Re: [tcpm] Case for ECN-capable TCP control packets: draft-bagnulo-tsvwg-generalized-ecn

Praveen Balasubramanian <pravb@microsoft.com> Sat, 16 July 2016 16:13 UTC

Return-Path: <pravb@microsoft.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7EEA12D12F; Sat, 16 Jul 2016 09:13:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level:
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bPbBYjaFvgNy; Sat, 16 Jul 2016 09:13:52 -0700 (PDT)
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0122.outbound.protection.outlook.com [104.47.32.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9424E12B016; Sat, 16 Jul 2016 09:13:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=baEGo7Ex890kb8FfuWz7IEijR31KHbjBItmBdk1nytA=; b=hDzgLI4pjjfzkIw36Lj0qcAmixh53qGwpFE+MSMr3nyT9UY/F5A6G7shKntd8Ke9jpWxnF+0tYX7XOJV2naeJmbqToDVdDuFTWxZf6qBtr3VciutD5dKpDNru5qnCl3KbeoIZ+ya69VHMH6RjwYZb/9UPCXbvucpVtnYmdOcTUU=
Received: from BN1PR03MB008.namprd03.prod.outlook.com (10.255.224.38) by BN1PR03MB008.namprd03.prod.outlook.com (10.255.224.38) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.523.12; Sat, 16 Jul 2016 16:13:50 +0000
Received: from BN1PR03MB008.namprd03.prod.outlook.com ([169.254.5.66]) by BN1PR03MB008.namprd03.prod.outlook.com ([169.254.5.66]) with mapi id 15.01.0523.029; Sat, 16 Jul 2016 16:13:50 +0000
From: Praveen Balasubramanian <pravb@microsoft.com>
To: Bob Briscoe <ietf@bobbriscoe.net>, "Black, David" <david.black@emc.com>, tsvwg IETF list <tsvwg@ietf.org>, tcpm IETF list <tcpm@ietf.org>
Thread-Topic: [tcpm] Case for ECN-capable TCP control packets: draft-bagnulo-tsvwg-generalized-ecn
Thread-Index: AQHR3scWdDYbfMi2KUC3rf4+P8G5DqAbOjlg
Date: Sat, 16 Jul 2016 16:13:49 +0000
Message-ID: <BN1PR03MB008869F87113A749F089AB9B6340@BN1PR03MB008.namprd03.prod.outlook.com>
References: <CE03DB3D7B45C245BCA0D243277949362F5D88C0@MX307CL04.corp.emc.com> <57892BE9.4020309@bobbriscoe.net>
In-Reply-To: <57892BE9.4020309@bobbriscoe.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pravb@microsoft.com;
x-originating-ip: [2001:4898:80e8:d::6c7]
x-ms-office365-filtering-correlation-id: 6d1accce-a116-4221-d9f6-08d3ad942c95
x-microsoft-exchange-diagnostics: 1; BN1PR03MB008; 6:z0VOFPzskZRK8z6Mz9N3Jw0Aso3GeqZEY7/juuQH9ETX8xa2AN+2JFlLB4bkeImbLpONiFxsRUcb1ppduq8qqxqD7KKOzWM5Al5NBVJfCSjMce71PU6ffVt2LtoOhs4zuUsdgEfWKWKaxJk95VpL+wOHeIBGtpSZueBaNPpX8OrCKMM7rH7CBHzpf7t64HNM3s2JqxEhH/Mpf0gO2y/YfEAzy1NrTIgmHv/KscWFg/4wXEdcnEIimj9P3ODUTwpKsh/y3Jp4fIVmwvpy+5PefJZMXkYnBIc8MovFzAxS+xKmdXBVnttP77OU7eITNv6tavdnn05T12IJaVu94YufJA==; 5:iJ2BqSmRHbUxKv7OaW/80YPnHynAGA0Yl9/DsZIqWS9g81t+VtoF1fuxmX8aXwMwj9oH+nMN03YUsJxL5BPimXzF26Kjxuh4bOmr5MU1ZboT1rBRLnHHj74+pOj1F8rOQZfgiUDlE2C1+617r40TFA==; 24:9mXCp4eTrrxYirbEWqjaRNN9koDBWFL68WCPKUGXD5+DLs15NaA0Z1YUsWGA0o5SSw1i94dG0sVBNhsz/tSdFMXAe/52Q0JgssgXrtwaXh8=; 7:H1rTnK4Y0oFacnlMzxSUwvSALrC7le5HqWCDReT7S6vcxCLbcPsT2hP3GZKwv6PYzJYaff/Udizl5SksExHit/fp94UkYXgGGwOAOVrKtay1z28zimG5gakXJYyKe6OZGHBiAWyGtLMWX4tlc9EmPTRGYaGn7eTOGdZwY5PCF+M8st0aH+346Mqra0gDwDSx5iVbfr6vqet/Sd5/0fWNry0avsaEgCQQcmmZB2O/swCrsDQ1ldIIW1ctcoucN9SP
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BN1PR03MB008;
x-microsoft-antispam-prvs: <BN1PR03MB00875020010805836CF5A35B6340@BN1PR03MB008.namprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(61425038)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(6055026)(61426038)(61427038); SRVR:BN1PR03MB008; BCL:0; PCL:0; RULEID:; SRVR:BN1PR03MB008;
x-forefront-prvs: 0005B05917
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(7916002)(24454002)(377454003)(189002)(199003)(92566002)(33656002)(122556002)(586003)(230783001)(15975445007)(81156014)(10290500002)(4326007)(7736002)(86362001)(10400500002)(76576001)(8936002)(7696003)(19300405004)(9686002)(7846002)(74316002)(2906002)(10090500001)(790700001)(5005710100001)(97736004)(81166006)(8676002)(86612001)(102836003)(6116002)(87936001)(5003600100003)(7906003)(16236675004)(15395725005)(105586002)(50986999)(5001770100001)(8666005)(3280700002)(99286002)(19580405001)(19580395003)(11100500001)(3660700001)(189998001)(5002640100001)(19625215002)(19617315012)(106356001)(2900100001)(2950100001)(8990500004)(76176999)(54356999)(106116001)(101416001)(68736007)(7059030)(3826002); DIR:OUT; SFP:1102; SCL:1; SRVR:BN1PR03MB008; H:BN1PR03MB008.namprd03.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BN1PR03MB008869F87113A749F089AB9B6340BN1PR03MB008namprd_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Jul 2016 16:13:49.9884 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN1PR03MB008
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/-ZU9-bVtSsxSNXf2Cqx82q3zdvE>
Cc: "draft-bagnulo-tsvwg-generalized-ecn@ietf.org" <draft-bagnulo-tsvwg-generalized-ecn@ietf.org>
Subject: Re: [tcpm] Case for ECN-capable TCP control packets: draft-bagnulo-tsvwg-generalized-ecn
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Jul 2016 16:13:56 -0000

This is certainly interesting work and very relevant.

Marking ECT on SYN makes sense and data shows that for schemes like DCTCP, not marking SYN puts new flows establishment at a disadvantage especially when schemes like Dual Q AQM are in play. FIN occupies a byte in sequence number space so marking ECT on packet with FIN (with or without data) seems reasonable. Marking RST is probably harmless. I don’t have a strong opinion about window probes and retransmissions but the consistency argument should hold unless there is a demonstrable DoS attack.

My main concern is with pure ACKs. If the receiver is a dumb reflector by sending ECE upon receiving any control packet marked with CE then it could interfere with “accurate ECN” like schemes. For example if the application has bi-directional traffic then how would the sender distinguish a ECE was in response to a mark on a data packet versus an ACK packet? I am of the opinion that the receiver should not echo ECN marks on pure ACK packets. Any other ideas?

I think bringing this up for discussion in working group would be very valuable.

Thanks

From: tcpm [mailto:tcpm-bounces@ietf.org] On Behalf Of Bob Briscoe
Sent: Friday, July 15, 2016 11:31 AM
To: Black, David <david.black@emc.com>; tsvwg IETF list <tsvwg@ietf.org>; tcpm IETF list <tcpm@ietf.org>
Cc: draft-bagnulo-tsvwg-generalized-ecn@ietf.org
Subject: [tcpm] Case for ECN-capable TCP control packets: draft-bagnulo-tsvwg-generalized-ecn

David, [re-sending to include tsvwg & tcpm, which is what I had intended to do first time.]

Here's a heads-up for tsvwg, plus cross-posting to tcpm as suggested,
And for a fast read, there's a summary of every argument below.
Pls bash the arguments.

Summary:
The ECN spec [RFC 3168] says various TCP control packets must not be ECN capable.
This draft lays out each argument given in the RFCs, and articulates a rebuttal against each one:
draft-bagnulo-tsvwg-generalized-ecn<https://tools.ietf.org/html/draft-bagnulo-tsvwg-generalized-ecn>
Subject to some more experiments, we think this knocks down every reason given, so that all these packets could safely be ECN-capable.

Pls read the draft for more details (preferably before responding).

Enumeration of arguments about each type of control packet follows, starting with some arguments common to many:
___________________________________________________________________________________________

Common arguments against ECT

  1.  Unreliable congestion notification delivery
  2.  DoS Attacks
Common rebuttals (respectively):

  1.  No worse than undetectable loss of Not-ECT control packet, and better performance
  2.  Mandating Not-ECT does not stop attackers using ECT for flooding. Nonetheless, it would allow firewalls to discard control packets not meant to be ECT., however this would negate the benefit of ECT for compliant transports and seems unnecessary for the following reason.
RFC3168 (Sec.7) and RFC7567 (Sec.4.2.1) say an AQM MUST turn off ECN support if under persistent overload. This makes it hard for flooding packets to gain from ECT, but more experiments needed to see how much might be gained by an attacker flying "just under the radar".

SYN/ACK
ECT on SYN/ACK already justified in RFC5562

SYN
Arguments against ECT:

  1.  Unknown ECN capability at the responder (may discard ECT SYN or RST connection)
  2.  Loss of congestion notification due to lack of support for feeding back CE on SYN at the responder.
  3.  DoS attacks.
Rebuttals (respectively):

  1.  No RFC mandates these responder behaviours, but 0.6% - 0.8% of Alexa top 1M Web sites (or their network paths) exhibit this. Could retransmit the SYN without ECT, and cache this knowledge to avoid 1 RTT delay in future
  2.  Support for CE feedback in SYN needed in the TCP wire protocol. Solution proposed in AccECN<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn> draft: if SYN/ACK shows lack of support for feeding back CE on SYN (i.e. no support for AccECN) IW MUST be reduced conservatively as if CE on SYN (no need to be as conservative as drop of SYN - cannot be severe congestion as packet got through). Could cache this knowledge.
  3.  See common DoS Attack rebuttal

Pure ACK
Arguments against ECT:

  1.  Unreliable congestion notification delivery
  2.  No means to feed back congestion notifications (no ACKs of ACKs)
Rebuttals (respectively):

  1.  See common unreliability rebuttal
  2.  No worse than drop of Pure ACK, and better performance

Retransmission
Arguments against ECT:

  1.  Unreliable congestion notification delivery
  2.  DoS attacks
  3.  Over-reacting to congestion.
Rebuttals (respectively):

  1.  See common unreliability rebuttal
  2.  See common DoS Attack rebuttal, complemented by recommendation to ignore CE on out of window packets
  3.  Correct to react twice to congestion in different RTTs

Window Probe

Arguments against ECT:

  1.  Unreliable congestion notification delivery
Rebuttal:

  1.  See common unreliability rebuttal
FIN

No arguments against using ECT in RFCs.
To be discussed in next rev of draft.

RST

No arguments against using ECT in RFCs
To be discussed in next rev of draft.

Cheers


Bob & Marcelo

On 11/07/16 21:28, Black, David wrote:

Marcelo and Bob,



Interesting draft - I need to read it in more detail ... in my "copious spare time" this week ;-).



While it is of interest to TSVWG, as general ECN work happens here, I suspect

that as a proposed modification to TCP it would be in the domain of the TCPM WG,

as was the case for RFC 5562.



Thanks, --David

----------------------------------------------------

David L. Black, Distinguished Engineer

EMC, 176 South St., Hopkinton, MA  01748

+1 (508) 293-7953     Cell: +1 (978) 394-7754

david.black@emc.com<mailto:david.black@emc.com>

---------------------------------------------------



--

________________________________________________________________

Bob Briscoe                               http://bobbriscoe.net/