RE: ECN in QUIC connection migration

"De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com> Fri, 02 February 2018 14:44 UTC

Return-Path: <koen.de_schepper@nokia-bell-labs.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42EB912D87A for <quic@ietfa.amsl.com>; Fri, 2 Feb 2018 06:44:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lEGNHUqxy0UU for <quic@ietfa.amsl.com>; Fri, 2 Feb 2018 06:44:27 -0800 (PST)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50097.outbound.protection.outlook.com [40.107.5.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEAFD12D84F for <quic@ietf.org>; Fri, 2 Feb 2018 06:44:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector2-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=zjHqvG1RbMzvTFmpZwY+cCTDHR8NvhC9We24bSaqY4A=; b=PM0VjpJCBe8T5cyrsZFvDxkzu5F6DGlAR+oML1Y+32PHRNvG3vOYojPBzXIfy+gtM/jl9CLQjMvRzzw2TEwrkKUL/FLk4LfNdGu/UdKmp2r+447+Q2NPcwz0QG4A8t2F36yHfvHZCS/GeTAqr2VCDFExafNh27O/zbO9SrlQs7k=
Received: from VI1PR0701MB2126.eurprd07.prod.outlook.com (10.169.137.7) by VI1PR0701MB2944.eurprd07.prod.outlook.com (10.173.72.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.464.6; Fri, 2 Feb 2018 14:44:24 +0000
Received: from VI1PR0701MB2126.eurprd07.prod.outlook.com ([fe80::a16e:3b1a:be89:10fa]) by VI1PR0701MB2126.eurprd07.prod.outlook.com ([fe80::a16e:3b1a:be89:10fa%15]) with mapi id 15.20.0464.008; Fri, 2 Feb 2018 14:44:24 +0000
From: "De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com>
To: "ekinnear@apple.com" <ekinnear@apple.com>, Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
CC: QUIC WG <quic@ietf.org>, Ian Swett <ianswett@google.com>, "Lubashev, Igor" <ilubashe@akamai.com>, Christian Huitema <huitema@huitema.net>
Subject: RE: ECN in QUIC connection migration
Thread-Topic: ECN in QUIC connection migration
Thread-Index: AdObSzPyOy5d4GB2SeSGz4shYev25AAZWcAAAB/s3/A=
Date: Fri, 02 Feb 2018 14:44:24 +0000
Message-ID: <VI1PR0701MB2126E79A17DB715F6C91EA05B9F90@VI1PR0701MB2126.eurprd07.prod.outlook.com>
References: <HE1PR0702MB36252D61A7A51B848B5DA9E7C2FA0@HE1PR0702MB3625.eurprd07.prod.outlook.com> <639A6936-34F2-4C27-973A-EEAE878677FA@apple.com>
In-Reply-To: <639A6936-34F2-4C27-973A-EEAE878677FA@apple.com>
Accept-Language: nl-BE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=koen.de_schepper@nokia-bell-labs.com;
x-originating-ip: [213.49.86.189]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0701MB2944; 7:A2XDjstxbMC+Taw5c+8odOJGU4u8fGfjiHtZw4va44LbSjzcL1jK1ALJtJsW1HO/oZXa376qJSLtNMM08I7pvcBREqyl79ihZaQ0jxOaGGHYeQiqZpslzS8Pe+uHhOyIOxb0j/mSZBcBbrv64qTOa/lbJjPHZfF8sXhwld3StW9AcFs5kQwDYYYyZt1Var5qoSoWhuYuBWgL81+F39eoQmQIW3mqN491IZixYEzzlHhbtGSKJvukrP7dZmnRrOGR
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 8eff7e94-a552-423b-c441-08d56a4b73f2
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(4534165)(4627221)(201703031133081)(201702281549075)(48565401081)(5600026)(4604075)(3008032)(2017052603307)(7193020); SRVR:VI1PR0701MB2944;
x-ms-traffictypediagnostic: VI1PR0701MB2944:
x-microsoft-antispam-prvs: <VI1PR0701MB29442EB50A878E1AAFAAE2E3B9F90@VI1PR0701MB2944.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(37575265505322)(28532068793085)(166708455590820)(211936372134217)(202460600054446)(153496737603132)(21748063052155)(31960201722614);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(8121501046)(5005006)(10201501046)(3002001)(3231101)(11241501184)(2400082)(944501161)(93006095)(93001095)(6055026)(6041288)(20161123558120)(20161123562045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(6072148)(201708071742011); SRVR:VI1PR0701MB2944; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0701MB2944;
x-forefront-prvs: 05715BE7FD
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(346002)(39380400002)(39860400002)(376002)(396003)(199004)(189003)(229853002)(6306002)(25786009)(966005)(4326008)(7696005)(478600001)(14454004)(66066001)(2906002)(6246003)(53936002)(97736004)(110136005)(2900100001)(86362001)(19609705001)(99286004)(68736007)(54906003)(2501003)(5250100002)(186003)(105586002)(3660700001)(76176011)(6506007)(5660300001)(3280700002)(6116002)(790700001)(2950100002)(9326002)(3846002)(102836004)(106356001)(59450400001)(606006)(8936002)(33656002)(53546011)(74316002)(6436002)(8666007)(55016002)(236005)(9686003)(81156014)(81166006)(7736002)(26005)(8676002)(54896002)(316002)(90052001); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR0701MB2944; H:VI1PR0701MB2126.eurprd07.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:0; MX:1; LANG:en;
received-spf: None (protection.outlook.com: nokia-bell-labs.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: DgUbgblz9XmVDcwSdp3/kXnRTN8fjrF93aAWHof8xUI+hOASMLe9/zevGwbXwU0pmkKdCBEf5cKDq5B3KzRDQA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0701MB2126E79A17DB715F6C91EA05B9F90VI1PR0701MB2126_"
MIME-Version: 1.0
X-OriginatorOrg: nokia-bell-labs.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8eff7e94-a552-423b-c441-08d56a4b73f2
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Feb 2018 14:44:24.2393 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2944
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/QhRxroq3mxzds2a3K605P0vcxNU>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Feb 2018 14:44:30 -0000

Hi Ingemar,

I also read again through the document, and had following comments:

I replaced:
“The ACK_ECN frame is used to convey ACKs when the ECN capability exchange concludes that ECN should be used for the given connection.”
Originally it sounds as if the counters are not echoed anymore if the ECN capability check fails. I assume this was not the intention, but if it is: First, we don’t have a protocol or decision point defined when that condition is met (sender should let the receiver know in the next packet), and second, I would always send the echo, as we might “try again later (with another ECT?)”, or might decide to use the ECN bits differently later.

I also changed the text around the connection migration, I think before Eric reviewed it. I made it such that every new path creates a new connection state with an initialized congestion control state and ECN counters (at least ECN counters reset to 0s). Not sure if this matches with the other sections in the QUIC draft.

I also had the thought whether it was really needed to have the 2 cases. I agree we should simplify, by just starting over and doing the check unconditionally whether it was successful or not in a previous path.

Regards,
Koen.

From: ekinnear@apple.com [mailto:ekinnear@apple.com]
Sent: Friday, February 2, 2018 12:02 AM
To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
Cc: QUIC WG <quic@ietf.org>; Ian Swett <ianswett@google.com>; Lubashev, Igor <ilubashe@akamai.com>; Christian Huitema <huitema@huitema.net>; De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com>
Subject: Re: ECN in QUIC connection migration

Hi Ingemar,

This generally looks good to me!
A few questions and observations:

There are two unique cases:
                • ECN capability check successful at initial connection setup
                • ECN capability check failed at initial connection setup

Are these actually any different in terms of action taken by an endpoint?
It seems like on the new network path the endpoint would go through the same process of: (a) verify ECN capability and if successful to whatever degree then (b) run the rest of the ECN machinery as appropriate.

In other words, as long as you allow people to start using ECN upon migration (in other words, to allow starting it after the initial connection establishment), then the specifics for ECN with migration is essentially one statement, which is “do the ECN process on each new network path that you use”.

Connection migration has impact on the number of reported CE marked packets. A new connection state with new congestion control state and ECN counters is instantiated at the sender and receiver. The ECN counters MUST start from zero again.

This seems fine to me, it’s inline with the rest of the congestion control/loss recovery state that also needs to be reset for the new path.

Given that each migration requires at least one exchange of packets at the beginning (at the very least for address validation from the side of the endpoint that didn’t migrate), it seems like that’s an excellent moment to mark the packets and perform the ECN capability detection. Those packets are also likely padded, etc. similar to initial packets since they’re on a previously unused network path.

I think the current proposed requirement of just using the “first” packets and marking those is sufficient (and good to avoid any requirement as to which frames are contained in those packets), since we are always exchanging packets in both directions immediately after migration.

This has the added benefit such that any endpoint “probing” possible network paths could include the bits necessary to detect ECN capability on the path being probed, so it could even know before migrating whether or not it would be able to use ECN on that new path.

Thanks,
Eric




On Feb 1, 2018, at 3:07 AM, Ingemar Johansson S <ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>> wrote:

Hi
I have written up different aspects of connection migration and how it plays with ECN.
https://github.com/quicwg/base-drafts/wiki/ECN-in-QUIC#transport-draft-connection-migration

A caveat.. I am a bit unsure about the definition of connection migration . My interpretation is that a client moves to a new IP address due to e.g. a NAT rebind or switch from WiFi to cellular, right ?. Is a new connection instantiated at a connection migration ?

/Ingemar

==================================
Ingemar Johansson  M.Sc.
Master Researcher

Ericsson Research
Network Protocols & E2E Performance
Labratoriegränd 11
971 28, Luleå, Sweden
Phone +46-1071 43042
SMS/MMS +46-73 078 3289
ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>
www.ericsson.com<x-msg://316/www.ericsson.com>

                 You can't start a fire
  Worrying 'bout your little world falling apart
               Bruce Springsteen
==================================