Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcpm-rto-consider-14.txt> (Requirements for Time-Based Loss Detection) to Best Current Practice

tom petch <daedulus@btconnect.com> Sat, 30 May 2020 11:35 UTC

Return-Path: <daedulus@btconnect.com>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7E3A3A0918; Sat, 30 May 2020 04:35:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fuf4tVFzXHpO; Sat, 30 May 2020 04:35:28 -0700 (PDT)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2093.outbound.protection.outlook.com [40.107.21.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95E5B3A0917; Sat, 30 May 2020 04:35:27 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=B2PTGPo3okD5dfoAr6PsMo6Zjjc92l/wxAkMcdWHUoXHbZlixcUUZ+NJXmLqBLyVZRqJdsr6kNsGZKSU9BceOor9Mpw57wiiKQG6elVB7+JolJceUAIYxTCCVUrDJmtwJxYvg6vMrGMqsWPxWCojokUoPmZFHUWXrmJ0TiYNaVqjXqM4ZZwMmrH9DsOkSqLvqgY3EStzmJh7LaCQjduhwnDl2Wdffjk4jR21eNIRuDNsTkjQjudhoCD3k2IukRhiE+Qp5qkSxvaM9NnP2YCXvhpuwJZflwvu5LPD8F3ELdsWRnOAYt0qX1WrQiEGkUgxgJdk2NPpxZeJ0wC8GumsqA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fOCKz2kOi38egCBOcc5yYUrIcGnCcCVU11U4SzCQCV8=; b=XoZHdktVpSd7HRCntdl0IOYueaoo3yNGrHQtj1LkLWw8B94dVqzOJws72P7zL/Ua+whdT13yES/+sEaDJih4+yOLbGD4bPWvcBLZNEROFbinCrOhuAIj4RGkl1ENYi8WWHp7GaH6hLWLrNgHOwJ9ScAUCecjwNNFFLpTdGN+3dcRk1HeZDY5qxo4dIn6OkuHnxC1CauempE4GuL3FAbmR0KFRAuCTDVn3A8P5WfjmPyyV1IFZoezbzdB89Orh3HKp/rrhYHgbHvEEY+qeR7Cc/v2gT5fazKurIh7qXk+GpR0vzpUgnmllJ5+0HLXU2boVyCv6jNXySBdYweNZKZ/0g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fOCKz2kOi38egCBOcc5yYUrIcGnCcCVU11U4SzCQCV8=; b=e1X/gMWGGxHzFFR/kB0AX2spk1j8DJYqVb90a+hCnQD/GaB2yFPkxVST3fBtNyLc6jRsfNsstv7A2GvDCiJw7LADybSptRqSqq3St00J5YT59d5Q61sV3gHqJ86+eyUpw70nP9dwkE55HvFsn3aJ5/7TnEpWuM6lN/6GLyxY/wc=
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=btconnect.com;
Received: from VI1PR0701MB2480.eurprd07.prod.outlook.com (2603:10a6:800:63::16) by VI1PR0701MB2832.eurprd07.prod.outlook.com (2603:10a6:800:85::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.12; Sat, 30 May 2020 11:35:23 +0000
Received: from VI1PR0701MB2480.eurprd07.prod.outlook.com ([fe80::3474:b82e:e75a:b176]) by VI1PR0701MB2480.eurprd07.prod.outlook.com ([fe80::3474:b82e:e75a:b176%11]) with mapi id 15.20.3066.010; Sat, 30 May 2020 11:35:23 +0000
To: Mark Allman <mallman@icir.org>
References: <158981133458.2481.15195759097492819350@ietfa.amsl.com> <DB7PR07MB53406A74483D8123C75ADD70A28E0@DB7PR07MB5340.eurprd07.prod.outlook.com> <5ECFE791.3050400@btconnect.com> <055C1A6F-3EA9-4695-869F-BDE0A4943BE5@icsi.berkeley.edu> <5ED0F22E.1070402@btconnect.com> <7CD0EF44-D26A-4F85-AA6A-91D3C55B44AC@icir.org>
Cc: Last Call <last-call@ietf.org>, tcpm <tcpm@ietf.org>, draft-ietf-tcpm-rto-consider@ietf.org, tcpm-chairs@ietf.org
From: tom petch <daedulus@btconnect.com>
Message-ID: <5ED244F7.7030307@btconnect.com>
Date: Sat, 30 May 2020 12:35:19 +0100
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
In-Reply-To: <7CD0EF44-D26A-4F85-AA6A-91D3C55B44AC@icir.org>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: LO2P265CA0138.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:9f::30) To VI1PR0701MB2480.eurprd07.prod.outlook.com (2603:10a6:800:63::16)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [192.168.1.65] (81.131.229.108) by LO2P265CA0138.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:9f::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3000.26 via Frontend Transport; Sat, 30 May 2020 11:35:22 +0000
X-Originating-IP: [81.131.229.108]
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d414c160-4989-412c-a1e0-08d8048d8a88
X-MS-TrafficTypeDiagnostic: VI1PR0701MB2832:
X-Microsoft-Antispam-PRVS: <VI1PR0701MB28321C2BC0EB52FEF5D7AB6EC68C0@VI1PR0701MB2832.eurprd07.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:9508;
X-Forefront-PRVS: 041963B986
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: Q/8A56DVNyA1SzoboYYGwsbu8Gwc6yE+O+hQn3u6HJuDdTFeCNao9C9Tj55Sn2RgABmZavX8T7D9zhW4jN3ZEToitgrWGxC3cvd7TdoX5u0Pd+zvTQtmjV2K1YGTjqvmXqaYHk1LNktYDILLcP9EY17FYvli5SkA5X1rT4fGOaYr7z8/hOZONVmn2kebnIOri2+Om3nZyJ1SI9cdu9Jgby1qAn86gRDSzav6AbEP4ALGtB52RRWgIRnkCqs2gmnzK6PPyHp5nsXfmvU5kVFJL7JY44WrqmBXeGZAv3Tf48YnR/MZQdRr/2McpLKlrvaPEgWWfnbArATm+2rk+FrBLQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR0701MB2480.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(376002)(396003)(39860400002)(346002)(366004)(136003)(316002)(36756003)(16576012)(478600001)(956004)(87266011)(6486002)(33656002)(2906002)(66476007)(54906003)(66946007)(83380400001)(86362001)(66556008)(6916009)(52116002)(6666004)(4326008)(2616005)(5660300002)(8676002)(8936002)(186003)(16526019)(26005); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData: p2onv09f2/sCTG5CSLALqCdBlKWz8+0eIod0cAZemnfkQD3Kc86cg4NWMLvfJfY6W2VR49v7yPemh/cJIP8donYAfhbSEJULzHOR8B8fE1OnSueZxPX/603tZjQS1Eklxh7dKwL3FvtjVE3zI0TXsQI54z06jRJVNeVlzjHv74PH4mSU416M8AfMXFSN9aafFxM7JYz69Mnu4/UI7loRA67s2w87J32xA39vGjij8gLZ602EEYoSTcMb3KEzVx9A5cXCoYzftEG5epses7y5zfCnES5WXESBTXYYrlPbrk/LK5M8sdq75faVNbmbMU795PGwmMRXt+nrqdDGWmOb+pS1RplfJaBY8nWhEBVOBTJaKrdtcxBjoZHuoluDv8mN5YFP5oFIK0FRhAkRuLdIa14qFdJNESFtuqwfLn+D543yIb25bnaALA5PLwHVC8cwmbN+eeX0TCFilqO7AG1pfHGfzqitnVsqnLaMyimKH1o=
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d414c160-4989-412c-a1e0-08d8048d8a88
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2020 11:35:23.7063 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Mt5F2cthM8LTUoLaHuYdTfgrHjpIwP2SYYqRw5oJOAmMMfgHYdCZqx7MR1fGHGhS0k5NbuB3v1S71bYV8t1XHw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2832
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/GFow9fTkYSLldsywXZvmT6D2Zr0>
Subject: Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcpm-rto-consider-14.txt> (Requirements for Time-Based Loss Detection) to Best Current Practice
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 May 2020 11:35:33 -0000

> ----- Original Message -----
> From: "Mark Allman" <mallman@icir.org>
> Sent: Friday, May 29, 2020 1:45 PM
>
>> Hi Tom!
>>
>> I am going to re-arrange slightly and deal with the last one first.
>>
>>> So I am conscious that the I-D comes out of the TCPM WG but it
>>> seems as if it tries to be all encompassing;
>>
>> Yes; we have found the guidelines are broadly applicable.
>>
>>> and I struggle to think of an application of the I-D which is not
>>> TCP until some standards body develops a new transport protocol;
>>
>> SCTP, QUIC, DNS, ... all manner of UDP applications.  Several
>> things:
>>
>>    - In fact, RFC8085 (on UDP usage) includes many of the same things
>>      (cribbed from this I-D in some cases, actually!).  So, I think
>>      your framing this as applying TCP guidance too widely is
>>      incorrect.
>>
>>    - The WG chairs were conscious of this and explicitly got input
>>      from folks working in these other (non-TCP) areas, as well.
>>
>>    - The WGLC was run in both tcpm and tsvwg.
>>
>> So I do think this is quite a bit more widely applicable than TCP.
>> It did start its life as a TCP document, but grew in breadth as
>> folks have said "hey, that applies [here]" (e.g., most recently when
>> Jana noted this was quite applicable within QUIC).  It has been
>> developed and reviewed as pretty general for a while now.  I don't
>> think we're somehow trying to sneak something through that is
>> broader than it either should be or has been reviewed to be.

  Mark
  This is good to hear but I wish that more detail of this was in the I-D.
  I have followed a number of Transport AD review of xxxx-over-UDP and it
  was always about the need for flow control but never with the sort of
  techniques that TCP uses, usually just a requirement for a statement on
  rate limiting by the sender so if there are xxxx-over-UDP which measure
  RTO and lost packets and act accordingly, then that would be excellent
  to hear about.  I know of none (and yes I am familiar with RFC8085) so
  including non-TCP examples would counter the impression I have got that
  this is TCP!   SCTP I have always seen as son-of-TCP and so not much
  different in this context.  QUIC I have yet to encounter.  As it stands,
  the example of DNS caching server stands out to me as an example of
  broader application, of the I-D in general; I would value more such
  concrete examples. And below ...


>> I'll say something quick about the rest of the things, but basically
>> I am happy to add bits of clarification and fix sloppy writing.
>>
>>> When I got to "Within the standards process"
>>
>> Will add "IETF".
>>
>>> I see an underlying assumption that the network is unreliable and
>>> that the problem is packets discarded as a result of congestion.
>>> A common assumption but untrue in some cases.
>>
>> If your network is reliable then I presume you won't be reading
>> documents about loss detection.  But, I dunno.

  No, I am being unclear.  It is the 'packets are lost due to congestion
  and that is THE problem' that I see as the unstated assumption for this
  and many IETF documents.  Is it correct? Often, perhaps, but I struggle
  to recall anyone testing the hypothesis and there is growing use of IETF
  protocols over different kinds of networks where the problem is e.g.
  interference and packet corruption so the recommended techniques will
  give the user a worse experience - the corrupt packet needs
  re-transmitting as soon as the interference is over and backing off the
  flow rate is bad news for the user.  And below...

>> We can add a sentence to the intro to explicitly say we are
>> discussing unreliable networks if that helps.
>>
>>> Likewise, I see an assumption that the recipient will always
>>> generate an acknowledgement when asked.  Again, untrue for some
>>> protocols so again an assumption I would like to see stated.
>>
>> I don't think we *assume* this is *always* the case.  This is from
>> the document:
>>
>>      Various mechanisms are used to detect losses in a packet stream.
>>      Often we use continuous or periodic acknowledgments from the
>>      recipient to inform the sender's notion of which pieces of data
> are
>>      missing.
>>
>> Without details, there is an acknowledgment there that there are
>> different ways to detect loss other than continuous ACKs.  And, we
>> state "often we use" ACKs, which I think runs counter to your notion
>> that we "assume" "always".  So, I am not sure what you want here.
>>
>>> Safety is mentioned many times; what is the danger?  I do not know
> and
>>> would like to be told (congestive collapse?).
>>
>> Safety in a congestion, not security, sense.  I can add a quick
>> clarification on this.

  Yes please, this is an example of what I generically refer to as a
  lack of context, that for me safety is usually something quite
  different in an I-D.  And below ..

>> "protocols ultimately can only count on the passage of time
>>> without delivery confirmation " true for some networks, not true
>>> for others.
>>
>> I struggle to think of a case where it doesn't apply.  There are for
>> sure cases where we code the stream so that we get probabilistically
>> damn close to ensuring delivery without a continuous stream of ACKs
>> for specific packets.  But, without some feedback ("delivery
>> confirmation") to the sender how could we ever be sure the data
>> arrived?
>>
>>> I do see a steady if small increase in IETF protocols to detect
>>> and react to problems rather than waiting for someone else - like
>>> TCP - to notice and do something so again I am seeing an
>>> assumption.
>>
>> I can't follow this.  I don't mean to disagree with your
>> characterization of IETF protocols, but I don't understand how
>> you're applying that statement to the document.

It comes back to the assumption of a unreliable network, unreliable for
any reason, not just congestion.  An alternative approach is to make the
network reliable and this I see as a strong interest of WG such as TEAS,
CCAMP, MPLS and such like.  A statement up front about the assumption of
unreliability would address this.

Tom Petch
>
>> allman
>>
>>