Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcpm-rto-consider-14.txt> (Requirements for Time-Based Loss Detection) to Best Current Practice
tom petch <daedulus@btconnect.com> Sat, 30 May 2020 11:35 UTC
Return-Path: <daedulus@btconnect.com>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7E3A3A0918; Sat, 30 May 2020 04:35:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fuf4tVFzXHpO; Sat, 30 May 2020 04:35:28 -0700 (PDT)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2093.outbound.protection.outlook.com [40.107.21.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95E5B3A0917; Sat, 30 May 2020 04:35:27 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=B2PTGPo3okD5dfoAr6PsMo6Zjjc92l/wxAkMcdWHUoXHbZlixcUUZ+NJXmLqBLyVZRqJdsr6kNsGZKSU9BceOor9Mpw57wiiKQG6elVB7+JolJceUAIYxTCCVUrDJmtwJxYvg6vMrGMqsWPxWCojokUoPmZFHUWXrmJ0TiYNaVqjXqM4ZZwMmrH9DsOkSqLvqgY3EStzmJh7LaCQjduhwnDl2Wdffjk4jR21eNIRuDNsTkjQjudhoCD3k2IukRhiE+Qp5qkSxvaM9NnP2YCXvhpuwJZflwvu5LPD8F3ELdsWRnOAYt0qX1WrQiEGkUgxgJdk2NPpxZeJ0wC8GumsqA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fOCKz2kOi38egCBOcc5yYUrIcGnCcCVU11U4SzCQCV8=; b=XoZHdktVpSd7HRCntdl0IOYueaoo3yNGrHQtj1LkLWw8B94dVqzOJws72P7zL/Ua+whdT13yES/+sEaDJih4+yOLbGD4bPWvcBLZNEROFbinCrOhuAIj4RGkl1ENYi8WWHp7GaH6hLWLrNgHOwJ9ScAUCecjwNNFFLpTdGN+3dcRk1HeZDY5qxo4dIn6OkuHnxC1CauempE4GuL3FAbmR0KFRAuCTDVn3A8P5WfjmPyyV1IFZoezbzdB89Orh3HKp/rrhYHgbHvEEY+qeR7Cc/v2gT5fazKurIh7qXk+GpR0vzpUgnmllJ5+0HLXU2boVyCv6jNXySBdYweNZKZ/0g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fOCKz2kOi38egCBOcc5yYUrIcGnCcCVU11U4SzCQCV8=; b=e1X/gMWGGxHzFFR/kB0AX2spk1j8DJYqVb90a+hCnQD/GaB2yFPkxVST3fBtNyLc6jRsfNsstv7A2GvDCiJw7LADybSptRqSqq3St00J5YT59d5Q61sV3gHqJ86+eyUpw70nP9dwkE55HvFsn3aJ5/7TnEpWuM6lN/6GLyxY/wc=
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=btconnect.com;
Received: from VI1PR0701MB2480.eurprd07.prod.outlook.com (2603:10a6:800:63::16) by VI1PR0701MB2832.eurprd07.prod.outlook.com (2603:10a6:800:85::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.12; Sat, 30 May 2020 11:35:23 +0000
Received: from VI1PR0701MB2480.eurprd07.prod.outlook.com ([fe80::3474:b82e:e75a:b176]) by VI1PR0701MB2480.eurprd07.prod.outlook.com ([fe80::3474:b82e:e75a:b176%11]) with mapi id 15.20.3066.010; Sat, 30 May 2020 11:35:23 +0000
To: Mark Allman <mallman@icir.org>
References: <158981133458.2481.15195759097492819350@ietfa.amsl.com> <DB7PR07MB53406A74483D8123C75ADD70A28E0@DB7PR07MB5340.eurprd07.prod.outlook.com> <5ECFE791.3050400@btconnect.com> <055C1A6F-3EA9-4695-869F-BDE0A4943BE5@icsi.berkeley.edu> <5ED0F22E.1070402@btconnect.com> <7CD0EF44-D26A-4F85-AA6A-91D3C55B44AC@icir.org>
Cc: Last Call <last-call@ietf.org>, tcpm <tcpm@ietf.org>, draft-ietf-tcpm-rto-consider@ietf.org, tcpm-chairs@ietf.org
From: tom petch <daedulus@btconnect.com>
Message-ID: <5ED244F7.7030307@btconnect.com>
Date: Sat, 30 May 2020 12:35:19 +0100
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
In-Reply-To: <7CD0EF44-D26A-4F85-AA6A-91D3C55B44AC@icir.org>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: LO2P265CA0138.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:9f::30) To VI1PR0701MB2480.eurprd07.prod.outlook.com (2603:10a6:800:63::16)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [192.168.1.65] (81.131.229.108) by LO2P265CA0138.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:9f::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3000.26 via Frontend Transport; Sat, 30 May 2020 11:35:22 +0000
X-Originating-IP: [81.131.229.108]
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d414c160-4989-412c-a1e0-08d8048d8a88
X-MS-TrafficTypeDiagnostic: VI1PR0701MB2832:
X-Microsoft-Antispam-PRVS: <VI1PR0701MB28321C2BC0EB52FEF5D7AB6EC68C0@VI1PR0701MB2832.eurprd07.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:9508;
X-Forefront-PRVS: 041963B986
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: Q/8A56DVNyA1SzoboYYGwsbu8Gwc6yE+O+hQn3u6HJuDdTFeCNao9C9Tj55Sn2RgABmZavX8T7D9zhW4jN3ZEToitgrWGxC3cvd7TdoX5u0Pd+zvTQtmjV2K1YGTjqvmXqaYHk1LNktYDILLcP9EY17FYvli5SkA5X1rT4fGOaYr7z8/hOZONVmn2kebnIOri2+Om3nZyJ1SI9cdu9Jgby1qAn86gRDSzav6AbEP4ALGtB52RRWgIRnkCqs2gmnzK6PPyHp5nsXfmvU5kVFJL7JY44WrqmBXeGZAv3Tf48YnR/MZQdRr/2McpLKlrvaPEgWWfnbArATm+2rk+FrBLQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR0701MB2480.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(376002)(396003)(39860400002)(346002)(366004)(136003)(316002)(36756003)(16576012)(478600001)(956004)(87266011)(6486002)(33656002)(2906002)(66476007)(54906003)(66946007)(83380400001)(86362001)(66556008)(6916009)(52116002)(6666004)(4326008)(2616005)(5660300002)(8676002)(8936002)(186003)(16526019)(26005); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData: p2onv09f2/sCTG5CSLALqCdBlKWz8+0eIod0cAZemnfkQD3Kc86cg4NWMLvfJfY6W2VR49v7yPemh/cJIP8donYAfhbSEJULzHOR8B8fE1OnSueZxPX/603tZjQS1Eklxh7dKwL3FvtjVE3zI0TXsQI54z06jRJVNeVlzjHv74PH4mSU416M8AfMXFSN9aafFxM7JYz69Mnu4/UI7loRA67s2w87J32xA39vGjij8gLZ602EEYoSTcMb3KEzVx9A5cXCoYzftEG5epses7y5zfCnES5WXESBTXYYrlPbrk/LK5M8sdq75faVNbmbMU795PGwmMRXt+nrqdDGWmOb+pS1RplfJaBY8nWhEBVOBTJaKrdtcxBjoZHuoluDv8mN5YFP5oFIK0FRhAkRuLdIa14qFdJNESFtuqwfLn+D543yIb25bnaALA5PLwHVC8cwmbN+eeX0TCFilqO7AG1pfHGfzqitnVsqnLaMyimKH1o=
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d414c160-4989-412c-a1e0-08d8048d8a88
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2020 11:35:23.7063 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Mt5F2cthM8LTUoLaHuYdTfgrHjpIwP2SYYqRw5oJOAmMMfgHYdCZqx7MR1fGHGhS0k5NbuB3v1S71bYV8t1XHw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2832
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/GFow9fTkYSLldsywXZvmT6D2Zr0>
Subject: Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcpm-rto-consider-14.txt> (Requirements for Time-Based Loss Detection) to Best Current Practice
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 May 2020 11:35:33 -0000
> ----- Original Message ----- > From: "Mark Allman" <mallman@icir.org> > Sent: Friday, May 29, 2020 1:45 PM > >> Hi Tom! >> >> I am going to re-arrange slightly and deal with the last one first. >> >>> So I am conscious that the I-D comes out of the TCPM WG but it >>> seems as if it tries to be all encompassing; >> >> Yes; we have found the guidelines are broadly applicable. >> >>> and I struggle to think of an application of the I-D which is not >>> TCP until some standards body develops a new transport protocol; >> >> SCTP, QUIC, DNS, ... all manner of UDP applications. Several >> things: >> >> - In fact, RFC8085 (on UDP usage) includes many of the same things >> (cribbed from this I-D in some cases, actually!). So, I think >> your framing this as applying TCP guidance too widely is >> incorrect. >> >> - The WG chairs were conscious of this and explicitly got input >> from folks working in these other (non-TCP) areas, as well. >> >> - The WGLC was run in both tcpm and tsvwg. >> >> So I do think this is quite a bit more widely applicable than TCP. >> It did start its life as a TCP document, but grew in breadth as >> folks have said "hey, that applies [here]" (e.g., most recently when >> Jana noted this was quite applicable within QUIC). It has been >> developed and reviewed as pretty general for a while now. I don't >> think we're somehow trying to sneak something through that is >> broader than it either should be or has been reviewed to be. Mark This is good to hear but I wish that more detail of this was in the I-D. I have followed a number of Transport AD review of xxxx-over-UDP and it was always about the need for flow control but never with the sort of techniques that TCP uses, usually just a requirement for a statement on rate limiting by the sender so if there are xxxx-over-UDP which measure RTO and lost packets and act accordingly, then that would be excellent to hear about. I know of none (and yes I am familiar with RFC8085) so including non-TCP examples would counter the impression I have got that this is TCP! SCTP I have always seen as son-of-TCP and so not much different in this context. QUIC I have yet to encounter. As it stands, the example of DNS caching server stands out to me as an example of broader application, of the I-D in general; I would value more such concrete examples. And below ... >> I'll say something quick about the rest of the things, but basically >> I am happy to add bits of clarification and fix sloppy writing. >> >>> When I got to "Within the standards process" >> >> Will add "IETF". >> >>> I see an underlying assumption that the network is unreliable and >>> that the problem is packets discarded as a result of congestion. >>> A common assumption but untrue in some cases. >> >> If your network is reliable then I presume you won't be reading >> documents about loss detection. But, I dunno. No, I am being unclear. It is the 'packets are lost due to congestion and that is THE problem' that I see as the unstated assumption for this and many IETF documents. Is it correct? Often, perhaps, but I struggle to recall anyone testing the hypothesis and there is growing use of IETF protocols over different kinds of networks where the problem is e.g. interference and packet corruption so the recommended techniques will give the user a worse experience - the corrupt packet needs re-transmitting as soon as the interference is over and backing off the flow rate is bad news for the user. And below... >> We can add a sentence to the intro to explicitly say we are >> discussing unreliable networks if that helps. >> >>> Likewise, I see an assumption that the recipient will always >>> generate an acknowledgement when asked. Again, untrue for some >>> protocols so again an assumption I would like to see stated. >> >> I don't think we *assume* this is *always* the case. This is from >> the document: >> >> Various mechanisms are used to detect losses in a packet stream. >> Often we use continuous or periodic acknowledgments from the >> recipient to inform the sender's notion of which pieces of data > are >> missing. >> >> Without details, there is an acknowledgment there that there are >> different ways to detect loss other than continuous ACKs. And, we >> state "often we use" ACKs, which I think runs counter to your notion >> that we "assume" "always". So, I am not sure what you want here. >> >>> Safety is mentioned many times; what is the danger? I do not know > and >>> would like to be told (congestive collapse?). >> >> Safety in a congestion, not security, sense. I can add a quick >> clarification on this. Yes please, this is an example of what I generically refer to as a lack of context, that for me safety is usually something quite different in an I-D. And below .. >> "protocols ultimately can only count on the passage of time >>> without delivery confirmation " true for some networks, not true >>> for others. >> >> I struggle to think of a case where it doesn't apply. There are for >> sure cases where we code the stream so that we get probabilistically >> damn close to ensuring delivery without a continuous stream of ACKs >> for specific packets. But, without some feedback ("delivery >> confirmation") to the sender how could we ever be sure the data >> arrived? >> >>> I do see a steady if small increase in IETF protocols to detect >>> and react to problems rather than waiting for someone else - like >>> TCP - to notice and do something so again I am seeing an >>> assumption. >> >> I can't follow this. I don't mean to disagree with your >> characterization of IETF protocols, but I don't understand how >> you're applying that statement to the document. It comes back to the assumption of a unreliable network, unreliable for any reason, not just congestion. An alternative approach is to make the network reliable and this I see as a strong interest of WG such as TEAS, CCAMP, MPLS and such like. A statement up front about the assumption of unreliability would address this. Tom Petch > >> allman >> >>
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… tom petch
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… tom petch
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Mark Allman
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Mark Allman
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… tom petch
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Mark Allman
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… tom petch
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Benjamin Kaduk
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Mark Allman
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Mark Allman
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Mark Allman
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… tom petch
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Mark Allman
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Stewart Bryant
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… tom petch
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Martin Duke
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… tom petch
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Mark Allman
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… t petch
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Mark Allman
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Carsten Bormann
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Mark Allman
- Re: [Last-Call] [tcpm] Last Call: <draft-ietf-tcp… Joseph Touch