Re: [Last-Call] [Tsv-art] [Lwip] Tsvart telechat review of draft-ietf-lwig-tcp-constrained-node-networks-11

Mirja Kuehlewind <ietf@kuehlewind.net> Fri, 30 October 2020 10:23 UTC

Return-Path: <ietf@kuehlewind.net>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 096C83A0DCA; Fri, 30 Oct 2020 03:23:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o2dVCEeiHLZg; Fri, 30 Oct 2020 03:23:07 -0700 (PDT)
Received: from wp513.webpack.hosteurope.de (wp513.webpack.hosteurope.de [80.237.130.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DDBA73A0D45; Fri, 30 Oct 2020 03:23:06 -0700 (PDT)
Received: from p200300dee707b60084876c33e1c11036.dip0.t-ipconnect.de ([2003:de:e707:b600:8487:6c33:e1c1:1036]); authenticated by wp513.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) id 1kYRYm-0000f6-Rk; Fri, 30 Oct 2020 11:23:04 +0100
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
From: Mirja Kuehlewind <ietf@kuehlewind.net>
X-Priority: 3 (Normal)
In-Reply-To: <ef049fb184c9a829f01e60714ffc8129.squirrel@webmail.entel.upc.edu>
Date: Fri, 30 Oct 2020 11:23:01 +0100
Cc: tsv-art@ietf.org, draft-ietf-lwig-tcp-constrained-node-networks.all@ietf.org, lwip@ietf.org, last-call@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <D3E5751A-AA55-4280-B3E5-101218579FDE@kuehlewind.net>
References: <160311139782.3413.8999722853087687791@ietfa.amsl.com> <ef049fb184c9a829f01e60714ffc8129.squirrel@webmail.entel.upc.edu>
To: Carles Gomez Montenegro <carlesgo@entel.upc.edu>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
X-bounce-key: webpack.hosteurope.de;ietf@kuehlewind.net;1604053387;9f6a8ddd;
X-HE-SMSGID: 1kYRYm-0000f6-Rk
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/P5gFHMzW6Clx2Tpqm4c8leGNToI>
Subject: Re: [Last-Call] [Tsv-art] [Lwip] Tsvart telechat review of draft-ietf-lwig-tcp-constrained-node-networks-11
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Oct 2020 10:23:09 -0000

Hi Carles,

Thanks for you edits. Looks all good to me!

Mirja


> On 30. Oct 2020, at 08:26, Carles Gomez Montenegro <carlesgo@entel.upc.edu> wrote:
> 
> Hi Mirja,
> 
> Thank you very much for your review!
> 
> We just submitted revision -12, which aims at addressing the comments
> received from the IESG and related reviewers, including yours:
> https://tools.ietf.org/html/draft-ietf-lwig-tcp-constrained-node-networks-12
> 
> Please find below our inline responses:
> 
>> Reviewer: Mirja Kühlewind
>> Review result: Ready
>> 
>> This document has been reviewed as part of the transport area review
>> team's
>> ongoing effort to review key IETF documents. These comments were written
>> primarily for the transport area directors, but are copied to the
>> document's
>> authors and WG to allow them to address any issues raised and also to the
>> IETF
>> discussion list for information.
>> 
>> When done at the time of IETF Last Call, the authors should consider this
>> review as part of the last-call comments they receive. Please always CC
>> tsv-art@ietf.org if you reply to or forward this review.
>> 
>> Thanks for the well-written document! This is good to go, I only have some
>> optional suggestions below:
> 
> Thanks for your kind words and for your constructive review.
> 
>> In section 4.1.2. you could potentially also mention
>> draft-ietf-tcpm-generalized-ecn as connections with small windows might
>> especially benefit when the ACK is also ECN-capable.
> 
> Agreed. We added the following before the last sentence of former 4.1.2
> (now 3.1.2):
> 
> NEW:
>   As of the writing, there is on-going work to extend the types of TCP
>   packets that are ECN-capable, including pure ACKs [draft-ietf-tcpm-
>   generalized-ecn]. Such a feature may further increase the benefits of
>   ECN in CNN environments.
> 
>> In section 4.2.1: "In that case, both congestion and flow control
>> implementation are quite simple." I guess this is even an understatement.
>> Basically this would be a static configuration and there is nothing left
>> to
>> "control".
> 
> We see your point, but we understand that at least some sort of flow
> control is still possible for a very simple TCP/IP stack. For instance, a
> TCP receiver can still send segments with zero receive window (RWND=0).
> Regarding congestion control, the RTO backoff applies, which is some basic
> form of congestion control. The wording "quite simple" in the document
> aims to capture that. However, please let us know if you have a different
> opinion.
> 
>> In section 4.2.3: "Disabling Delayed ACKs at the sender allows an
>> immediate ACK
>> for the data segment carrying the response." I guess you can in addition,
>> however, explain that keeping the delayed ACK could help to piggy-back the
>> ACK
>> with maybe some additional data to send instead of sending the ACK in a
>> separate TCP packet (of course depending on the traffic pattern of the
>> application). I think this is roughly mentioned later again but seems to
>> belong
>> her as well.
> 
> If we understand it correctly, your suggested addition is already present
> in the sentence right before the one that you focused on in this comment.
> If we misunderstood your comment, please let us know.
> 
>> Section 4.3.1.1: is this sentence correct? It least it did confuse me a
>> bit
>> when reading first: “A receiver supporting SACK will need to keep track
>> of the
>> SACK blocks that need to be received.” Maybe “A receiver supporting
>> SACK will
>> need to keep track of the data blocks that need to be received.” ?
> 
> Agreed.
> 
>> Section 4.3.2: Maybe s/it may make sense to use a small timeout/it may
>> make
>> sense to use a smaller timeout/ or s/it may make sense to use a small
>> timeout/it may make sense to use a very small timeout/ ?
> 
> Agreed (we used the first proposal).
> 
>> Section 4.3.3: “with an IW setting of 10 MSS, there is significant
>> buffer
>> overflow risk” I think it would be good to explain slightly better which
>> buffer
>> you mean. Is there an assumption that network buffer sizes are known in
>> CNNs as
>> managed by the same entity than the constraint devices? Maybe the
>> recommendation should be to make this parameter configurable? I guess most
>> stacks provide an option for this but not sure if all do…
> 
> In the highlighted text, “buffer” may actually refer to a buffer at any
> layer (e.g. a “radio buffer”, or an upper layer buffer), depending on the
> specific context. For example, some constrained device hardware platforms
> support a send buffer of at most one MSS of data.  We hope that the
> following update can help clarify the intent:
> 
> OLD:
>    with an IW setting of 10 MSS, there is significant buffer overflow risk,
> 
> NEW:
>    with an IW setting of 10 MSS, there is significant buffer overflow risk,
>    since many CNN devices support network or radio buffers of a size
>    smaller than 10 MSS.
> 
>> Section 6: maybe provide a reference to RFC8446 TLS1.3..?
> 
> Agreed.
> 
>> Also section 6: You mention TCP-OA but you don’t give a really
>> recommendation
>> if or when it should be used or not.
> 
> We now aim at highlighting the benefits of TCP-AO, along with the
> trade-off that needs to be assessed by the implementer. We updated the
> first two paragraphs in Section 5 (formerly, Section 6), as follows:
> 
> NEW:
>   Best current practice for securing TCP and TCP-based communication
>   also applies to CNN.  As example, use of Transport Layer Security
>   (TLS) [RFC 8446] is strongly recommended if it is applicable. However,
>   note that TLS protects only the contents of the data segments.
> 
>   There are TCP options which can actually protect the transport layer.
>   One example is the TCP Authentication Option (TCP-AO) [RFC5925]. However,
>   this option adds overhead and complexity.  TCP-AO typically has a size of
>   16-20 bytes. An implementer needs to asses the trade-off between security
>   and performance when using TCP-AO, considering the characteristics (in
>   terms of energy, bandwidth and computational power) of the environment
>   where TCP will be used.
> 
>> I assume section 8 is intended to be kept for publication. I support that
>> as
>> it’s interesting information.
> 
> Thanks for your support!
> 
> Yes, we (the authors) would like to keep that former section 8 (now,
> section 7) for publication.
> 
> Greetings,
> 
> Carles (on behalf of the authors)
> 
> _______________________________________________
> Tsv-art mailing list
> Tsv-art@ietf.org
> https://www.ietf.org/mailman/listinfo/tsv-art
>