Re: [Taps] Eric Rescorla's No Objection on draft-ietf-taps-minset-08: (with COMMENT)

Eric Rescorla <ekr@rtfm.com> Thu, 13 September 2018 14:55 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E545130DED for <taps@ietfa.amsl.com>; Thu, 13 Sep 2018 07:55:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level:
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UYcH1dq0EXDa for <taps@ietfa.amsl.com>; Thu, 13 Sep 2018 07:55:29 -0700 (PDT)
Received: from mail-lj1-x22f.google.com (mail-lj1-x22f.google.com [IPv6:2a00:1450:4864:20::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87C78130F5F for <taps@ietf.org>; Thu, 13 Sep 2018 07:55:28 -0700 (PDT)
Received: by mail-lj1-x22f.google.com with SMTP id p10-v6so4875395ljg.2 for <taps@ietf.org>; Thu, 13 Sep 2018 07:55:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=u6YGa+Di7NgopABsvf7fnH6HR7eDV50fazBUrjaRdDs=; b=XXx1pgf1XihHBopKosWNB+sx5FWhctj4vakm9dI06woO27MAgdemazBrbomIcJplI/ Kpe/8orIuAbhgiFIdsx/RXm7np1KQdTyUxmNKDrXxuN+rzClrh3glZbZc+aQmBSQ6eMX thVWgmxwHTuvQ4lNwagUCUIcQkuf2unyO+VSoh7DwR9HgQG1M8rPPRQz68uUlaoQtwL+ efWkQmWyxfLtTjXzL1mxijUENWl2wZHsk41nX6Ys+poXDZPdODATuQculphfVdlpjCTJ ocFuiYMjkStL9rHUGzhy0X6JkH2saY+4yUyYEHtRzjxb1tkHN0YtxtAzC5asicN6SHVh fshQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=u6YGa+Di7NgopABsvf7fnH6HR7eDV50fazBUrjaRdDs=; b=DRBdO2OsGHUG34BUUWqKop82KB0/hK1dJgrBo5vYW+Tp7ydjunBpnHR1zsNT265DJ/ vApRgaXLiwAt+aYuvHKUR6ojFS1b4K9xZ184Hn3GXvDnWbl/r7qJzfwwD3dk1svXMTht J9QaWzMFzZmQgvao3i7hqp+9559fJp070HQZCzSMG5Z+0nEpkrQV7JZHgNNyEDvHNRaV TSDWtzLdhjvWUfLXl5PMBUl1dbJGHJrD42uxVoxH0pHwFxOasshZIYChHY6V/18wTryj rUuYkTHUz0fqGIrn3XsabywWtqMISSw6zvldrJkzxyY5E3VqapaigTCibJb4kpN2Ax+A wIwQ==
X-Gm-Message-State: APzg51AMBxQOeHTQM6i31CdasIqQZRxZN0LQpcx2V43zTdi8fGgpd6L6 heXetFAm/jhVaG/uV7eWidwl/OgN6BtZElJ20/mcUg==
X-Google-Smtp-Source: ANB0VdZfERf4c8GU7CmWWXUCtIwrK++dITMCUvCtMZWSd67voqQ+E0RsJ6NyR//wq4nlkWIHxKnmZ5luwEr/VK0Nr38=
X-Received: by 2002:a2e:1bd7:: with SMTP id c84-v6mr4931000ljf.0.1536850526617; Thu, 13 Sep 2018 07:55:26 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ab3:498d:0:0:0:0:0 with HTTP; Thu, 13 Sep 2018 07:54:45 -0700 (PDT)
In-Reply-To: <EB9548E6-D68F-4F98-A5C1-301A59568E05@ifi.uio.no>
References: <153681690194.9412.2624965951701043464.idtracker@ietfa.amsl.com> <EB9548E6-D68F-4F98-A5C1-301A59568E05@ifi.uio.no>
From: Eric Rescorla <ekr@rtfm.com>
Date: Thu, 13 Sep 2018 07:54:45 -0700
Message-ID: <CABcZeBP7+2v=e-1BxWvU0-JJ4-3dgLn=C1H9QMmHJ2fE3U1KZw@mail.gmail.com>
To: Michael Welzl <michawe@ifi.uio.no>
Cc: The IESG <iesg@ietf.org>, draft-ietf-taps-minset@ietf.org, taps-chairs@ietf.org, theresa@inet.tu-berlin.de, taps@ietf.org
Content-Type: multipart/alternative; boundary="000000000000b657400575c1e5cb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/taps/qvVapqD8Vf4Bu_sO3XfLJMzyyAU>
Subject: Re: [Taps] Eric Rescorla's No Objection on draft-ietf-taps-minset-08: (with COMMENT)
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IETF Transport Services \(TAPS\) Working Group" <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Sep 2018 14:55:33 -0000

On Thu, Sep 13, 2018 at 7:34 AM, Michael Welzl <michawe@ifi.uio.no> wrote:

> Dear Eric,
>
> Thanks a lot for your comments! Answers below:
>
>
>
> > Eric Rescorla has entered the following ballot position for
> > draft-ietf-taps-minset-08: No Objection
> >
> > Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.
> html
> > for more information about IESG DISCUSS and COMMENT positions.
> >
> >
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/draft-ietf-taps-minset/
> >
> >
> >
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
>
>
> > IMPORTANT
> > S 3.1.
> >       - Is any of the following useful to the application?
> >         *  Specify checksum coverage used by the sender
> >         *  Specify minimum checksum coverage required by receiver
> >
> >         Yes: UDP-Lite is preferred.
> >         No: UDP is preferred.
> >
> > there seems to be something missing here wrt penetration rates. I.e.,
> > SCTP  (absent UDP) does not reliably work for any client behind NATs,
> > which means that it's not preferred for those clients regardless of
> > the other benefits in this tree.
>
> We added a statement about this below the decision tree.
>
>
> > COMMENTS
> > S 1.
> >     of libraries to use this transport feature without exposing it, based
> >     on knowledge about the applications -- but this is not the general
> >     case).  In most situations, in the interest of being as flexible and
> >     efficient as possible, the best choice will be for a library to
> >     expose at least all of the transport features that are recommended as
> >     a "minimal set" here.
> >
> > What is the bar for the requirements here. I.e., do you believe that
> > all of these can be implemented with a standard sockets API.
>
> I don't fully get this - it CAN be implemented atop the standard
> socket API (cf. https://github.com/NEAT-project/neat), if that's
> what you're asking?
>

How do you implement limits on retransmission rates with standard sockets?



> > S 3.
> >
> >     Based on the categorization, reduction, and discussion in Appendix A,
> >     this section describes a minimal set of transport features that end
> >     systems should offer.  The described transport system can be
> >     implemented over TCP.  Elements of the system that are not marked
> >     with "!UDP" can also be implemented over UDP.
> >
> > Does this mean over native UDP with no other session protocol. Because
> > you can have TCP over UDP.
>
> Native; we added a disclaimer about this at the end of the introduction.
>
>
>
> > S 3.2.
> >     multiplexed as streams on a single SCTP association when SCTP may not
> >     be available).  The transport system must therefore ensure that
> >     group- versus non-group-configurations are handled correctly in some
> >     way (e.g., by applying the configuration to all grouped connections
> >     even when they are not multiplexed, or informing the application
> >     about grouping success or failure).
> >
> > How do you group connections in TCP? Or is this text saying it
> > doesn't?
>
> The text doesn't make any assumption about this being possible with
> anything but SCTP. This being said, I can't resist offering an answer
> (but that's out of scope of minset):
> https://ieeexplore.ieee.org/document/8406887/


This is behind a paywall, but it appears to just be about congestion
control, so perhaps there is some confusion about "grouping". I had read
that as application visible grouping. Is that not what you mean?


>
>
> > S 7.2.
> >
> >     o  Disable MPTCP
> >        Protocols: MPTCP
> >        Automatable because the usage of multiple paths to communicate to
> >        the same end host relates to knowledge about the network, not the
> >        application.
> >
> > I don't think I understand how this is automatable. Is the theory that
> > the host auto-negotiates MPTCP? But what if the app doesn't want it no
> > matter what.
>
> Then the application wants more than what this design of strictly
> "application-specific knowledge" is giving it. That's the trade-off here -
> there may be many reasons for applications to want things beyond this
> document, but if we weren't strict about these limitations, this would
> have hardly become a "minimal set".
>

That's reasonable, but it seems like a somewhat confusing definition.

-Ekr