Re: [Congress] CONGRESS is about ready to go

Christian Huitema <huitema@huitema.net> Fri, 24 February 2023 03:24 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: congress@ietfa.amsl.com
Delivered-To: congress@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9F12C14CF13 for <congress@ietfa.amsl.com>; Thu, 23 Feb 2023 19:24:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level:
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 74ic7mbM2cuu for <congress@ietfa.amsl.com>; Thu, 23 Feb 2023 19:24:05 -0800 (PST)
Received: from mx36-out21.antispamcloud.com (mx36-out21.antispamcloud.com [209.126.121.69]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2AED5C14F6EC for <congress@ietf.org>; Thu, 23 Feb 2023 19:24:04 -0800 (PST)
Received: from xse368.mail2web.com ([66.113.197.114] helo=xse.mail2web.com) by mx37.antispamcloud.com with esmtp (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1pVOgi-0007HN-K8 for congress@ietf.org; Fri, 24 Feb 2023 04:24:02 +0100
Received: from xsmtp22.mail2web.com (unknown [10.100.68.61]) by xse.mail2web.com (Postfix) with ESMTPS id 4PNFbw4CDjzBS6 for <congress@ietf.org>; Thu, 23 Feb 2023 19:23:56 -0800 (PST)
Received: from [10.5.2.15] (helo=xmail05.myhosting.com) by xsmtp22.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1pVOge-0004In-DW for congress@ietf.org; Thu, 23 Feb 2023 19:23:56 -0800
Received: (qmail 27197 invoked from network); 24 Feb 2023 03:23:55 -0000
Received: from unknown (HELO [192.168.1.104]) (Authenticated-user:_huitema@huitema.net@[172.58.43.120]) (envelope-sender <huitema@huitema.net>) by xmail05.myhosting.com (qmail-ldap-1.03) with ESMTPA for <mattmathis@measurementlab.net>; 24 Feb 2023 03:23:55 -0000
Message-ID: <2a140a2e-6718-f916-3409-9d9609ff7fd2@huitema.net>
Date: Thu, 23 Feb 2023 19:23:55 -0800
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.7.2
Content-Language: en-US
To: Matt Mathis <mattmathis@measurementlab.net>, Bob Briscoe <in@bobbriscoe.net>
Cc: Martin Duke <martin.h.duke@gmail.com>, congress@ietf.org
References: <CAM4esxQwvo-QNiq_1PDx_z8RvxcJwrMdkb+GJLYJDYw6+_gO2g@mail.gmail.com> <71579EDF-5910-49E4-A76E-3291A133A533@gmail.com> <CAEsRLK_v50CjouSRga2_DQDXOi0rFUVHUGEtL9UJMt+UtnRAiA@mail.gmail.com> <f257f6db-c3c1-3ba4-b99f-cf141c0d90d5@bobbriscoe.net> <CAEsRLK_kdQPa=J3hktfPJ5z5GsFMFAMvDo=x9x-E9K-DmrXk-g@mail.gmail.com> <dac96aaf-f122-45b7-f1b3-aa6e01a3daaf@bobbriscoe.net> <CAEsRLK8CEiPZLW_4d3LmkQhOH0tkdMSkwXipW_K16qWG_66szA@mail.gmail.com>
From: Christian Huitema <huitema@huitema.net>
In-Reply-To: <CAEsRLK8CEiPZLW_4d3LmkQhOH0tkdMSkwXipW_K16qWG_66szA@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Originating-IP: 66.113.197.114
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 66.113.197.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=66.113.197.0/24@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.25)
X-Recommended-Action: accept
X-Filter-ID: Pt3MvcO5N4iKaDQ5O6lkdGlMVN6RH8bjRMzItlySaT/zBNxC1kdXG+dwiYGgc0rJPUtbdvnXkggZ 3YnVId/Y5jcf0yeVQAvfjHznO7+bT5xUlSLk+ENxAhUeSHQgI+cgsUZJtCCyJ/40+Yul5FWs43E1 2uSreAVKaNiCmynIVRkEybI1sOftHmSKUCHCvcq0J8xIgi6BNPj7dx4YC4myx3BXvrLBlKCVRjjd PbjQ4Hm0eMlrqJpeGu2cNuSWKgfv2g/aLB/rta3zGfBSU+Umae3om1NOCXE1kCr91rpFr6Tx6Quz SvDmWb8iWZDsIEKrlcwC8edOyTFsJvTBZdmGd2GfqymzSheinRamXab6WeU3IICByTDlBVbfm35D zkfatWYAD+wEZQw6xBZnPra86y0KEAnwyE9dte+FkDKSV99EDBffVZVjmVaNbG4ZJG7FF+KJcoOd LdxL5Vwi8QUymGErPLbt0n54j3vHX4q9ucblgTl6fJxyntEfhZCKje4Zbsp34G1TuaZccLE+116c VCERbInMiTBIUBbQ/Dy6Ip6W0r4y0/5D4w5pBBP5WfwEiVI8YifosiHq99m3pO5z65V9UvvKDEjE gSFAGCy7uJronV+E7OMXRvgtdyMlnmWiuIouxT3pZzQQyySxj/nY517lLXQUcNAszDsnoUOr0Bif t2Sy9WcFd83k23YqVIEKOI+gTB/pfSlbi1HgG7umZ25gpnihbI3Vv1c2tRvdVD2GbN7BITAZon7Z Iz1ONK9yUo4/+EUytKrR9Md9I2Rs1/rMuVwlfDOCMR5imoC6qAhPCC/cRgvQKtcrMMueERx3Q3BT nOxXu6WKaBN40oe98Q5oAjvzJDdS1E7SePWDSKmIaIzNoZzswxuMaWjBAlpwuGknZLOVb1Xdp+66 TXJnFPUf9oDBqtClgM5jH/om1Q5UomG0v+rwIiID/kwKc8V5Tj9+FRkaOS/DNjANmb8tO61SbYdY AwdpaVzHW7wHO7YhEWyJzIkwSFAW0Pw8uiKeubcolFl/rX+2ReQklqJDASQX2Id+W5hjJNcdGs0+ iHjXODmj5PX/tZQU3bYnWKpb
X-Report-Abuse-To: spam@quarantine14.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/congress/b0k-DWYnjbITJApMCzlXF81K-gY>
Subject: Re: [Congress] CONGRESS is about ready to go
X-BeenThere: congress@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussions about the CONGestion RESponse and Signaling \(CONGRESS\) Working Group" <congress.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/congress>, <mailto:congress-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/congress/>
List-Post: <mailto:congress@ietf.org>
List-Help: <mailto:congress-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/congress>, <mailto:congress-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Feb 2023 03:24:10 -0000


On 2/23/2023 5:14 PM, Matt Mathis wrote:
> I should have used a different word.  I meant tools in a BCP standards 
> sense - a citable document that can be used to scold developers and 
> corporations  who carelessly deploy large scale systems that are capable 
> of serving enough data to DDOS entire countries.   I have heard rumors 
> of at least 3 such events.
> 
> It would be better if we told application designers that they MUST do 
> their part to prevent congestion collapse and that transport can't fix 
> some design flaws.

Of course, we have no protocol police. For example, nobody asked 
permission from the IETF to deploy Cubic and make the buffer-bloat issue 
even bigger than it was with Reno. Nobody asked for permission from the 
IETF before deciding that running 6 TCP connections in parallel was a 
fine way to speed up the loading of web pages.

In theory, we could encourage "enforcement by network effects". For 
example, servers could (perhaps) detect that a peer is requesting way 
too many TCP connections in parallel, or stopping and resuming its QUIC 
connections too frequently, and "do something about it". Or, Active 
Queue Managers in the network might detect that a particular flow is 
causing congestion or long queues at the bottleneck and "do something 
about it".

That's something worth thinking about. A BCP might detail the kind of 
enforcement that is considered legit, providing servers admin or AQM 
system with some kind of guidelines. And then, the resulting enforcement 
might make the Internet better for everybody. Maybe.

It is also a clear recipe for ossification. That, and the possibility of 
getting it wrong, make writing any such recommendation rather dangerous. 
Not that this has ever stopped the deployment of middle boxes...

-- Christian Huitema