Re: [Congress] CONGRESS is about ready to go

Matt Mathis <mattmathis@measurementlab.net> Fri, 24 February 2023 01:14 UTC

Return-Path: <mattmathis@measurementlab.net>
X-Original-To: congress@ietfa.amsl.com
Delivered-To: congress@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DAF9BC1524D3 for <congress@ietfa.amsl.com>; Thu, 23 Feb 2023 17:14:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=measurementlab-net.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id he4mIiLvRe9X for <congress@ietfa.amsl.com>; Thu, 23 Feb 2023 17:14:28 -0800 (PST)
Received: from mail-pf1-x42f.google.com (mail-pf1-x42f.google.com [IPv6:2607:f8b0:4864:20::42f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D8328C151545 for <congress@ietf.org>; Thu, 23 Feb 2023 17:14:28 -0800 (PST)
Received: by mail-pf1-x42f.google.com with SMTP id cb13so6950950pfb.5 for <congress@ietf.org>; Thu, 23 Feb 2023 17:14:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=measurementlab-net.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=SXDkOS6uQph+al9OO+hconfxcB3DX/4i06USDsoYh0Y=; b=wzwBAdy1pOldLnsmcXL81sFQDbGoVgXRpZHoP79Wz5+iclmnSn8NLfSusSGnbyPKMB o2TM4xtGBWAIl3ApW2pfU8kvD6a6XWjabkMKDPQpNGIsM2kZZPMznO021aYGd2O7aq2n g0foHDYG+fEqWEFFs2qc8eJPO6DIDjtyFBQOfAruyRAZteThOXPDbKmAAC9wRlBHBnqD jZLrxmDMZ6Xq95N5076ZPddgBYjDIir+7tUHEHKo5xjjVLt38UjXT2okNoHVD/JTkDa9 tzJ8YwbpMpVKN6f0WgyZzsfpRYEPsmtdnubFICF5LpV9RvxcegTld0M/MBJEwRPY3UAd cDzQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=SXDkOS6uQph+al9OO+hconfxcB3DX/4i06USDsoYh0Y=; b=L1lipqAI5dZQBRoAL4O9Z22IA5ZKASJ5/Gxt6DczG6M8Gnf7ndvyd/3eMyXXFW4uub GaZjlIW1Ua2or1rAYTiWOrY5W5ng1TYXh4y5+aj7/w9DzCxvU0jrCmxn5NejvXwXXQgv cMTkGfRnBPJ4ifepLkvqdv3qHYbKwBtmKJfPXp62Z1kYa01byH1/S7xFe/8TQ44e86OB fWJIiG44cDpBYv3jAiejxtzkxZPQwjHVOIab1q9HVKJZv9lwoPcPFDl7zkI9orZ0bRC2 yLky2eJ79RRppe/2ZlDUWAJrvilXuMIRTToxlXhNmeWlZAm7n1ItPt0LaxcbEYfEsjFH paXA==
X-Gm-Message-State: AO0yUKVg+uCPh/UT7uxxW6tj9E2vlwCitDzEwRHjxJ24keLlT8NEbmMs TDj6aGdlaZSiDoT+0DN/6XHMfOttGBAd3Eg3t28u3Q==
X-Google-Smtp-Source: AK7set/I7rvNTc3wIPYT+aYIduLUt9y48XqVIpbc+f4HqEyCDLpo7co14QwtpQGkarY7Y3rNeMmnAYsk0AQnDSrdo3w=
X-Received: by 2002:a62:f204:0:b0:5a8:bf8a:ce96 with SMTP id m4-20020a62f204000000b005a8bf8ace96mr2268706pfh.1.1677201267778; Thu, 23 Feb 2023 17:14:27 -0800 (PST)
MIME-Version: 1.0
References: <CAM4esxQwvo-QNiq_1PDx_z8RvxcJwrMdkb+GJLYJDYw6+_gO2g@mail.gmail.com> <71579EDF-5910-49E4-A76E-3291A133A533@gmail.com> <CAEsRLK_v50CjouSRga2_DQDXOi0rFUVHUGEtL9UJMt+UtnRAiA@mail.gmail.com> <f257f6db-c3c1-3ba4-b99f-cf141c0d90d5@bobbriscoe.net> <CAEsRLK_kdQPa=J3hktfPJ5z5GsFMFAMvDo=x9x-E9K-DmrXk-g@mail.gmail.com> <dac96aaf-f122-45b7-f1b3-aa6e01a3daaf@bobbriscoe.net>
In-Reply-To: <dac96aaf-f122-45b7-f1b3-aa6e01a3daaf@bobbriscoe.net>
From: Matt Mathis <mattmathis@measurementlab.net>
Date: Thu, 23 Feb 2023 17:14:16 -0800
Message-ID: <CAEsRLK8CEiPZLW_4d3LmkQhOH0tkdMSkwXipW_K16qWG_66szA@mail.gmail.com>
To: Bob Briscoe <in@bobbriscoe.net>
Cc: Martin Duke <martin.h.duke@gmail.com>, congress@ietf.org
Content-Type: multipart/alternative; boundary="000000000000c87e9b05f567d93b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/congress/GnhpDIsxERyDH_xxwrvFI2GbjoM>
Subject: Re: [Congress] CONGRESS is about ready to go
X-BeenThere: congress@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussions about the CONGestion RESponse and Signaling \(CONGRESS\) Working Group" <congress.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/congress>, <mailto:congress-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/congress/>
List-Post: <mailto:congress@ietf.org>
List-Help: <mailto:congress-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/congress>, <mailto:congress-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Feb 2023 01:14:32 -0000

I should have used a different word.  I meant tools in a BCP standards
sense - a citable document that can be used to scold developers and
corporations  who carelessly deploy large scale systems that are capable of
serving enough data to DDOS entire countries.   I have heard rumors of at
least 3 such events.

It would be better if we told application designers that they MUST do their
part to prevent congestion collapse and that transport can't fix some
design flaws.

On Thu, Feb 23, 2023 at 1:52 PM Bob Briscoe <in@bobbriscoe.net> wrote:

> Matt,
>
> On 23/02/2023 21:41, Matt Mathis wrote:
>
>
>>    -  Upper layer or application algorithms that implicitly or
>>    explicitly defeat transport layer algorithms intended to protect the
>>    network.  An example would be an application that aborts and restarts
>>    transport connections on a fixed interval timer, implicitly defeating the
>>    transport layer's exponential RTO backoff.
>>
>>
>> [BB] Were you prompted to include this by some current implementation
>> attempting this?
>>
> This class of bugs is pervasive.  For example they are likely to be
> present in any application that does fixed timer based requests (or
> retries), without regards to the completion or error statuses of prior
> requests.  A few cases can be quite harmful, such as a streaming video
> player that requests new chunks while prior chunks are still in flight or
> stalled.
>
> Most of the time these bugs don't cause problems, but buggy code deployed
> at scale can be very disruptive.  All examples that I can think of stem
> from inappropriate actions on errors, where the application responds to
> errors either by increasing the presented load or wasting capacity.   For
> example, if git-clone fails due to a network error, you have to rerun the
> entire operation, wasting the data already delivered.
>
> The point being that CC principles really need to be applied to the entire
> stack, not just the transport layer.
>
> I don't think it belongs in a list of things the WG is chartered to work
>> on though (a charter isn't normally a place where you would find a list of
>> things to /not/ do). I don't think it would even need to be in the ICCRG
>> charter - we don't need any (more) research to prove that this would cause
>> congestion collapse. It is surely just sthg that the proposed RFC5330bis
>> would say is highly dangerous, explain why, and say "thou SHALT NOT".
>>
>
> I have met too many application designers who think that transport (TCP)
> is fully capable of protecting the network from poorly behaving
> applications.  We need some tools to counteract this mindset.
>
>
>
> I don't see how a tool can make app developers write good code. Or do you
> have some idea how to do this already? Perhaps you thinking of library
> functions for error handling and retrying?
>
> (Nonetheless, how does production of a tool follow from a bullet in an
> IETF charter?)
>
> Cheers
>
>
> Bob
>
> --
> ________________________________________________________________
> Bob Briscoe                               http://bobbriscoe.net/
>
>

-- 
Thanks,
--MM--
Evil is defined by mortals who think they know "The Truth" and use force to
apply it to others.