[quicwg/base-drafts] QUIC transport Reading NiTs part 2 of 2 (#3735)

Gorry Fairhurst <notifications@github.com> Fri, 05 June 2020 12:50 UTC

Return-Path: <noreply@github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64ADA3A053E for <quic-issues@ietfa.amsl.com>; Fri, 5 Jun 2020 05:50:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.101
X-Spam-Level:
X-Spam-Status: No, score=-3.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GaceeqWtfAtI for <quic-issues@ietfa.amsl.com>; Fri, 5 Jun 2020 05:50:03 -0700 (PDT)
Received: from out-23.smtp.github.com (out-23.smtp.github.com [192.30.252.206]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 813D43A0477 for <quic-issues@ietf.org>; Fri, 5 Jun 2020 05:50:03 -0700 (PDT)
Received: from github-lowworker-39b4a70.va3-iad.github.net (github-lowworker-39b4a70.va3-iad.github.net [10.48.16.66]) by smtp.github.com (Postfix) with ESMTP id B001D66002B for <quic-issues@ietf.org>; Fri, 5 Jun 2020 05:50:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1591361402; bh=Tdygz+sYMmMO0NoSVQ8ZReCPknTSnVJaU/BEiPzNtas=; h=Date:From:Reply-To:To:Cc:Subject:List-ID:List-Archive:List-Post: List-Unsubscribe:From; b=Bbco2Rc1Jw9cgCLOGuzgtfmz2ppkdlCn2qoZV+y6I9sIw0QKFwUw4Gs4gK6M2Ye7L +CWJFUiD1HwkzIF0F5rrEa96yH3OYFg77BhSiiUBVARhWI2OGUo85GJ7OFxoUZLD+a WgWSqPrTCzIVUCW+bHqtVcR3AuRkLYsAjy4si7Pc=
Date: Fri, 05 Jun 2020 05:50:02 -0700
From: Gorry Fairhurst <notifications@github.com>
Reply-To: quicwg/base-drafts <reply+AFTOJK6MJ7Y3CRL7FRXPRN544YQHVEVBNHHCLJHKRQ@reply.github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <quicwg/base-drafts/issues/3735@github.com>
Subject: [quicwg/base-drafts] QUIC transport Reading NiTs part 2 of 2 (#3735)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5eda3f7a9dad9_77e3f9ad38cd964117313"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: gorryfair
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/2n_c2wzsD-5OpH5jCmsdpyruZhE>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jun 2020 12:50:05 -0000

I think there are NiTs in the second half the ID also, and while I suspectthese don't change the intended meaning, they nevertheless should be examined by the editors:

(1) Concerning ACKS:  I thought the following text was heading in the correct direction, but I remain concerned that this could be read to suggest that performance of the flow should drive the changes. 
/However, an implementer should only deviate from these requirements after careful consideration of the performance implications of doing so./
- I’d love this to actually say something about congestion. Decisions made in the generation of ACKs can impact the congestion to the network and therefore also the performance of other flows that share a path. I really think we should say this.

(2) And collateral impact on other traffic:
/It can also improve connection throughput on severely asymmetric links; see Section 3 of {{?RFC3449}}./
- It also can have important congestion impacts on other traffic that shares an asymmetric bottleneck, besides the self-harm of reducing the application’s own throughput.

(3) Justify? This text seems a good recommendation, but there isn’t a hint at why this is a strong requirement, could the editors add one line of text explaining?
/Senders MUST NOT coalesce QUIC packets for different connections into a single UDP datagram./

(4) The size and frequency of ACKs can impact the performance of QUIC, so there are also congestion control reasons to not overly report ACK ranges. 
/This is necessary if an ACK frame would be too large to fit in a packet, however receivers MAY also limit ACK frame size further to preserve space for other frames./

(5) This seems an awkward sentence and I could not understand what was intended:
/A receiver MUST NOT bundle an ack-eliciting frame with all packets that would otherwise be non-ack-eliciting, to avoid an infinite feedback loop of acknowledgements./
- Perhaps /all/ in this is part of my confusion?

(6) In Section: Versions (missing words)
/Implementors are encouraged to register version numbers of QUIC that they are using for private experimentation on the GitHub wiki at ./
- either way, it may be better to complete the sentence?

(7) In Section:  PING Frame: (NiT)
- This seems good advice, but I’d love the sentence to include “to keep a connection alive”, since at the moment reading this alone, could be seen as rather general guidance. Whereas there are other uses of PINGs, such as PLPMTUD, and for this use can generate pings by clients and servers:
/An application protocol SHOULD provide guidance about the conditions under which generating a PING is recommended. / e.g. /An application protocol SHOULD provide guidance about the conditions under which it recommends generating a PING to keep a connection alive./

(8) In ACKs: (NiT)
/This is unlike TCP SACKs ({{?RFC2018}})./This is unlike reneging for TCP SACKs ({{?RFC2018}})./
- can we be slightly more explicit about the important difference by adding a couple of words?

(9) In Section: STREAM Frames (line break:)
/Offset:/
- The first sentence in /Offset/ appears to have an odd line-break mid sentence.

(10) In Section: Extension Frames
- /which/that/?
/other extensions which modify or replace the same functionality unless the behavior of the combination is explicitly defined./

(11) In Section:  Transport Error Codes (line break:)
INVALID_TOKEN (0xB): :/
- The first sentence needs a line-break mid sentence.

(12) In Section: Version Negotiation 
Is this only a recommendation?
“Clients that support multiple QUIC versions SHOULD pad the first packet they send to the largest of the minimum packet sizes across all versions they support.”
Whereas in Section: Packet Size
/A client MUST expand the payload of all UDP datagrams carrying Initial packets to at least 1200 bytes, by adding PADDING frames to the Initial packet or by coalescing the Initial packet; see {{packet-coalesce}}./
- I think the latter is true, and suspect that version negotiation section shouldn’t include this text, but instead refer to the text norm initial packet size.

(13) In Section: Cryptographic and Transport Handshake
- Is this intended as optional, I think it is required when ECN is to be used?
“An endpoint can verify support for Explicit Congestion Notification (ECN) in the first packets it sends, as described in {{ecn-validation}}.”
- seems to suggest this is optional, whereas, I think actually this is describing a needed mechanism, so is it better to say “An endpoint verifies” as is done in the section: Initiating Connection Migration. which says: “The new path might not have the same ECN capability. Therefore, the endpoint verifies ECN capability as described in {{ecn}}.”  


-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/quicwg/base-drafts/issues/3735