Re: quic-ack-frequency: fewer OK, but not excess

Christian Huitema <huitema@huitema.net> Wed, 04 August 2021 20:04 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E22203A07A2 for <quic@ietfa.amsl.com>; Wed, 4 Aug 2021 13:04:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Level:
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4sCLZwsrmUfH for <quic@ietfa.amsl.com>; Wed, 4 Aug 2021 13:04:19 -0700 (PDT)
Received: from mx36-out21.antispamcloud.com (mx36-out21.antispamcloud.com [209.126.121.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3E1A33A079B for <quic@ietf.org>; Wed, 4 Aug 2021 13:04:18 -0700 (PDT)
Received: from xse14.mail2web.com ([66.113.196.14] helo=xse.mail2web.com) by mx136.antispamcloud.com with esmtp (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1mBN7b-000ZOT-8L for quic@ietf.org; Wed, 04 Aug 2021 22:04:17 +0200
Received: from xsmtp21.mail2web.com (unknown [10.100.68.60]) by xse.mail2web.com (Postfix) with ESMTPS id 4Gg2kb6zlgzPD1 for <quic@ietf.org>; Wed, 4 Aug 2021 13:04:07 -0700 (PDT)
Received: from [10.5.2.15] (helo=xmail05.myhosting.com) by xsmtp21.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1mBN7X-0006dT-Rp for quic@ietf.org; Wed, 04 Aug 2021 13:04:07 -0700
Received: (qmail 26460 invoked from network); 4 Aug 2021 20:04:07 -0000
Received: from unknown (HELO [192.168.1.104]) (Authenticated-user:_huitema@huitema.net@[172.58.43.233]) (envelope-sender <huitema@huitema.net>) by xmail05.myhosting.com (qmail-ldap-1.03) with ESMTPA for <quic@ietf.org>; 4 Aug 2021 20:04:06 -0000
Subject: Re: quic-ack-frequency: fewer OK, but not excess
To: Mike Bishop <mbishop@evequefou.be>, Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>, Bob Briscoe <ietf@bobbriscoe.net>
Cc: Jana Iyengar <jri.ietf@gmail.com>, Ian Swett <ianswett@google.com>, QUIC IETF mailing list <quic@ietf.org>
References: <16303ca7-7a41-7f28-46e9-5d16c007cb00@bobbriscoe.net> <CAKKJt-dor+pysgsREM8Zfuc52kCm9cpM18_sNAKF3roRhVuOkA@mail.gmail.com> <BLAPR22MB225986246F6025B6CBB699D3DAF19@BLAPR22MB2259.namprd22.prod.outlook.com>
From: Christian Huitema <huitema@huitema.net>
Message-ID: <8a1af09f-7791-e306-6fb9-49c7247818b9@huitema.net>
Date: Wed, 04 Aug 2021 13:04:06 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.12.0
MIME-Version: 1.0
In-Reply-To: <BLAPR22MB225986246F6025B6CBB699D3DAF19@BLAPR22MB2259.namprd22.prod.outlook.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Originating-IP: 66.113.196.14
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 66.113.196.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=66.113.196.0/24@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.15)
X-Recommended-Action: accept
X-Filter-ID: Pt3MvcO5N4iKaDQ5O6lkdGlMVN6RH8bjRMzItlySaT9WLQux0N3HQm8ltz8rnu+BPUtbdvnXkggZ 3YnVId/Y5jcf0yeVQAvfjHznO7+bT5x6h2yQpzTslcOqazQkKtAFKj/EwzSHE5FGYwwjsNRPCIRr B4jkUnCdpW9O1fK5kQTmD6wdmZPcItWbGe10hXJtXL4FsauCVkDjmcYJdU3yWp7KuHNaaKdg7iBE ZefdsNUFWKwa/wzJUjmazeC7Imcapebr0kNyYC289u5HlaNj1BQ6V51u76v35b1wNe/MvdLom48E g3of4Y9DlgiJ0nAJ2+J9PgaoF8SQHto3le4zsHTaeQtlKubP6iUTjj6yPARK6buALVaA782LKxg6 vRmng8N1aLhXqdc+jC1RcnVud53D5caUhbVtvqItBqoizkEt9O20UjkwI0v+LOlw05G4BS+iyyNq bT8dUMXMJ4tUCMj6G37ZfAMLceP5aNHPt26RBupu5v1nytoNnc138GfEJRQ2qC7jjynPIHPNqSn4 QTXUjLjYWQt1/5xnQymMoPsgr/U0flMcy2Vi/IcBgY4arPaiJ1W6hAyiRC61jekdwIcXNugoOEbH RyFULpSjm7jZ1h/HfDRQ5Ig8VhPsPE8NQ/T3Op6Um662jkOH4Bxha/DIeb+gD8AI/4b8OA7zPeJa dUApiScihqHidcqeyhPIDRojSVizNl0ce/s7u0P9b9Tml6eOMCV9kYYwkPx6ZsXvIUzTXkDAiiJi mGhLUFuSW8D9t0kz0vlag+LRt89q4LkonSErjlcZ1xU9OPFPqmiyuLfHqAnAj7rgKH7+eCmmK0E7 rW7nbRBTUpG87oRlqlShcA6Xvva2QAVEjpqzANap+28aWyCRVT7YkY7LckVcT2VGwpzAqGdNkj1F UK6yCr13qFZSq8Fx+9otn0aqja8VKPqpdskk5LxBR/9t1zMMkdu6/R2FM84kxYRFSvC1IDg1BRW7 hzp8w3iHcOwbVtsmWfnQGGis4EvbR3jXsI0ESXwhBU2hwt/J18C+HygJl/jEzm1SsR8v3aJbN/NZ fa8pHhHaz+HPa0HAgEx4sWDF
X-Report-Abuse-To: spam@quarantine11.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/me2evUfch8acTEEIKPuc01jTouE>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Aug 2021 20:04:25 -0000

The design assumes that using the ACK-Frequency frames is mutually 
beneficial for clients and servers. Clients follow the servers' 
directive because they believe that by doing so they will benefit from 
better performance. Yes, the server is probably not going to just 
disconnect if the client sends too many ACKs. But the server will 
definitely slow down, and that's not in the client's interest.

-- Christian Huitema

On 8/4/2021 11:58 AM, Mike Bishop wrote:
> This also seems to fall into the realm of requirements that are difficult to enforce against the other side.  There are some corner cases where you might be sure, and if you cared to track over time you could infer whether your peer is complying within a reasonable probability… but it would be hard to be certain.  This seems like a SHOULD.
>
> From: QUIC <quic-bounces@ietf.org> On Behalf Of Spencer Dawkins at IETF
> Sent: Wednesday, August 4, 2021 11:30 AM
> To: Bob Briscoe <ietf@bobbriscoe.net>
> Cc: Jana Iyengar <jri.ietf@gmail.com>; Ian Swett <ianswett@google.com>; QUIC IETF mailing list <quic@ietf.org>
> Subject: Re: quic-ack-frequency: fewer OK, but not excess
>
> Hi, Bob,
>
> On just one point (and it's a BCP 14 point),
>
> On Tue, Jul 27, 2021 at 5:43 PM Bob Briscoe <ietf@bobbriscoe.net<mailto:ietf@bobbriscoe.net>> wrote:
> In 6. Sending Acknowledgments<https://datatracker.ietf.org/doc/html/draft-ietf-quic-ack-frequency-00#section-6> it says "On receiving an ACK_FREQUENCY frame...endpoint MUST send an acknowledgement when..."
>
> What if it doesn't? Why MUST?
> The underlying question here is what is the interoperability requirement?
> Imagine I'm host A, and I instruct B to set ACK-eliciting threshold = 8 packets.
>
>    1.  What if B ACKs more frequently? e.g. every packet, is it a DoS attack? Is this a protocol violation?
>    2.  The spec allows B to ACK less often (it says greater than or equal to "ACK-eliciting threshold"), but it says no longer than max_ack_delay. What if A has told B to set max_ack_delay = 960 μs, but B has other things taking up its resources, so B sends an ACK every 2ms? A's congestion controller might not perform quite so well, but is this a protocol violation? What can A do about it, and does it really need to expect B to do anything differently?
> To propose answers to my own questions, I would suggest that:
>
>    1.  A MAY consider B is violating the protocol if B ACKs more frequently than ACK-eliciting threshold (after having acknowledged the relevant ACK_FREQUENCY frame). Then if A can cope, it just keeps calm and carries on. But if it can't it is entitled to panic.
>   I may be missing something, but is that saying that A MAY consider B is violating the protocol if B ACKs more frequently because of packet reordering (as in https://datatracker.ietf.org/doc/html/draft-ietf-quic-ack-frequency-00#section-6.1)?
>
>  From a BCP 14 perspective - I've sent plenty of email about SHOULDs, both as a GenART reviewer and as an AD, asking "so why would an endpoint NOT do that ("why is that SHOULD not a MUST?"). But in this case, I THINK you're describing where B MUST do something (In Section 6), but B has a good reason to violate the MUST (in 6.1) from A's perspective, and A might or might not decide that even if B violates the MUST, A can just go on.
>
> Do I have that wrong?
>
> If so, my apologies, but if not, this is a poster child for SHOULD, rather than a MUST that can be ignored, or not, depending on how A is feeling that day.
>
> Best,
>
> Spencer
>
>    1.  In contrast, A needs no recourse if B sends any or all ACKs more infrequently than the max_ack_delay. The connection performance goes to pieces, but that's what happens when one machine can't cope.
>
> Changes to the text of §6 that would put all the above into effect:
>
>    *   s/"max_ack_delay"/at least "max_ack_delay"/ in second bullet.
>    *   After the two bullets, add something to the effect of "...MAY consider B is violating..." as in the bullet above.
>    *   §6.3 (Batch Processing of Packets) should not be described as an exception. It's just an example of a case when an ACK is sent when the number of received ack-eliciting packets is greater than, not equal to, the "ACK-eliciting threshold" (as already allowed in the first bullet).
>
> ________________________________
> In 6.2.  Expediting Congestion Signals<https://datatracker.ietf.org/doc/html/draft-ietf-quic-ack-frequency-00#section-6.2> there's a similar issue. It says
>     "...an endpoint SHOULD immediately acknowledge packets marked with the ECN Congestion Experienced (CE)..."
>
> Up to a point this is OK, but during overload in one direction, it causes every packet to be ACKd in the other. The forward direction is going to have to slow down due to the CE marking, but it might not be the best idea to stuff up the queue with ACKs on the reverse path at just the same moment.
>
> Also, if QUIC is used in a DC, or with L4S across an ECN AQM that uses a simple step marking threshold, it can lead to runs of 100% ECN marking lasting for around 1 RTT. But by the quoted rule, the receiver SHOULD ACK every packet. I'm aware that this is a quote from RFC9000, but at least RFC9000 allows us to "deviate from these requirements after careful consideration" because it seems wrong.
>
> There's also the question of whether this is meant to mean that an endpoint SHOULD ACK acknowledgement packets marked CE, which could lead to an interminable ACK ping-pong.
>
> There has been a long discussion going on about a similar subject in tcpm. You might want to refer to the thread:
> Seeking WG opinions on ACKing ACKs with good cause<https://mailarchive.ietf.org/arch/msg/tcpm/xudSM54FV2HRyzF9fbrj34-0ST8/>
>
> It might be quicker to just read the text resulting from that thread, which is now in the Accurate ECN TCP Feedback draft:
> https://datatracker.ietf.org/doc/html/draft-ietf-tcpm-accurate-ecn#section-3.2.2.5.1
> There's a lot of tricky stuff there.
>
> Cheers
>
>
>
> Bob
>
>
>
>
> --
>
> ________________________________________________________________
>
> Bob Briscoe                               http://bobbriscoe.net/