Re: ECN in QUIC

Christian Huitema <huitema@huitema.net> Thu, 25 January 2018 22:12 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26041129C6F for <quic@ietfa.amsl.com>; Thu, 25 Jan 2018 14:12:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UrG6ZCsUXhy2 for <quic@ietfa.amsl.com>; Thu, 25 Jan 2018 14:12:13 -0800 (PST)
Received: from mx43-out1.antispamcloud.com (mx43-out1.antispamcloud.com [138.201.61.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9ADFA12785F for <quic@ietf.org>; Thu, 25 Jan 2018 14:12:11 -0800 (PST)
Received: from xsmtp05.mail2web.com ([168.144.250.245]) by mx44.antispamcloud.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.89) (envelope-from <huitema@huitema.net>) id 1eepkM-0001Ix-It for quic@ietf.org; Thu, 25 Jan 2018 23:12:00 +0100
Received: from [10.5.2.14] (helo=xmail04.myhosting.com) by xsmtp05.mail2web.com with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <huitema@huitema.net>) id 1eepk8-0006Zu-2K for quic@ietf.org; Thu, 25 Jan 2018 17:11:40 -0500
Received: (qmail 19636 invoked from network); 25 Jan 2018 22:11:28 -0000
Received: from unknown (HELO [192.168.200.68]) (Authenticated-user:_huitema@huitema.net@[72.235.171.77]) (envelope-sender <huitema@huitema.net>) by xmail04.myhosting.com (qmail-ldap-1.03) with ESMTPA for <research@bobbriscoe.net>; 25 Jan 2018 22:11:27 -0000
To: "De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com>, "Lubashev, Igor" <ilubashe@akamai.com>, "Brian Trammell (IETF)" <ietf@trammell.ch>
References: <HE1PR0702MB3625F6E2C399F7E6F187C883C2E20@HE1PR0702MB3625.eurprd07.prod.outlook.com> <660743ab697443f4ac5500e649a80285@usma1ex-dag1mb5.msg.corp.akamai.com> <HE1PR0702MB3625648A6943055201D46DCEC2E20@HE1PR0702MB3625.eurprd07.prod.outlook.com> <26dd29d9-ce96-e858-078b-cc867990e8c5@huitema.net> <26b97168c48047018d1dfe6400a36b16@usma1ex-dag1mb5.msg.corp.akamai.com> <A4AE8394-0568-4C56-A4C3-02866E12DA8C@trammell.ch> <a05e899c3b7b45d38e6e4440e5196304@usma1ex-dag1mb5.msg.corp.akamai.com> <VI1PR0701MB212651DA603F0A147895161DB9E10@VI1PR0701MB2126.eurprd07.prod.outlook.com>
Cc: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>, QUIC WG <quic@ietf.org>, "Bob Briscoe (research@bobbriscoe.net)" <research@bobbriscoe.net>
From: Christian Huitema <huitema@huitema.net>
Message-ID: <3809b20a-a141-f6fc-64de-785593cd9bf1@huitema.net>
Date: Thu, 25 Jan 2018 12:11:25 -1000
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <VI1PR0701MB212651DA603F0A147895161DB9E10@VI1PR0701MB2126.eurprd07.prod.outlook.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Subject: Re: ECN in QUIC
X-Originating-IP: 168.144.250.245
X-AntiSpamCloud-Domain: xsmtpout.mail2web.com
X-AntiSpamCloud-Username: 168.144.250.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=168.144.250.0/24@xsmtpout.mail2web.com
X-AntiSpamCloud-Outgoing-Class: unsure
X-AntiSpamCloud-Outgoing-Evidence: Combined (0.26)
X-Recommended-Action: accept
X-Filter-ID: EX5BVjFpneJeBchSMxfU5tOw5WUfdgStRtio7EYuzuMXv9krsgRhBn0ayn6qsUc7A2kcKDr1fzRm ksYYe0sWHrgNzB/4Jkrw1eDLcif59fujfEwooQGsyHv+Ukxjc4utB98yDTitFWvbHwz9vKZpmxBf ggn8Frespz1KxArpwUzVo6xqsY8KGF50vY/LmgeTZsQEbaxxISMHgJxrdMdSS4B6hVJPXxgisa+g wkHvC+PVG1YjIrFRKhESMT/tU1Dx+IHaAZrg1ulFniksjLYqZxdG5bOwa1rOgT+89+/XFrGt2tce crpXRY6fm8RXptyzavERpop5LF7RavHozgbn9XzprFRbpFQTOcEGeQOY3IcDlgJpEbxunV7tCPNi PQvHQpVRoYcix47lJTuKsG8TgnDHFRDF834rtLc6Wv9Yj+vBPX9bzGJi0ycLbiOUDEySIK/1NH5T HMtlYvyHAYGOGheVSH7cGoIH3Vd41lbD31XsxRC3Cl5agFgis4e3pTrPrkOnOitmVlVGEmCCKMSX xNRF78A7vHpiSb+8Z8tEBsQHmFDqewO9xyOqCYO8P1aHuJ+q0VAdWduuFNAGSPDW/D0UF36LWvas gj4e2T8BuA1dHghQC//pO9KiygTP+bGFirtlAtdsrBTAcAoY5WeLmsibYT4C2qF2lnc18bVJn67/ u9fgYp7Ebu762M62YItjO3Oj1h9z38gFDN/+Ro0+DDwJWw42swm4bO6gacpMpzLdQBUMkAI/PGrN 0+wWmMSTvLpZVaBCgo9IFgw1OrNwYFjI1dRH6f16eQCtvwPkeoxzBkc1CTpvaEJjkrbHF6v+l1Fr MVSE/J/ewUnTj7YP55q9INbyRwqQyVkoHpS/jX2RVYKU9W9tbmVXJBqdHHDm8ZIH36IzEI956ubs TR4WHrFV5oTvAcwA4rM3FkfW8/2B3o0d/ygg1mkxyifBss2L
X-Report-Abuse-To: spam@quarantine5.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/0r628IUoDpEHfNVYvTM2PvTM2cc>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jan 2018 22:12:15 -0000

On 1/25/2018 12:10 AM, De Schepper, Koen (Nokia - BE/Antwerp) wrote:

> Some questions related to the remark of Christian: "We are heading towards a single packet sequence number space shared by multiple paths"
> What is the rationale behind this?
> Is the reason for this that there are currently no per path states/communications required? (because congestion control is currently out of scope, and it is currently the only per path processing required). In that case I understand why the current design of QUIC is optimizing itself towards application to application state, but we must make sure we don't make our live difficult if we have per connection state (when it is needed, like congestion control).

This is related to encryption options for multipath. I explained the
design choices in
https://datatracker.ietf.org/doc/draft-huitema-quic-mpath-req/. AEAD
encryption requires that sequence numbers do not repeat for a given
encryption context. For multipath, this requirement can be met by either
having separate encryption contexts per path, or having a single
encryption context for all paths and using the same sequence number
space for every paths. This is also a requirement when multiple paths
are used for connection migration.

We had that discussion in Melbourne, and the sense of the room was
clearly that having separate encryption contexts per paths was too
complicated. Having a single sequence number space and a single
encryption context is significantly simpler. There is a privacy issue,
linkability via the sequence numbers, but that privacy issue can be
addressed by encrypting the sequence numbers, and we pretty much agreed
to do that. Hence my statement that "We are heading towards a single
packet sequence number space shared by multiple paths".

Of course we still need to maintain per path variables for RTT, PMTU and
congestion control. As long as we only support migration, that could be
finessed somewhat by resetting these variables to their initial state at
the end of the migration. But when we do true multipath, there will be a
need to associate congestion control signals with paths. If we have a
single sequence number, the way to do that is to maintain associations
between packets and path, e.g. having a path tag in the packet copy kept
for retransmission purposes. That's sufficient for signals like ACK or
losses, but it requires that ECN signals be tied to specific packets.

-- Christian Huitema