Re: Consensus Calls for Late Stage Documents

Jana Iyengar <jri.ietf@gmail.com> Wed, 15 January 2020 22:43 UTC

Return-Path: <jri.ietf@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E289C1208DE for <quic@ietfa.amsl.com>; Wed, 15 Jan 2020 14:43:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fnOep0vgyGCq for <quic@ietfa.amsl.com>; Wed, 15 Jan 2020 14:43:10 -0800 (PST)
Received: from mail-lf1-x133.google.com (mail-lf1-x133.google.com [IPv6:2a00:1450:4864:20::133]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C6F1F120639 for <quic@ietf.org>; Wed, 15 Jan 2020 14:43:09 -0800 (PST)
Received: by mail-lf1-x133.google.com with SMTP id y1so14011077lfb.6 for <quic@ietf.org>; Wed, 15 Jan 2020 14:43:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=rH4W9O/8jzGLqDSyUAMx3mAmrxxO6/Kw7zgPsMKde9U=; b=GEwWxnZgwZW0rX/5BFcB7CWPz+U9l90h8wcRFWC8jgYjAiZNdl9CLCncwm6CiqV6ZX 0RpwHq2+4ISkCky0BakSlphfsqX5Sc/j05+ZXrGCDxO8H2Jfq2sN/BBvlfpR7h/IOyiV 0RVhzmAkGOKpxbk7k4uyhj3fb2uq+fA1rURJ2DBuxclCPzThZ8R1OjvvT985IO6bftsH PPtxfjfxv5ImVJe3VL6i6jXgUw+souLrURxDfXz/qonBFxcbp2jKy9SRjaNBTbKlssna RnsEDddX6AUn++WfbqT5Kb0Lr1zSd7Lna6/Ze4cEXGXoKDvATaKTnDb5L/wVqMfzhPLV SBoA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=rH4W9O/8jzGLqDSyUAMx3mAmrxxO6/Kw7zgPsMKde9U=; b=OIFDo9Evd4QTjPhSO+yM8nbVrzepv/iwP2MOxhSo1NRjccDniACApc31VQQwsf+p5H 6nyyAWMtScdekFoowbHNP9a+mR4xJWPAbDHKUX1B68RIN6WK9f3tx2Q4DpuXSVfaZkNu X9fu+KxayXTlQbgao3ev5bjGGRskPgyqGdQPOY5tBbT4PXnfJZCez+KVAD2Rttkyjk8o 7cd1nhWL1PVT/HblZEHP7HjrtaefR4CrrAbd69Ou63Tle0POqrC00oi2OIGGlRiVRtig MWnfqc5ABHXTfQUowQUiIlmhAOI9viQEb1ToPTbuFKGF1mTOYV6vjGD1kcDpGUw6iAAJ bGGw==
X-Gm-Message-State: APjAAAW5UZJsjiBtDjNLnxETyVoiwuvgG7kRLDAb48RV0F5c9fqog1xR 6JvWJbr8eL8VWojPTX9LXJ5APhbnRBnVBPvVMr0=
X-Google-Smtp-Source: APXvYqyhN14bo8TzLowcknalqxqPkl5cim23lh8rTbPHcqHW6E7mXtpd/yS7fxjv6y67DfQPGfyMsVzvRX9W4rpAntc=
X-Received: by 2002:a19:850a:: with SMTP id h10mr631554lfd.89.1579128188034; Wed, 15 Jan 2020 14:43:08 -0800 (PST)
MIME-Version: 1.0
References: <43D8DACA-C1C4-449A-A4BC-4F0E6F8F1CAB@mnot.net> <247B1759-7D5C-436D-B6C5-BC2AF2479366@apple.com> <CACpbDccumYO5jmhFbq-MiFtw-zmHn2TpLP+hdeUSskdn5UmDcw@mail.gmail.com> <02B7142E-B5EF-418F-9F52-0105FD770755@apple.com>
In-Reply-To: <02B7142E-B5EF-418F-9F52-0105FD770755@apple.com>
From: Jana Iyengar <jri.ietf@gmail.com>
Date: Wed, 15 Jan 2020 14:42:56 -0800
Message-ID: <CACpbDccADNWdBdPSVkVNLwEWJ8g6ZuD8AHzP_doqA96CZgdRwA@mail.gmail.com>
Subject: Re: Consensus Calls for Late Stage Documents
To: Tommy Pauly <tpauly@apple.com>
Cc: Vidhi Goel <vidhi_goel=40apple.com@dmarc.ietf.org>, Mark Nottingham <mnot@mnot.net>, IETF QUIC WG <quic@ietf.org>, Eric Kinnear <ekinnear@apple.com>, Rui Cunha Paulo <rpaulo@apple.com>, Lars Eggert <lars@eggert.org>, Christoph Paasch <cpaasch@apple.com>
Content-Type: multipart/alternative; boundary="000000000000b3e3aa059c356e8b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/kCR6fwJUeTwjrZmhOJwVdOsY7Hk>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jan 2020 22:43:14 -0000

Tommy,

The draft currently says that senders SHOULD pace, and PR 3351 gets into
more detailed guidance for a sender that does not follow our
recommendation. I have questions about the specific guidance in that PR,
but more to the point here, the wg was clear in Singapore that we should
not do more pseudo-code for cases we don't recommend. Description of more
mechanism for cases that are not recommended falls in a similar category.

PR 3232 is meant to be a safety mechanism to protect a network from a
sender that does not follow our recommendation to pace. I'm not opposed to
making such a sender performant, but it seems to me that we do not need to
get into this in the spec.

Perhaps it might help if we added a note about how a non-paced sender might
encounter performance issues?

- jana

On Wed, Jan 15, 2020 at 2:26 PM Tommy Pauly <tpauly@apple.com> wrote:

>
>
> On Jan 15, 2020, at 2:16 PM, Jana Iyengar <jri.ietf@gmail.com> wrote:
>
> Vidhi,
>
> The current draft already recommends use of a pacer, and your PR 3351
> suggests a mechanism that an endpoint can use for doing it. That still
> doesn't obviate the earlier need to specify a requirement for endpoints
> that do not implement any pacing.
>
> Basically, codifying an example pacer does not change the premise of PR
> 3232 - that implementations might choose to not pace.
>
> Said differently, even if we were to specify one way of pacing, as PR 3351
> does, PR 3232 still applies. I don't think we need to hold off on PR 3232
> based on PR 3351.
>
>
> We can discuss more on the issues/PRs, but one quick note on why we'd like
> to hold off on merging anything just yet:
>
> In our testing, the specific solution described in #3232 can actually
> cause some issues with underutilizing the link that are undesirable. Beyond
> that, it still leaves edge cases open in which burst can still occur, which
> is the problem originally described in #3094. The new PR is describing
> another approach to solve #3094.
>
> The main spirit of the new PR is noting that the main problem with
> non-pacing implementations being too bursty is that the burst limit
> specified in the pacing section today gives a byte limit, but no time
> limit. It should be sufficient to specify some bounds on the delay between
> bursts to solve the problem described in #3094, without locking
> implementations into a specific congestion-control relationship with the
> number of ack packets (not just acked bytes as it is today).
>
> Best,
> Tommy
>
>
> - jana
>
> On Wed, Jan 15, 2020 at 1:47 PM Vidhi Goel <vidhi_goel=
> 40apple.com@dmarc.ietf.org> wrote:
>
>> Hi Mark,
>>
>> * #3094: congestion window increase on every ACKed packet could result in
>> bursty sends
>>   The proposal is <https://github.com/quicwg/base-drafts/pull/3232>
>>
>>
>> We would like to hold off on this change as we are working on specifying
>> Pacing mechanism which would allow the implementations to decouple
>> congestion window increase from sending rate and thus eliminate the need
>> for 2MSS limit during slow start.
>> Below is the PR:
>> https://github.com/quicwg/base-drafts/pull/3351
>>
>> I will create a issue to start the discussion.
>>
>> Thanks,
>> Vidhi
>>
>> On Jan 5, 2020, at 7:56 PM, Mark Nottingham <mnot@mnot.net> wrote:
>>
>> Happy New Year, Working Group.
>>
>> The following issues have proposals for resolution, and discussion so far
>> seems to support consensus to accept them. If you object, please do so on
>> the issue or in response to this message (changing the Subject
>> appropriately!). Absent any pushback, we'll direct the editors to
>> incorporate them late next week.
>>
>> See <https://github.com/quicwg/base-drafts/projects/5> for the current
>> state of issues in the Late Stage process, itself defined at <
>> https://github.com/quicwg/base-drafts/blob/master/CONTRIBUTING.md>.
>>
>> * #3274: Encrypting Retry token
>>   The proposal is <https://github.com/quicwg/base-drafts/issues/3274>
>>
>> * #3247: I am concerned the congestion control text is too permissive.
>>   The proposal is <https://github.com/quicwg/base-drafts/pull/3248>
>>
>> * #3245: Make RFC 6928 normative
>>   The proposal is <https://github.com/quicwg/base-drafts/pull/3287>
>>
>> * #3244: Can we make a normative ref to  RFC8085?
>>   The proposal is <https://github.com/quicwg/base-drafts/pull/3248>
>>
>> * #3243: Add caution when using IW10 and fragmentation
>>   The proposal is <https://github.com/quicwg/base-drafts/pull/3280>
>>
>> * #3152: Client storage of tokens should be independent of other stored
>> state
>>   The proposal is <https://github.com/quicwg/base-drafts/pull/3150>
>>
>> * #3142: It is unspecified how a server sends Handshake packets during /
>> after migration
>>   The proposal is <https://github.com/quicwg/base-drafts/pull/3145>
>>
>> * #3094: congestion window increase on every ACKed packet could result in
>> bursty sends
>>   The proposal is <https://github.com/quicwg/base-drafts/pull/3232>
>>
>> * #3014: Handling of corrupt Retry packets
>>   The proposal is <https://github.com/quicwg/base-drafts/issues/3274>
>>
>> * #2863: unrecoverable loss pattern leads to deadlock
>>   The proposal is <https://github.com/quicwg/base-drafts/pull/3145>
>>
>> * #2789: Use a higher seed RTT for new paths
>>   The proposal is to close with no action.
>>
>> * #2744: Idle Timer Can Fire Even with Outstanding Data to Send
>>   The proposal is <https://github.com/quicwg/base-drafts/pull/3266>
>>
>> * #2602: Idle timeout needs more description and a recommendation
>>   The proposal is <https://github.com/quicwg/base-drafts/pull/3099>
>>
>>
>> --
>> Mark Nottingham   https://www.mnot.net/
>>
>>
>>
>