Re: Consensus Calls for Late Stage Documents

Vidhi Goel <vidhi_goel@apple.com> Wed, 15 January 2020 21:46 UTC

Return-Path: <vidhi_goel@apple.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 015D91209AF for <quic@ietfa.amsl.com>; Wed, 15 Jan 2020 13:46:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gwx5tpmKFBpe for <quic@ietfa.amsl.com>; Wed, 15 Jan 2020 13:46:56 -0800 (PST)
Received: from nwk-aaemail-lapp03.apple.com (nwk-aaemail-lapp03.apple.com [17.151.62.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 668BA120984 for <quic@ietf.org>; Wed, 15 Jan 2020 13:46:56 -0800 (PST)
Received: from pps.filterd (nwk-aaemail-lapp03.apple.com [127.0.0.1]) by nwk-aaemail-lapp03.apple.com (8.16.0.27/8.16.0.27) with SMTP id 00FLbldi053475; Wed, 15 Jan 2020 13:46:51 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=sender : from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=/vi8/hXL0WPa0cErNQ6TEFuh684VdvpI/TLev+0XtgU=; b=LLwq7xMqBBgDK7hB0M9WuGGuzpo9Pzz0Z3KWOBLOg+hvyS18vzYXiIoR26fM7x2LGHJE Gon1adUNC9Ja/BNt5tQ4FW018irfyzLdx2yPPGYvi2xq6AfTuJfNeldTlcA8Q8iXKMhq 6tLEXEb0m8MGnol/CtUiR3nuskHMZvzI3+hRm65896GNJ1OaeJz0mfhgyRNwH+0HDJnv uTw7P0fid9q0xxa+gIjapnBlA+WdPK8fEIz7zi0HqX6GkCWyvhmgMoqNHQx6C6MCR45Y IKqOGnyBcFuQJ2z0w3B+4wmaJAmpNvtmoQaF01N1QhEt6HnHQSYW2SSwq1SljckLWep7 0Q==
Received: from ma1-mtap-s01.corp.apple.com (ma1-mtap-s01.corp.apple.com [17.40.76.5]) by nwk-aaemail-lapp03.apple.com with ESMTP id 2xfyfq6nm9-3 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Wed, 15 Jan 2020 13:46:51 -0800
Received: from nwk-mmpp-sz11.apple.com (nwk-mmpp-sz11.apple.com [17.128.115.155]) by ma1-mtap-s01.corp.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPS id <0Q460070C4I0CJ00@ma1-mtap-s01.corp.apple.com>; Wed, 15 Jan 2020 13:46:49 -0800 (PST)
Received: from process_milters-daemon.nwk-mmpp-sz11.apple.com by nwk-mmpp-sz11.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) id <0Q4600E003UHUR00@nwk-mmpp-sz11.apple.com>; Wed, 15 Jan 2020 13:46:42 -0800 (PST)
X-Va-A:
X-Va-T-CD: 3c9e60238ff42d5d241adc7c098b7690
X-Va-E-CD: 063240aa94b0c98980db372c628700cf
X-Va-R-CD: d183a31e0440aa348d2d732f86c59cc8
X-Va-CD: 0
X-Va-ID: 4e09ecfa-0553-4406-b282-e42e6668469f
X-V-A:
X-V-T-CD: 3c9e60238ff42d5d241adc7c098b7690
X-V-E-CD: 063240aa94b0c98980db372c628700cf
X-V-R-CD: d183a31e0440aa348d2d732f86c59cc8
X-V-CD: 0
X-V-ID: 7a979ad9-47a1-48e9-a248-73f7771f7ac5
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2020-01-15_03:,, signatures=0
Received: from vimac.scv.apple.com (vimac.scv.apple.com [17.192.171.33]) by nwk-mmpp-sz11.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPSA id <0Q4600CQX4HU0C50@nwk-mmpp-sz11.apple.com>; Wed, 15 Jan 2020 13:46:42 -0800 (PST)
Sender: vidhi_goel@apple.com
From: Vidhi Goel <vidhi_goel@apple.com>
Message-id: <247B1759-7D5C-436D-B6C5-BC2AF2479366@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_E9160C1C-6BD8-4A86-B7D5-B1A297F20927"
MIME-version: 1.0 (Mac OS X Mail 13.0 \(3616\))
Subject: Re: Consensus Calls for Late Stage Documents
Date: Wed, 15 Jan 2020 13:46:42 -0800
In-reply-to: <43D8DACA-C1C4-449A-A4BC-4F0E6F8F1CAB@mnot.net>
Cc: IETF QUIC WG <quic@ietf.org>, Lars Eggert <lars@eggert.org>, Christoph Paasch <cpaasch@apple.com>, Eric Kinnear <ekinnear@apple.com>, Tommy Pauly <tpauly@apple.com>, Rui Cunha Paulo <rpaulo@apple.com>
To: Mark Nottingham <mnot@mnot.net>
References: <43D8DACA-C1C4-449A-A4BC-4F0E6F8F1CAB@mnot.net>
X-Mailer: Apple Mail (2.3616)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2020-01-15_03:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/0qrbp9GEnK8cqBtkoh0rK7himkw>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jan 2020 21:46:58 -0000

Hi Mark,

> * #3094: congestion window increase on every ACKed packet could result in bursty sends
>   The proposal is <https://github.com/quicwg/base-drafts/pull/3232>

We would like to hold off on this change as we are working on specifying Pacing mechanism which would allow the implementations to decouple congestion window increase from sending rate and thus eliminate the need for 2MSS limit during slow start.
Below is the PR:
https://github.com/quicwg/base-drafts/pull/3351 <https://github.com/quicwg/base-drafts/pull/3351>

I will create a issue to start the discussion.

Thanks,
Vidhi

> On Jan 5, 2020, at 7:56 PM, Mark Nottingham <mnot@mnot.net> wrote:
> 
> Happy New Year, Working Group.
> 
> The following issues have proposals for resolution, and discussion so far seems to support consensus to accept them. If you object, please do so on the issue or in response to this message (changing the Subject appropriately!). Absent any pushback, we'll direct the editors to incorporate them late next week.
> 
> See <https://github.com/quicwg/base-drafts/projects/5> for the current state of issues in the Late Stage process, itself defined at <https://github.com/quicwg/base-drafts/blob/master/CONTRIBUTING.md>.
> 
> * #3274: Encrypting Retry token
>   The proposal is <https://github.com/quicwg/base-drafts/issues/3274>
> 
> * #3247: I am concerned the congestion control text is too permissive.
>   The proposal is <https://github.com/quicwg/base-drafts/pull/3248>
> 
> * #3245: Make RFC 6928 normative
>   The proposal is <https://github.com/quicwg/base-drafts/pull/3287>
> 
> * #3244: Can we make a normative ref to  RFC8085?
>   The proposal is <https://github.com/quicwg/base-drafts/pull/3248>
> 
> * #3243: Add caution when using IW10 and fragmentation 
>   The proposal is <https://github.com/quicwg/base-drafts/pull/3280>
> 
> * #3152: Client storage of tokens should be independent of other stored state
>   The proposal is <https://github.com/quicwg/base-drafts/pull/3150>
> 
> * #3142: It is unspecified how a server sends Handshake packets during / after migration
>   The proposal is <https://github.com/quicwg/base-drafts/pull/3145>
> 
> * #3094: congestion window increase on every ACKed packet could result in bursty sends
>   The proposal is <https://github.com/quicwg/base-drafts/pull/3232>
> 
> * #3014: Handling of corrupt Retry packets
>   The proposal is <https://github.com/quicwg/base-drafts/issues/3274>
> 
> * #2863: unrecoverable loss pattern leads to deadlock
>   The proposal is <https://github.com/quicwg/base-drafts/pull/3145>
> 
> * #2789: Use a higher seed RTT for new paths
>   The proposal is to close with no action.
> 
> * #2744: Idle Timer Can Fire Even with Outstanding Data to Send
>   The proposal is <https://github.com/quicwg/base-drafts/pull/3266>
> 
> * #2602: Idle timeout needs more description and a recommendation
>   The proposal is <https://github.com/quicwg/base-drafts/pull/3099>
> 
> 
> --
> Mark Nottingham   https://www.mnot.net/
>