Re: [re-ECN] CONEX Principles & Constraints

Bob Briscoe <rbriscoe@jungle.bt.co.uk> Mon, 02 November 2009 09:36 UTC

Return-Path: <rbriscoe@jungle.bt.co.uk>
X-Original-To: re-ecn@core3.amsl.com
Delivered-To: re-ecn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5DDBE3A683E for <re-ecn@core3.amsl.com>; Mon, 2 Nov 2009 01:36:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.884
X-Spam-Level:
X-Spam-Status: No, score=-1.884 tagged_above=-999 required=5 tests=[AWL=0.233, BAYES_00=-2.599, DNS_FROM_RFC_BOGUSMX=1.482, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pftzK1YahILo for <re-ecn@core3.amsl.com>; Mon, 2 Nov 2009 01:36:12 -0800 (PST)
Received: from smtp4.smtp.bt.com (smtp4.smtp.bt.com [217.32.164.151]) by core3.amsl.com (Postfix) with ESMTP id 5CF103A635F for <re-ecn@ietf.org>; Mon, 2 Nov 2009 01:36:11 -0800 (PST)
Received: from i2kc06-ukbr.domain1.systemhost.net ([193.113.197.70]) by smtp4.smtp.bt.com with Microsoft SMTPSVC(6.0.3790.3959); Mon, 2 Nov 2009 09:36:30 +0000
Received: from cbibipnt05.iuser.iroot.adidom.com ([147.149.196.177]) by i2kc06-ukbr.domain1.systemhost.net with Microsoft SMTPSVC(6.0.3790.3959); Mon, 2 Nov 2009 09:36:30 +0000
Received: From bagheera.jungle.bt.co.uk ([132.146.168.158]) by cbibipnt05.iuser.iroot.adidom.com (WebShield SMTP v4.5 MR1a P0803.399); id 1257154589574; Mon, 2 Nov 2009 09:36:29 +0000
Received: from MUT.jungle.bt.co.uk ([10.215.130.87]) by bagheera.jungle.bt.co.uk (8.13.5/8.12.8) with ESMTP id nA29aGUe018421; Mon, 2 Nov 2009 09:36:16 GMT
Message-Id: <200911020936.nA29aGUe018421@bagheera.jungle.bt.co.uk>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Mon, 02 Nov 2009 09:36:14 +0000
To: Leslie Daigle <leslie@thinkingcat.com>
From: Bob Briscoe <rbriscoe@jungle.bt.co.uk>
In-Reply-To: <4AEE17B3.4000509@thinkingcat.com>
References: <4A916DBC72536E419A0BD955EDECEDEC06363A38@E03MVB1-UKBR.domain1.systemhost.net> <AEDCAF87EEC94F49BA92EBDD49854CC70DB7C39B@E03MVZ1-UKDY.domain1.systemhost.net> <AEDCAF87EEC94F49BA92EBDD49854CC70DB7C3E3@E03MVZ1-UKDY.domain1.systemhost.net> <20091030163324.GV78898@verdi> <4AEE17B3.4000509@thinkingcat.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
X-Scanned-By: MIMEDefang 2.56 on 132.146.168.158
X-OriginalArrivalTime: 02 Nov 2009 09:36:30.0198 (UTC) FILETIME=[F5025960:01CA5B9F]
Cc: re-ecn@ietf.org
Subject: Re: [re-ECN] CONEX Principles & Constraints
X-BeenThere: re-ecn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: re-inserted explicit congestion notification <re-ecn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>, <mailto:re-ecn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/re-ecn>
List-Post: <mailto:re-ecn@ietf.org>
List-Help: <mailto:re-ecn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>, <mailto:re-ecn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Nov 2009 09:36:18 -0000

Folks,

At 23:20 01/11/2009, Leslie Daigle wrote:
>John Leslie wrote:
>>
>>>>14. we will describe threats, especially from falsifying or
>>>>suppressing the conex information - whether by ISPs or end-hosts.
>>>>The protocol needs to allow such threats to be dealt with (in as
>>>>simple a manner as possible), but the actual mechanisms to tackle
>>>>those threats (using policer boxes, for instance) are out of scope.
>>>>Reason: such mechanisms are about uses of conex, rather than exposing
>>>>the information.
>>    I agree.

Suggest we replace the middle sentence with:

The protocol must support at least one simple mechanism that can 
tackle those threats without compromising any other principles and 
constraints, but standardisation of a particular mechanism is out of scope.

[[[Reason: The ability to counter cheating, particularly by single 
packet flows, introduces all the toughest constraints on the 
protocol. Saying the actual mechanisms are out of scope precludes us 
from considering whether even one nominal mechanism will be feasible 
without compromising other constraints. ]]]


>>>>15. anything else?
>>    Not at this time.

I have a very subtle principle to add:

15. Spontaneously cooperative behaviour between end-systems and 
between networks and end-systems should not be precluded or 
discouraged by any measures designed to prevent cheating or to 
encourage cooperation.


BOb

>>--
>>John Leslie <john@jlc.net>

________________________________________________________________
Bob Briscoe,                                BT Innovate & Design