Re: [tcpm] finalizing CUBIC draft (chairs' view)
Markku Kojo <kojo@cs.helsinki.fi> Mon, 26 September 2022 01:17 UTC
Return-Path: <kojo@cs.helsinki.fi>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46F8CC14F734; Sun, 25 Sep 2022 18:17:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.999
X-Spam-Level:
X-Spam-Status: No, score=-6.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_TEMPERROR=0.01, URIBL_BLOCKED=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.helsinki.fi
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L3G4w6tuBUeO; Sun, 25 Sep 2022 18:17:44 -0700 (PDT)
Received: from script.cs.helsinki.fi (script.cs.helsinki.fi [128.214.11.1]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A27CAC14F720; Sun, 25 Sep 2022 18:17:42 -0700 (PDT)
X-DKIM: Courier DKIM Filter v0.50+pk-2017-10-25 mail.cs.helsinki.fi Mon, 26 Sep 2022 04:17:33 +0300
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cs.helsinki.fi; h=date:from:to:cc:subject:in-reply-to:message-id:references :mime-version:content-type:content-id; s=dkim20130528; bh=99MVUc UMHMZ5MJn0yXVtQ591vINiCGRpKPvlNaN5QBU=; b=IsZt9d3zqDdWMtD3WFTmZB 6kScIbFn9m6Ef++hWuPGpUl5oN4JbBlWjkdg7MdbfdX8U7dV5D5LRC10uqB5FQKm ra2e0As3agUgXzPwLbwytGIBcgdq+jGFpvsr2cOn5WIFcT3bwboUJ2KHorB/sH27 K1GJwNCDY57it8TRbr8ak=
Received: from hp8x-60 (176-93-239-30.bb.dnainternet.fi [176.93.239.30]) (AUTH: PLAIN kojo, TLS: TLSv1/SSLv3,256bits,AES256-GCM-SHA384) by mail.cs.helsinki.fi with ESMTPSA; Mon, 26 Sep 2022 04:17:33 +0300 id 00000000005A0403.000000006330FDAD.00001AF7
Date: Mon, 26 Sep 2022 04:17:31 +0300
From: Markku Kojo <kojo@cs.helsinki.fi>
To: Yoshifumi Nishida <nsd.ietf@gmail.com>
cc: "tcpm@ietf.org Extensions" <tcpm@ietf.org>, tcpm-chairs <tcpm-chairs@ietf.org>
In-Reply-To: <CAAK044QnUTW3Zr5sBZ3wv5e0A=q2OGdooHSZHAKRHmo5qMrSkg@mail.gmail.com>
Message-ID: <alpine.DEB.2.21.2209120201550.5586@hp8x-60.cs.helsinki.fi>
References: <CAAK044QnUTW3Zr5sBZ3wv5e0A=q2OGdooHSZHAKRHmo5qMrSkg@mail.gmail.com>
User-Agent: Alpine 2.21 (DEB 202 2017-01-01)
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="=_script-6928-1664155053-0001-2"
Content-ID: <alpine.DEB.2.21.2209260411510.8211@hp8x-60.cs.helsinki.fi>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/1I8iaJUMVl1tzBv-KLxbYbd8f-4>
Subject: Re: [tcpm] finalizing CUBIC draft (chairs' view)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Sep 2022 01:17:49 -0000
Hi Yoshi, catching up ... I wonder why the Issues 4 and 5 that were not mentioned on the mtng slides have not been discussed on the wg list at all nor concluded? I sent the detailed description of the Issue 4 to the wg list on July 29th. Issue 5 has been discussed in github. The major problem there is that by following the current advise in the draft with a TCP sender results exactly to the incorrect behaviour that Neal pointed out in github and that has been (partially) corrected in the Linux TCP stack (*). In addition, applying UNDO cwnd opens the security threats described in RFC 3522 and RFC 3708. There is no single word on this in the Sec 6 for Security Considerations? Note that the security ptoblems described in RFC 3522 and RFC 3708 become enabled only if one applies UNDO cwnd. (*) The problem with RFC 3522 is that it did not consider SACK at all (silently assumes SACK is not enabled) and therefore works incorrectly if applied as specified when SACK is enabled. The fix for Linux that Neal pointed out seems to behave similarly for both SACK and non-SACK sender. That would make a non-SACK sender to behave against the basic idea of RFC 3522 that avoids further unnecessary retransmissions after the first retransmismitted segment, the most important advantage of RFC 3522. I'm also afraid that Bob's analysis for Issue 1 with a tail-drop router is incorrect. I'll send a separate reply for that. For Issue 2 Michael and Neal have agreed that the problematic behaviour occurs. I have not seen any other replies with technical arguments. Michael explains that the problem does not occur always like I described. That is true but it does not mean the problem is non-existing. Instead, it occurs when the bottleneck router has queue of size 1 BDP or larger, i.e., relatively often (I'll clarify this a bit more with a reply to Michael). Neal's major argument for not using beta = 0.5 in slow start was because it has been deployed as beta=0.7 and changing it to beta=0.5 would require research. Some others have also thought it requires research. This is quite odd given that TCP has worked with beta=0.5 since late 80's and there are already tons of research and experince over several decades with beta=0.5 when in slow start. What is the further analysis and evaluation that would be needed? In addition, Beta=0.5 in slow start is also the current draft standard, so the correct question for the wg is why to change beta=0.5 to 0.7 and what is the justification for the change (and why is such justification not written down in the draft)? I'm also confused about the statement that the Issue 2 may just cause more losses and an additional round of recovery. That's simply to point of view of a CUBIC flow and fully ignores the impact to the other traffic. It is a severe violotion of congestion control principles to inject unnecessary packets (undelivered packets) to the network. Please see the description of congestion collapse in Sec 5 of RFC 2914 due to undelivered packets and explain why the overload of up to 40% undelivered packets when applying beta=0.7 in slow start is not creating congestion collapse (of some degree)? By this far nobody has explained or argued otherwise. I think this is the most serious issue with the draft. In order to make progress with the draft, these issues must not be ignored IMHO. If the wg decides to publish the draft without addressing the issues, at minimum the facts with the issues must be appropriately documented in the draft. Thanks, /Markku On Fri, 26 Aug 2022, Yoshifumi Nishida wrote: > Hello everyone, > Based on the feedback from the last meeting, the chairs have been discussing how to finalize the cubic > draft. > The below is our current view on the draft. > > The slide for the CUBIC draft from the last WG meeting listed 4 discussion points in the draft. > > https://datatracker.ietf.org/meeting/114/materials/slides-114-tcpm-revised-cubic-as-ps > > In these items, we think that the last two points are already addressed now. > With regard to the remaining two points, our views are the following. > > Point 1: TCP friendly model in the cubic draft > We can admit that the model is not valid as the paper describing the model uses some simplified > presumptions. > But, it doesn't not mean the model will pose serious issues on the Internet as we haven't seen any > evidence yet. > > Point 2: Multicative decrease factor during slow-start phase > We think using the current value: 0.7 may cause more packet losses in certain cases, but it can > work efficiently in other cases. > We think this is a part of design choices in CUBIC as we haven't seen any tangible evidence that > it can cause serious problems. > We concluded this will require more detailed analysis and evaluations which can take a longer time. > Based on this, we think these points are NOT needed to be addressed in the draft while it will be good > to add some more explanations for them. > We saw there were several opinions about documenting these points in the draft during the last meeting. > If you have some suggestions here, please share your opinions. > > Please note that this doesn't mean we'll ignore them. we will try to publish a new version of the CUBIC > draft if we find some things on them. > > If you have any opinions or comments on the views, please share them with us. > > Thanks, > -- > Yoshi on behalf of tcpm co-chair > >
- [tcpm] finalizing CUBIC draft (chairs' view) Yoshifumi Nishida
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Yoshifumi Nishida
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Vidhi Goel
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Neal Cardwell
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Yoshifumi Nishida
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Vidhi Goel
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Vidhi Goel
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Bob Briscoe
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Vidhi Goel
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Markku Kojo
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Yoshifumi Nishida
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Yuchung Cheng
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Markku Kojo
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Yoshifumi Nishida
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Jonathan Morton
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Ian Swett
- Re: [tcpm] finalizing CUBIC draft (chairs' view) Jonathan Morton