RE: ECN in QUIC connection migration

Ingemar Johansson S <ingemar.s.johansson@ericsson.com> Mon, 12 February 2018 21:01 UTC

Return-Path: <ingemar.s.johansson@ericsson.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9DE64127077 for <quic@ietfa.amsl.com>; Mon, 12 Feb 2018 13:01:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.32
X-Spam-Level:
X-Spam-Status: No, score=-4.32 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com header.b=SCd94Ync; dkim=pass (1024-bit key) header.d=ericsson.com header.b=FODZoxL2
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Awk3vsZIz58 for <quic@ietfa.amsl.com>; Mon, 12 Feb 2018 13:01:54 -0800 (PST)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D6373126FDC for <quic@ietf.org>; Mon, 12 Feb 2018 13:01:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1518469312; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=sW5JJH0ARn481hHTr5ncgq6PvPYhdDGQ/9HfM9f3SOQ=; b=SCd94YncpkS8dJykIOW2t3Z/vcRHFu+L/J81EHyqNs1dQK9g3SZKvzt79ZuzQT78 9sh+0SGkGgh0uUY92EyCCki14mwNkJUo7bZarPciEl2fbz7LvrG+lcrXB2SqteLb 8n3ihN5i2BUAsSt6CB2Cw9BJ8+BX7BA2AIxeB0IzB4k=;
X-AuditID: c1b4fb3a-35fff700000067b4-09-5a8200bf7c66
Received: from ESESSHC024.ericsson.se (Unknown_Domain [153.88.183.90]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id 73.96.26548.FB0028A5; Mon, 12 Feb 2018 22:01:52 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (153.88.183.145) by oa.msg.ericsson.com (153.88.183.90) with Microsoft SMTP Server (TLS) id 14.3.352.0; Mon, 12 Feb 2018 22:01:51 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=sW5JJH0ARn481hHTr5ncgq6PvPYhdDGQ/9HfM9f3SOQ=; b=FODZoxL2UvmaycCt5tS1zkdN/Skqu5KuxoCHRRcJw9C4H46m/R5nKnIv/eYElGP6+p7noOJFnfAPjBCC0wHvg7Bux1Y2B1VTXRWTZGH3A/uvf18BMlyINPBrVIDzlKK6BuPgeo0I1WDH6HGds1G4tk1K0G40cswlGIZ7y8Stvzg=
Received: from HE1PR0702MB3625.eurprd07.prod.outlook.com (52.133.6.23) by HE1PR0702MB3756.eurprd07.prod.outlook.com (52.133.7.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.506.7; Mon, 12 Feb 2018 21:01:49 +0000
Received: from HE1PR0702MB3625.eurprd07.prod.outlook.com ([fe80::38e6:dea0:2f4f:715]) by HE1PR0702MB3625.eurprd07.prod.outlook.com ([fe80::38e6:dea0:2f4f:715%13]) with mapi id 15.20.0506.013; Mon, 12 Feb 2018 21:01:49 +0000
From: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
To: Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>
CC: "ekinnear@apple.com" <ekinnear@apple.com>, QUIC WG <quic@ietf.org>, Ian Swett <ianswett@google.com>, Christian Huitema <huitema@huitema.net>, "De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com>, "Lubashev, Igor" <ilubashe@akamai.com>
Subject: RE: ECN in QUIC connection migration
Thread-Topic: ECN in QUIC connection migration
Thread-Index: AdObSzPyOy5d4GB2SeSGz4shYev25AAZWcAAAB/s3/ABUaWKkACnvEWAAACMq4AAAA2PAAAAZOKAAAoPNJA=
Date: Mon, 12 Feb 2018 21:01:49 +0000
Message-ID: <HE1PR0702MB36256C450721C7D223550AC1C2F70@HE1PR0702MB3625.eurprd07.prod.outlook.com>
References: <HE1PR0702MB36252D61A7A51B848B5DA9E7C2FA0@HE1PR0702MB3625.eurprd07.prod.outlook.com> <639A6936-34F2-4C27-973A-EEAE878677FA@apple.com> <VI1PR0701MB2126E79A17DB715F6C91EA05B9F90@VI1PR0701MB2126.eurprd07.prod.outlook.com> <HE1PR0702MB36256D92C008302CBD908DE9C2F20@HE1PR0702MB3625.eurprd07.prod.outlook.com> <EFA61DBC-1F6F-49C2-906C-D0054F2341C7@tik.ee.ethz.ch> <CAN1APdcLO8HsT5cbbzHSvYBbBzz=3pfXLqm_2gLhZN-TiWVCbw@mail.gmail.com> <79E89348-6C18-42A7-B378-487E84E7FF31@tik.ee.ethz.ch> <CAN1APdcCWhz3nZ9M-TLqCV7oJ0oT_nSHDOuq2cD5txoguRAXZA@mail.gmail.com>
In-Reply-To: <CAN1APdcCWhz3nZ9M-TLqCV7oJ0oT_nSHDOuq2cD5txoguRAXZA@mail.gmail.com>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [83.226.2.151]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; HE1PR0702MB3756; 7:blLjCrAE2/nhxOrRz8ZB/tNzPfpzt4iqTf9FT3x43cz7CZo1otyLuX0PRbkeeC/JAlyyl0t3UJ2IerKeaa/N1u9IekFl0OBXeOencMWZeo3c0JflIY5/6FEpMK7olqXw8j5jgcf5i/VTFpnIFnj0XrTrzwrHPX/G8YOfIpY0TuZD3X8NLu37+0iREf2Z31wc0K5rNMghJ58rjlsuDa2WNqnudi85E9K7R7oydtx+OakjSHVtrgqS+yBEGU24Ghn9
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: d4dbb949-1031-428b-35f8-08d5725bd5de
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603307)(7153060)(7193020); SRVR:HE1PR0702MB3756;
x-ms-traffictypediagnostic: HE1PR0702MB3756:
x-microsoft-antispam-prvs: <HE1PR0702MB3756FC59541ACBA0DF7E7717C2F70@HE1PR0702MB3756.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(37575265505322)(28532068793085)(158342451672863)(166708455590820)(192374486261705)(101472597685257)(85827821059158)(211936372134217)(202460600054446)(153496737603132);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(8121501046)(5005006)(3002001)(93006095)(93001095)(3231101)(944501161)(10201501046)(6041288)(20161123558120)(20161123564045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(6072148)(201708071742011); SRVR:HE1PR0702MB3756; BCL:0; PCL:0; RULEID:; SRVR:HE1PR0702MB3756;
x-forefront-prvs: 0581B5AB35
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(39380400002)(346002)(366004)(376002)(396003)(51914003)(199004)(189003)(53936002)(102836004)(2906002)(6436002)(106356001)(7736002)(105586002)(33656002)(186003)(68736007)(54906003)(6246003)(478600001)(99286004)(110136005)(229853002)(74316002)(9686003)(25786009)(4326008)(53386004)(8666007)(316002)(55016002)(236005)(6346003)(1680700002)(54896002)(26005)(6306002)(9326002)(93886005)(5250100002)(6506007)(3660700001)(76176011)(7696005)(8936002)(2900100001)(8676002)(53546011)(966005)(81156014)(81166006)(97736004)(2950100002)(19609705001)(5660300001)(3280700002)(790700001)(66066001)(3846002)(86362001)(6116002)(606006)(14454004)(59450400001)(39060400002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR0702MB3756; H:HE1PR0702MB3625.eurprd07.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ingemar.s.johansson@ericsson.com;
x-microsoft-antispam-message-info: gnQlWzJML9Y2oNYZ4KFBCe8QP0sFUlP+Oa2PFcuNZAIXB99YIOykiFgoVmolEzhLVv5+zcUOmr+3xo5T7NQcaQ==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_HE1PR0702MB36256C450721C7D223550AC1C2F70HE1PR0702MB3625_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: d4dbb949-1031-428b-35f8-08d5725bd5de
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Feb 2018 21:01:49.7243 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0702MB3756
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02Sa0hTYRjHe885OzsuB69L8cGScmGY5SxLOISE3Wh+EAwKZUK69KTiZbJj klq0Zn3ImWiad2t4oTTENDWdYrp5SS26QhGpZJYX7KaVurJyngV++/3/z/95n+eBlyFlkyI3 Ji4phdMmqRPktIQqCbuv8ulep1ftMs2L2OxvR9n8i2Vidmm0XcTqdbdJtv9nDcFWLXSR7N07 BRSbbVwfyCjze42ksmVwkVa2l46IlcamM8o3xUOUsrp6iVDqf1bSyv6vP+gQRiUJiOYS4lI5 re/+SEns8uMuOtlcT5xtLNAhHXpaQ2QhBwbwXugeeEFnIQkjwxYEU2NXCUE8RPB5/N6qoPAc ASZDlz1WSIB1YJASxAcEVR1FpO0xGgdArXkB2QrOOB+BYe6G2CZInEfArHWOsqU2YB9o0Q+v djhjBUxnXxIJfAr+mq6s+hT2hLe5VSs+w0hxJDRZSGHaAwr6DJm0zXfAx2CsxNEWR9gdxhZG V58nsSu8mbhpvw5DdecTUmAXmH7/RyTwFhi5ZrSzOzy/aUACtxLwujtUYAW05H2y+8Fg/pIr su0AeAhBoW7G3rwTai0W+zAN5IwWUULoGYL2zAkkiHwSpq6/tKc2wej3y/bCKxru1vXRuUhR umZ1gTVQUdEptrEUO8FgyQRVunI1ibdDg8lXiHhAgeGdWGAvuFxeIV7rG5G4DrnwHM8nxvj5 KThtXBTPa5IUSVxKE1r5fj3Nv/a1oZ7JA2aEGSR3lM4uX1TJROpUPi3RjIAh5c7S35krljRa nZbOaTUR2jMJHG9GGxlK7io9eJpVyXCMOoWL57hkTvu/SjAObjq040vvsfYLJ2+F4qBG7Y1D ORFBHx+BxSM+Id25sbUp4ITToiVw3Ep4up2bCOfKhv15/xHv+mK/jOeLuVvveZU28JWhrXkO er3VSTLv6hJWkNe9OWu+MeqIrCOyR0Kmnk9jcMYBd27PvGUpOPzl8ZCp5sMWTd+MS3ny/rZt /hnDcoqPVe/2JrW8+h/SjwzuegMAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/1g7KiFVZR8qP2ouTAYKWWkaLDlQ>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Feb 2018 21:01:57 -0000

Hi

I would say that the worries about endpoints cheating about ECN marks congestion are real old, they have at least been there since I began working with this more than 10 years ago.
But you don’t really need ECN to cheat. From a server perspective you can implement a TCP congestion control module in Linux that just locks CWND to 1500 segments or whatever and you’re done. In a TCP receiver I guess you can generate bogus DSACKs to make the congestion window roll back after a fast retransmit or ?
Problem with this is of course that you cannot completely rule out that you spoil your own bottleneck in the process, so the outcome may well be that you are more likelky to cause more harm to yourself than to others, especially with today’s traffic patterns that is a mix of short and long lived flows.

An interesting side note is that people like Bob Briscoe (and Mirja) spend quite an effort to devise ConEx (RFC6789) as an answer to all these cheating problems, it never gained traction though, at least not so far. But I liked the idea and still like it.

BR
/Ingemar


From: Mikkel Fahnøe Jørgensen [mailto:mikkelfj@gmail.com]
Sent: den 12 februari 2018 16:55
To: Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>
Cc: ekinnear@apple.com; QUIC WG <quic@ietf.org>; Ian Swett <ianswett@google.com>; Ingemar Johansson S <ingemar.s.johansson@ericsson.com>; Christian Huitema <huitema@huitema.net>; De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com>; Lubashev, Igor <ilubashe@akamai.com>
Subject: Re: ECN in QUIC connection migration

I don’t know enough about ECN to have a qualified opinion, but I mean that, for example, someone on the path might make a false impression of the available bandwidth. It may be a general ECN discussion but I’d like to know how it affects security of QUIC if made mandatory, just like there are other sections in QUIC transport on potential attacks to be aware of.

http://web.cs.ucla.edu/~todd/research/sigcomm11.pdf
http://ieeexplore.ieee.org/document/6993126/


Kind Regards,
Mikkel Fahnøe Jørgensen


On 12 February 2018 at 16.43.43, Mirja Kühlewind (mirja.kuehlewind@tik.ee.ethz.ch<mailto:mirja.kuehlewind@tik.ee.ethz.ch>) wrote:
What do you mean by abuse scenarios? However, I would guess again that this is not a quic specific discussion and should probably rather happen in tsvwg which is the group that is maintain ECN in general.

Mirja


> Am 12.02.2018 um 16:42 schrieb Mikkel Fahnøe Jørgensen <mikkelfj@gmail.com<mailto:mikkelfj@gmail.com>>:
>
> I haven’t followed the ECN discussion very closely, but I miss a discussion of possible abuse scenarios and how to avoid them.
>
> On 12 February 2018 at 16.26.32, Mirja Kühlewind (mirja.kuehlewind@tik.ee.ethz.ch<mailto:mirja.kuehlewind@tik.ee.ethz.ch>) wrote:
>
>> Hi Ingemar,
>>
>> two points.
>>
>> I think it would be good to be as explicit as possible here, therefore I would prefer if an endpoint that knows that it can not access the ECN IP bits indicates this directly in the handshake. In this case no further testing is needed.
>>
>> Further, the path testing itself is independent of QUIC and can be used for any protocol. Moreover, it’s more complicated than just testing ECT. I guess the general advice here is to remember which codepoints were send and compare this to the feedback provided. If discrepancies are observed that indicate that a middlebox has changed these bits, all packets should be marked as no-ECT (while additional testing MAY be performed at any later point in time). However, how exactly this testing should look like, should not be specified in this doc (but more generally).
>>
>> Mirja
>>
>>
>> > Am 09.02.2018 um 08:34 schrieb Ingemar Johansson S <ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>>:
>> >
>> > Hi Eric, Koen + others
>> >
>> > Thanks for the comments and the update. A question to the rest of the audience, does the presented text explain sufficiently enough how ECN works with connection migration ?
>> > https://github.com/quicwg/base-drafts/wiki/ECN-in-QUIC#transport-draft-connection-migration
>> >
>> >
>> > /Ingemar
>> >
>> >
>> > From: De Schepper, Koen (Nokia - BE/Antwerp) [mailto:koen.de_schepper@nokia-bell-labs.com<mailto:koen.de_schepper@nokia-bell-labs.com>]
>> > Sent: den 2 februari 2018 15:44
>> > To: ekinnear@apple.com<mailto:ekinnear@apple.com>; Ingemar Johansson S <ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>>
>> > Cc: QUIC WG <quic@ietf.org<mailto:quic@ietf.org>>; Ian Swett <ianswett@google.com<mailto:ianswett@google.com>>; Lubashev, Igor <ilubashe@akamai.com<mailto:ilubashe@akamai.com>>; Christian Huitema <huitema@huitema.net<mailto:huitema@huitema.net>>
>> > Subject: RE: ECN in QUIC connection migration
>> >
>> > Hi Ingemar,
>> >
>> > I also read again through the document, and had following comments:
>> >
>> > I replaced:
>> > “The ACK_ECN frame is used to convey ACKs when the ECN capability exchange concludes that ECN should be used for the given connection.”
>> > Originally it sounds as if the counters are not echoed anymore if the ECN capability check fails. I assume this was not the intention, but if it is: First, we don’t have a protocol or decision point defined when that condition is met (sender should let the receiver know in the next packet), and second, I would always send the echo, as we might “try again later (with another ECT?)”, or might decide to use the ECN bits differently later.
>> >
>> > I also changed the text around the connection migration, I think before Eric reviewed it. I made it such that every new path creates a new connection state with an initialized congestion control state and ECN counters (at least ECN counters reset to 0s). Not sure if this matches with the other sections in the QUIC draft.
>> >
>> > I also had the thought whether it was really needed to have the 2 cases. I agree we should simplify, by just starting over and doing the check unconditionally whether it was successful or not in a previous path.
>> >
>> > Regards,
>> > Koen.
>> >
>> > From: ekinnear@apple.com<mailto:ekinnear@apple.com> [mailto:ekinnear@apple.com<mailto:ekinnear@apple.com>]
>> > Sent: Friday, February 2, 2018 12:02 AM
>> > To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>>
>> > Cc: QUIC WG <quic@ietf.org<mailto:quic@ietf.org>>; Ian Swett <ianswett@google.com<mailto:ianswett@google.com>>; Lubashev, Igor <ilubashe@akamai.com<mailto:ilubashe@akamai.com>>; Christian Huitema <huitema@huitema.net<mailto:huitema@huitema.net>>; De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com<mailto:koen.de_schepper@nokia-bell-labs.com>>
>> > Subject: Re: ECN in QUIC connection migration
>> >
>> > Hi Ingemar,
>> >
>> > This generally looks good to me!
>> > A few questions and observations:
>> >
>> > There are two unique cases:
>> >
>> > • ECN capability check successful at initial connection setup
>> > • ECN capability check failed at initial connection setup
>> >
>> > Are these actually any different in terms of action taken by an endpoint?
>> > It seems like on the new network path the endpoint would go through the same process of: (a) verify ECN capability and if successful to whatever degree then (b) run the rest of the ECN machinery as appropriate.
>> >
>> > In other words, as long as you allow people to start using ECN upon migration (in other words, to allow starting it after the initial connection establishment), then the specifics for ECN with migration is essentially one statement, which is “do the ECN process on each new network path that you use”.
>> >
>> > Connection migration has impact on the number of reported CE marked packets. A new connection state with new congestion control state and ECN counters is instantiated at the sender and receiver. The ECN counters MUST start from zero again.
>> >
>> > This seems fine to me, it’s inline with the rest of the congestion control/loss recovery state that also needs to be reset for the new path.
>> >
>> > Given that each migration requires at least one exchange of packets at the beginning (at the very least for address validation from the side of the endpoint that didn’t migrate), it seems like that’s an excellent moment to mark the packets and perform the ECN capability detection. Those packets are also likely padded, etc. similar to initial packets since they’re on a previously unused network path.
>> >
>> > I think the current proposed requirement of just using the “first” packets and marking those is sufficient (and good to avoid any requirement as to which frames are contained in those packets), since we are always exchanging packets in both directions immediately after migration.
>> >
>> > This has the added benefit such that any endpoint “probing” possible network paths could include the bits necessary to detect ECN capability on the path being probed, so it could even know before migrating whether or not it would be able to use ECN on that new path.
>> >
>> > Thanks,
>> > Eric
>> >
>> >
>> >
>> >
>> > On Feb 1, 2018, at 3:07 AM, Ingemar Johansson S <ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>> wrote:
>> >
>> > Hi
>> > I have written up different aspects of connection migration and how it plays with ECN.
>> > https://github.com/quicwg/base-drafts/wiki/ECN-in-QUIC#transport-draft-connection-migration
>> >
>> > A caveat.. I am a bit unsure about the definition of connection migration . My interpretation is that a client moves to a new IP address due to e.g. a NAT rebind or switch from WiFi to cellular, right ?. Is a new connection instantiated at a connection migration ?
>> >
>> > /Ingemar
>> >
>> > ==================================
>> > Ingemar Johansson M.Sc.
>> > Master Researcher
>> >
>> > Ericsson Research
>> > Network Protocols & E2E Performance
>> > Labratoriegränd 11
>> > 971 28, Luleå, Sweden
>> > Phone +46-1071 43042
>> > SMS/MMS +46-73 078 3289
>> > ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>
>> > www.ericsson.com<http://www.ericsson.com>
>> >
>> > You can't start a fire
>> > Worrying 'bout your little world falling apart
>> > Bruce Springsteen
>> > ==================================