Re: [Congress] CONGRESS is about ready to go

Bob Briscoe <in@bobbriscoe.net> Thu, 23 February 2023 21:52 UTC

Return-Path: <in@bobbriscoe.net>
X-Original-To: congress@ietfa.amsl.com
Delivered-To: congress@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0971EC15C524 for <congress@ietfa.amsl.com>; Thu, 23 Feb 2023 13:52:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mwApmZQ0Juug for <congress@ietfa.amsl.com>; Thu, 23 Feb 2023 13:52:37 -0800 (PST)
Received: from mail-ssdrsserver2.hostinginterface.eu (mail-ssdrsserver2.hostinginterface.eu [185.185.85.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A94CDC14E515 for <congress@ietf.org>; Thu, 23 Feb 2023 13:52:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=In-Reply-To:From:References:Cc:To:Subject: MIME-Version:Date:Message-ID:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=MGJLcyqTqQrK3Ztw1w2DtBvzoFi+Om7HZQBvMyGHRsg=; b=183ULTUgpBiDdeK15FEyraHD8T h5w/gHODU6c6EAJ1rBsKXHRqWOkMXXf7K//uZskeKtMtdtbHSCWOTtG0e01svbKzVYwjqFMn2oGFO P1qg/OlgBxrYrcKU71cAhHE/Lw7u3tl+UJIPeMj62Kv6tO4Y9SzWoVSELOdQKsvX9ktsTQwBCK495 MQIBMp9MZKXBAxSmxT2wIJa/KyBQ6gkUf/iHgib7KrPus98UF+XsIAEmuKADI3UJfM9jcfB3V60mK V9+g0ublrVwLVMC2+qYj73zyTns0AZOx5VUynX09WGj5QNsCv8vrnUSa3rXw3YbxurEDPYs92Lcfk kmnoNBhw==;
Received: from 67.153.238.178.in-addr.arpa ([178.238.153.67]:58114 helo=[192.168.1.8]) by ssdrsserver2.hostinginterface.eu with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.95) (envelope-from <in@bobbriscoe.net>) id 1pVJW0-00ELu0-Ut; Thu, 23 Feb 2023 21:52:30 +0000
Content-Type: multipart/alternative; boundary="------------20ekmcr3yYOC7o1TMVotkuQN"
Message-ID: <dac96aaf-f122-45b7-f1b3-aa6e01a3daaf@bobbriscoe.net>
Date: Thu, 23 Feb 2023 21:52:26 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.7.1
Content-Language: en-GB
To: Matt Mathis <mattmathis@measurementlab.net>
Cc: Martin Duke <martin.h.duke@gmail.com>, congress@ietf.org
References: <CAM4esxQwvo-QNiq_1PDx_z8RvxcJwrMdkb+GJLYJDYw6+_gO2g@mail.gmail.com> <71579EDF-5910-49E4-A76E-3291A133A533@gmail.com> <CAEsRLK_v50CjouSRga2_DQDXOi0rFUVHUGEtL9UJMt+UtnRAiA@mail.gmail.com> <f257f6db-c3c1-3ba4-b99f-cf141c0d90d5@bobbriscoe.net> <CAEsRLK_kdQPa=J3hktfPJ5z5GsFMFAMvDo=x9x-E9K-DmrXk-g@mail.gmail.com>
From: Bob Briscoe <in@bobbriscoe.net>
In-Reply-To: <CAEsRLK_kdQPa=J3hktfPJ5z5GsFMFAMvDo=x9x-E9K-DmrXk-g@mail.gmail.com>
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ssdrsserver2.hostinginterface.eu
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: ssdrsserver2.hostinginterface.eu: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: ssdrsserver2.hostinginterface.eu: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/congress/qSGcnNGrDUnNx7j1EIYAMKpPpNE>
Subject: Re: [Congress] CONGRESS is about ready to go
X-BeenThere: congress@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussions about the CONGestion RESponse and Signaling \(CONGRESS\) Working Group" <congress.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/congress>, <mailto:congress-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/congress/>
List-Post: <mailto:congress@ietf.org>
List-Help: <mailto:congress-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/congress>, <mailto:congress-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Feb 2023 21:52:42 -0000

Matt,

On 23/02/2023 21:41, Matt Mathis wrote:
>
>>       *  Upper layer or application algorithms that implicitly or
>>         explicitly defeat transport layer algorithms intended to
>>         protect the network.  An example would be an application that
>>         aborts and restarts transport connections on a fixed interval
>>         timer, implicitly defeating the transport layer's exponential
>>         RTO backoff.
>>
>
>     [BB] Were you prompted to include this by some current
>     implementation attempting this?
>
> This class of bugs is pervasive.  For example they are likely to be 
> present in any application that does fixed timer based requests (or 
> retries), without regards to the completion or error statuses of prior 
> requests.  A few cases can be quite harmful, such as a streaming video 
> player that requests new chunks while prior chunks are still in flight 
> or stalled.
>
> Most of the time these bugs don't cause problems, but buggy code 
> deployed at scale can be very disruptive.  All examples that I can 
> think of stem from inappropriate actions on errors, where the 
> application responds to errors either by increasing the presented load 
> or wasting capacity.   For example, if git-clone fails due to a 
> network error, you have to rerun the entire operation, wasting the 
> data already delivered.
>
> The point being that CC principles really need to be applied to the 
> entire stack, not just the transport layer.
>
>     I don't think it belongs in a list of things the WG is chartered
>     to work on though (a charter isn't normally a place where you
>     would find a list of things to /not/ do). I don't think it would
>     even need to be in the ICCRG charter - we don't need any (more)
>     research to prove that this would cause congestion collapse. It is
>     surely just sthg that the proposed RFC5330bis would say is highly
>     dangerous, explain why, and say "thou SHALT NOT".
>
>
> I have met too many application designers who think that transport 
> (TCP) is fully capable of protecting the network from poorly behaving 
> applications.  We need some tools to counteract this mindset.

I don't see how a tool can make app developers write good code. Or do 
you have some idea how to do this already? Perhaps you thinking of 
library functions for error handling and retrying?

(Nonetheless, how does production of a tool follow from a bullet in an 
IETF charter?)

Cheers


Bob

-- 
________________________________________________________________
Bob Briscoehttp://bobbriscoe.net/