ietfa.amsl.com>; Fri, 23 Feb 2024 03:14:21 -0800 (PST)
Received: from mail-out01.uio.no (mail-out01.uio.no [IPv6:2001:700:100:10::50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B0D62C14F600 for <ccwg@ietf.org>; Fri, 23 Feb 2024 03:14:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ifi.uio.no; s=key2309; h=To:Date:Message-Id:Subject:Mime-Version:Content-Type:From:Sender :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=cVvJ1y8x3Gldr0zrpbx7MsAMUUhtLA47K+r/zcBEcFM=; b=qLiVcdWjD399QjG9qxwOcnmZ2V Z9lgpP8xOZdpbKC8d112yOMEPLBiJJXi4KP6Dydk2Wn5M3kU2Fu+Me60u/Ul2LGATt2A6+lkH+FIC +LxLn6hiud7HaEbn9ykWwlnjRbM3oI7CYSywv7h/kL3HaLs+vt4FAsD31ohx4cd9Y9dphbv2rSTmi H3I54HeWKs09KJu8lClOa6/7buurFUesmdLZDFR0P3V/8xrJJG8pDwuaE1cYOajMrnFqAaDWmegZ+ 8gJhCHUm9CUvfruCM118j5MUM1NPRqYThnbolZm47P+Cvy+2dVK9e/MYAH+DpaV8KAm4Lk89oUQp9 fvyRni/A==;
Received: from mail-mx11.uio.no ([129.240.10.83]) by mail-out01.uio.no with esmtps (TLS1.2) tls TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (Exim 4.96.2) (envelope-from <michawe@ifi.uio.no>) id 1rdTVQ-0036DV-33 for ccwg@ietf.org; Fri, 23 Feb 2024 12:14:16 +0100
Received: from collaborix.ifi.uio.no ([129.240.69.78] helo=smtpclient.apple) by mail-mx11.uio.no with esmtps (TLS1.2:ECDHE-ECDSA-AES256-GCM-SHA384:256) (Exim 4.97.1) (envelope-from <michawe@ifi.uio.no>) id 1rdTVP-000000001oS-3mcE for ccwg@ietf.org; Fri, 23 Feb 2024 12:14:16 +0100
From: Michael Welzl <michawe@ifi.uio.no>
Content-Type: multipart/alternative; boundary="Apple-Mail=_6B0B06D2-7D4B-413F-97F6-EBF2CEB86CF7"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
Message-Id: <B88E326C-4D26-49CF-8D54-D89A0D67FBBC@ifi.uio.no>
Date: Fri, 23 Feb 2024 12:14:15 +0100
To: ccwg@ietf.org
X-Mailer: Apple Mail (2.3696.120.41.1.1)
X-UiO-SPF-Received: Received-SPF: neutral (mail-mx11.uio.no: 129.240.69.78 is neither permitted nor denied by domain of ifi.uio.no) client-ip=129.240.69.78; envelope-from=michawe@ifi.uio.no; helo=smtpclient.apple;
X-UiO-Spam-info: not spam, SpamAssassin (score=-4.6, required=5.0, autolearn=disabled, HTML_MESSAGE=0.001, KHOP_HELO_FCRDNS=0.399, T_SCC_BODY_TEXT_LINE=-0.01, UIO_MAIL_IS_INTERNAL=-5)
X-UiO-Scanned: BED956D77F2AAB5EC21EC8760835B96FDC490EBE
X-UiOonly: 61D89D34FF556FBEEAE891014DD825EFA49835A3
Archived-At: <https://mailarchive.ietf.org/arch/msg/ccwg/wcc8g3KAxJYGhA1lC-s2ddXW1CA>
Subject: [CCWG] Review of RFC5033bis
X-BeenThere: ccwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Congestion Control Working Group <ccwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ccwg>, <mailto:ccwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ccwg/>
List-Post: <mailto:ccwg@ietf.org>
List-Help: <mailto:ccwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ccwg>, <mailto:ccwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Feb 2024 11:14:26 -0000

Dear all,

Very sorry to only react upon Reese’s email which told us all that it’s already too late!   but I thought better late than never… so here comes my review of the RFC5033bis draft.
I hope this is useful !

Cheers,
Michael


===========


General:

In some places, a new proposed congestion control algorithm that this document addresses is repeatedly called "The alternate congestion control algorithm".
In some places, it's repeatedly called "A proposed congestion control algorithm".
In some places, it's repeatedly called "The proposal”.
In some places, it’s called “New CCs”  (only in a few places - else the abbreviation CC isn’t introduced).

I think it would be good to unify this. My suggestion: mixing “The proposal” and “A proposed congestion control algorithm” doesn’t really matter, but “The alternative congestion control algorithm” stands out - I would replace these occurrences with “The proposed congestion control algorithm”, and replace “New CCs” in the same way.



Section 1 Intro:


OLD:
In 2007, TCP was the dominant consumer of this work, and proposals were typically discussed in research groups, for example the Internet Congestion Control Research Group (ICCRG).

NEW:
In 2007, TCP was the dominant consumer of this work, and proposals were typically discussed in the Internet Congestion Control Research Group (ICCRG).

REASON:
I don’t remember seeing any other proposal being discussed in any other RG.


***
Since RFC 5033 was published, many conditions have changed.
The set of protocols using these algorithms has spread beyond
TCP and SCTP to include DCCP, QUIC, and beyond.
***

The DCCP RFCs pre-date RFC 5033, and so I find it a bit odd to see it mentioned in this context. On the other hand, the problem that this text is about is largely related to the deployment of cc. mechanisms without first getting an OK from the IETF, and so it fits to talk about QUIC which is mostly written in user space. Similarly, it would fit to talk about the RMCAT CC’s, or LEDBAT - much more, it seems to me, than to talk about DCCP. So, I suggest to instead say the “WebRTC protocol suite” or something like that.


Section 3.1.2:
***
Bufferbloat [Bufferbloat] refers to the building of long queues in the network. 
***
I think the [Bufferbloat] reference should be replaced with a “proper” one with longer-term archival value, instead of pointing at the IETF blog. E.g., this:
https://ieeexplore.ieee.org/document/5755608 <https://ieeexplore.ieee.org/document/5755608>
which is also freely available: https://queue.acm.org/detail.cfm?id=2071893 <https://queue.acm.org/detail.cfm?id=2071893>


Section 3.2.1:
***
Evaluate the impact on TCP [RFC9293], SCTP [RFC9260], DCCP [RFC4340], and QUIC [RFC9000].
***
I would recommend to remove this. I find it odd: this is about the interaction between congestion control mechanisms, not transport protocols - why would there be a significant difference between running a mechanism against SCTP or TCP, for example? Indeed this is clarified in the next paragraph, which says: "A proposed congestion control algorithm SHOULD be evaluated when competing with standard IETF congestion control [RFC5681], [RFC9260], [RFC4340], [RFC9002], [RFC9438].”  - so why then list these protocols here?  (also: they seem strange to include as references in the sentence I mention here - instead, I would only cite RFC 5681 and RFC 9438).
It seems to me that listing the actual protocols expects a proponent of a new mechanism to carry out a huge amount of actually rather useless work.

Besides, DCCP is an odd one in this list, because evaluting the impact “on it” would mean to also evaluate against TFRC and TFRC-SP. Seriously, at this time and day? Is anyone using these controls, still, in any context?
(technically, RMCAT controls and LEDBAT would make more sense IMO, but I think it’s ok to skip them because they’re all Experimental).


I would swap section 4.1 on tunnel behavior with section 4.2 on paths with Tail-drop Queues, because the latter is the more common case. No big deal, but it’s just a strange sequence IMO.


Section 5.7.1:
***
New CCs MUST evaluate the impact of changes in the path, and be robust
to changes in path characteristics on the interval of common Internet re-routing intervals.
***
First, I don’t think that the abbreviation “CC” has been used before. it is also later used in section 5.8 - I suggest to fix this, to be uniform.

More importantly though, the beginning of Section 5 says, about the whole section, that “The community MAY allow a proposal to progress even if the criteria indicate an unsatisfactory result for these scenarios.”
This seems to collide with the “MUST” above.

I have the same concern about the two MUSTs in section 5.8, and there, also, we have the use of “CC”.