Re: [Last-Call] [Tsv-art] [Lwip] Tsvart telechat review of draft-ietf-lwig-tcp-constrained-node-networks-11
Mirja Kuehlewind <ietf@kuehlewind.net> Fri, 30 October 2020 10:23 UTC
Return-Path: <ietf@kuehlewind.net>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 096C83A0DCA; Fri, 30 Oct 2020 03:23:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o2dVCEeiHLZg; Fri, 30 Oct 2020 03:23:07 -0700 (PDT)
Received: from wp513.webpack.hosteurope.de (wp513.webpack.hosteurope.de [80.237.130.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DDBA73A0D45; Fri, 30 Oct 2020 03:23:06 -0700 (PDT)
Received: from p200300dee707b60084876c33e1c11036.dip0.t-ipconnect.de ([2003:de:e707:b600:8487:6c33:e1c1:1036]); authenticated by wp513.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) id 1kYRYm-0000f6-Rk; Fri, 30 Oct 2020 11:23:04 +0100
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
From: Mirja Kuehlewind <ietf@kuehlewind.net>
X-Priority: 3 (Normal)
In-Reply-To: <ef049fb184c9a829f01e60714ffc8129.squirrel@webmail.entel.upc.edu>
Date: Fri, 30 Oct 2020 11:23:01 +0100
Cc: tsv-art@ietf.org, draft-ietf-lwig-tcp-constrained-node-networks.all@ietf.org, lwip@ietf.org, last-call@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <D3E5751A-AA55-4280-B3E5-101218579FDE@kuehlewind.net>
References: <160311139782.3413.8999722853087687791@ietfa.amsl.com> <ef049fb184c9a829f01e60714ffc8129.squirrel@webmail.entel.upc.edu>
To: Carles Gomez Montenegro <carlesgo@entel.upc.edu>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
X-bounce-key: webpack.hosteurope.de;ietf@kuehlewind.net;1604053387;9f6a8ddd;
X-HE-SMSGID: 1kYRYm-0000f6-Rk
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/P5gFHMzW6Clx2Tpqm4c8leGNToI>
Subject: Re: [Last-Call] [Tsv-art] [Lwip] Tsvart telechat review of draft-ietf-lwig-tcp-constrained-node-networks-11
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Oct 2020 10:23:09 -0000
Hi Carles, Thanks for you edits. Looks all good to me! Mirja > On 30. Oct 2020, at 08:26, Carles Gomez Montenegro <carlesgo@entel.upc.edu> wrote: > > Hi Mirja, > > Thank you very much for your review! > > We just submitted revision -12, which aims at addressing the comments > received from the IESG and related reviewers, including yours: > https://tools.ietf.org/html/draft-ietf-lwig-tcp-constrained-node-networks-12 > > Please find below our inline responses: > >> Reviewer: Mirja Kühlewind >> Review result: Ready >> >> This document has been reviewed as part of the transport area review >> team's >> ongoing effort to review key IETF documents. These comments were written >> primarily for the transport area directors, but are copied to the >> document's >> authors and WG to allow them to address any issues raised and also to the >> IETF >> discussion list for information. >> >> When done at the time of IETF Last Call, the authors should consider this >> review as part of the last-call comments they receive. Please always CC >> tsv-art@ietf.org if you reply to or forward this review. >> >> Thanks for the well-written document! This is good to go, I only have some >> optional suggestions below: > > Thanks for your kind words and for your constructive review. > >> In section 4.1.2. you could potentially also mention >> draft-ietf-tcpm-generalized-ecn as connections with small windows might >> especially benefit when the ACK is also ECN-capable. > > Agreed. We added the following before the last sentence of former 4.1.2 > (now 3.1.2): > > NEW: > As of the writing, there is on-going work to extend the types of TCP > packets that are ECN-capable, including pure ACKs [draft-ietf-tcpm- > generalized-ecn]. Such a feature may further increase the benefits of > ECN in CNN environments. > >> In section 4.2.1: "In that case, both congestion and flow control >> implementation are quite simple." I guess this is even an understatement. >> Basically this would be a static configuration and there is nothing left >> to >> "control". > > We see your point, but we understand that at least some sort of flow > control is still possible for a very simple TCP/IP stack. For instance, a > TCP receiver can still send segments with zero receive window (RWND=0). > Regarding congestion control, the RTO backoff applies, which is some basic > form of congestion control. The wording "quite simple" in the document > aims to capture that. However, please let us know if you have a different > opinion. > >> In section 4.2.3: "Disabling Delayed ACKs at the sender allows an >> immediate ACK >> for the data segment carrying the response." I guess you can in addition, >> however, explain that keeping the delayed ACK could help to piggy-back the >> ACK >> with maybe some additional data to send instead of sending the ACK in a >> separate TCP packet (of course depending on the traffic pattern of the >> application). I think this is roughly mentioned later again but seems to >> belong >> her as well. > > If we understand it correctly, your suggested addition is already present > in the sentence right before the one that you focused on in this comment. > If we misunderstood your comment, please let us know. > >> Section 4.3.1.1: is this sentence correct? It least it did confuse me a >> bit >> when reading first: âA receiver supporting SACK will need to keep track >> of the >> SACK blocks that need to be received.â Maybe âA receiver supporting >> SACK will >> need to keep track of the data blocks that need to be received.â ? > > Agreed. > >> Section 4.3.2: Maybe s/it may make sense to use a small timeout/it may >> make >> sense to use a smaller timeout/ or s/it may make sense to use a small >> timeout/it may make sense to use a very small timeout/ ? > > Agreed (we used the first proposal). > >> Section 4.3.3: âwith an IW setting of 10 MSS, there is significant >> buffer >> overflow riskâ I think it would be good to explain slightly better which >> buffer >> you mean. Is there an assumption that network buffer sizes are known in >> CNNs as >> managed by the same entity than the constraint devices? Maybe the >> recommendation should be to make this parameter configurable? I guess most >> stacks provide an option for this but not sure if all do⦠> > In the highlighted text, buffer may actually refer to a buffer at any > layer (e.g. a radio buffer, or an upper layer buffer), depending on the > specific context. For example, some constrained device hardware platforms > support a send buffer of at most one MSS of data. We hope that the > following update can help clarify the intent: > > OLD: > with an IW setting of 10 MSS, there is significant buffer overflow risk, > > NEW: > with an IW setting of 10 MSS, there is significant buffer overflow risk, > since many CNN devices support network or radio buffers of a size > smaller than 10 MSS. > >> Section 6: maybe provide a reference to RFC8446 TLS1.3..? > > Agreed. > >> Also section 6: You mention TCP-OA but you donât give a really >> recommendation >> if or when it should be used or not. > > We now aim at highlighting the benefits of TCP-AO, along with the > trade-off that needs to be assessed by the implementer. We updated the > first two paragraphs in Section 5 (formerly, Section 6), as follows: > > NEW: > Best current practice for securing TCP and TCP-based communication > also applies to CNN. As example, use of Transport Layer Security > (TLS) [RFC 8446] is strongly recommended if it is applicable. However, > note that TLS protects only the contents of the data segments. > > There are TCP options which can actually protect the transport layer. > One example is the TCP Authentication Option (TCP-AO) [RFC5925]. However, > this option adds overhead and complexity. TCP-AO typically has a size of > 16-20 bytes. An implementer needs to asses the trade-off between security > and performance when using TCP-AO, considering the characteristics (in > terms of energy, bandwidth and computational power) of the environment > where TCP will be used. > >> I assume section 8 is intended to be kept for publication. I support that >> as >> itâs interesting information. > > Thanks for your support! > > Yes, we (the authors) would like to keep that former section 8 (now, > section 7) for publication. > > Greetings, > > Carles (on behalf of the authors) > > _______________________________________________ > Tsv-art mailing list > Tsv-art@ietf.org > https://www.ietf.org/mailman/listinfo/tsv-art >
- [Last-Call] Tsvart telechat review of draft-ietf-… Mirja Kühlewind via Datatracker
- Re: [Last-Call] [Lwip] Tsvart telechat review of … Carles Gomez Montenegro
- Re: [Last-Call] [Tsv-art] [Lwip] Tsvart telechat … Mirja Kuehlewind