Re: [tcpm] Genart last call review of draft-ietf-tcpm-rto-consider-14

Stewart Bryant <stewart.bryant@gmail.com> Thu, 18 June 2020 14:18 UTC

Return-Path: <stewart.bryant@gmail.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED2FE3A1104; Thu, 18 Jun 2020 07:18:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fWdE7I8CJkKF; Thu, 18 Jun 2020 07:18:10 -0700 (PDT)
Received: from mail-wr1-x42a.google.com (mail-wr1-x42a.google.com [IPv6:2a00:1450:4864:20::42a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B58E83A1101; Thu, 18 Jun 2020 07:18:09 -0700 (PDT)
Received: by mail-wr1-x42a.google.com with SMTP id l11so6270354wru.0; Thu, 18 Jun 2020 07:18:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=3x/Zjix9accJqMLPNYOKYwsXjg54s4StSOFmpsKa4CE=; b=jldGAANlWpqZZZ8nuQ5Cdi54riguuSU8Xu+4wz0dAF5oR4fOjs/xNqXSFGT9WJcyZJ o2W8Up2aaPGl3vhprayBlapGvy7Q97vr6fHNFxTsNbAIXagnptqXBzU72A0SLocN+TSR cB158/a0ItY9eocrxg55LD8KB7dKoHRy+bUfeCM6OuZzg9edPhBWSQ7rJRt3WC6PJpIn jzJXwt9OPniP3pDTlZgCgNKDEsSfykSddV0l7TP+erbXZvzJCc3SJCPop/OyWkNsB+4U hJB2ePWlGZbkeJ3Mmz+3GRlnAmlXcbR6vbxnwM2vu8/QwFlKW51CvgM5V/P17Ji+cInB A2cQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=3x/Zjix9accJqMLPNYOKYwsXjg54s4StSOFmpsKa4CE=; b=QrPf4DXDG33aILfvrXuLYM4bJcD4i5p955Q72T0Qwkm0H0XGU6LPAKn4jXi83ZaFQd z7MJ1z/yMC0H02FpMFCTDLq70ejJ9WJU6dNuiJ9uZ89E4w0P2pslsE/qaM6QK62k7vwy sX2p3P6/5+P8iKdkvLrycJstFLfklK2/e/Nsfwv6YYPuNn+PN51mBwEpLbohXHBpwFL5 US0yQjWcNIPaji8idhVUIMoZlWHWSDci+D1UmU0gDHNwVgmgvIbln/RFZ6rfOVMF9Bsx LeMsqN27rZMbR96+SO+u5UfVIPQFvprarO2leAZc+qjO3Hdenoma2j576J2n0ewKraL5 Kqzg==
X-Gm-Message-State: AOAM5319kGsgub6CSP9IZLVoWlufNpTazAtufXiqx/3XsP3Cg9gx73dH TmTAA5vz90kxYxxjn7Zk8cM=
X-Google-Smtp-Source: ABdhPJwiW8GiV7ofxc4zQo7whQF1JnaJ+mEmF8VKh3vB65D5iM1m9WjTr5oL+hSkW96crFSZyYmHwQ==
X-Received: by 2002:adf:a306:: with SMTP id c6mr4903767wrb.122.1592489887938; Thu, 18 Jun 2020 07:18:07 -0700 (PDT)
Received: from appleton.fritz.box ([62.3.64.16]) by smtp.gmail.com with ESMTPSA id b201sm3778150wmb.36.2020.06.18.07.18.06 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 18 Jun 2020 07:18:07 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
From: Stewart Bryant <stewart.bryant@gmail.com>
In-Reply-To: <C275B130-44DE-46DC-B50C-9D288EE3A1A4@icir.org>
Date: Thu, 18 Jun 2020 15:18:05 +0100
Cc: Stewart Bryant <stewart.bryant@gmail.com>, Martin Duke <martin.h.duke@gmail.com>, Review Team <gen-art@ietf.org>, tcpm <tcpm@ietf.org>, Last Call <last-call@ietf.org>, draft-ietf-tcpm-rto-consider.all@ietf.org, tom petch <daedulus@btconnect.com>
Content-Transfer-Encoding: quoted-printable
Message-Id: <A970FFAB-5737-46E3-BAD6-73A9377FBFA3@gmail.com>
References: <159083802039.5596.14695350463305243689@ietfa.amsl.com> <FE0FA7D5-176D-4111-95DA-BD5424A24FE2@icir.org> <9A0DBDC4-2E39-4D09-80A6-FEDE72ED205B@gmail.com> <0F4B56B1-C8B9-493E-B3CD-AC2FBA9E62E4@icir.org> <CAM4esxTAMgUc4gfL-_Z2bjChjaHJGWL0F5VJn8Nd-=j2Zj5V_A@mail.gmail.com> <CAM4esxROPy-MX8_fu5inMvsKYVKR16jjTkAntt9qy=vfGM+mUg@mail.gmail.com> <EB54EC6A-418E-430F-91B1-C6832A606257@gmail.com> <C275B130-44DE-46DC-B50C-9D288EE3A1A4@icir.org>
To: Mark Allman <mallman@icir.org>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/1zhLUd5xSeKAcuvPD-BFmqbp8jI>
Subject: Re: [tcpm] Genart last call review of draft-ietf-tcpm-rto-consider-14
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jun 2020 14:18:15 -0000

Here is how we should proceed.

We make as much progress as we can agree on which will clear some of the issue below.

For any remaining issues for which you have wider consensus but where we cannot agree, I modify my review and the IESG decides how they wish to proceed.

I am prepared to be in the rough but I have a duty to draw attention to concerns.

Best regards

Stewart


> On 18 Jun 2020, at 14:32, Mark Allman <mallman@icir.org> wrote:
> 
> 
> Last comment first ...
> 
>> We are getting there, but I would ask that you take the transport
>> hat off and look again from an infrastructure and packet transport
>> perspective.
> 
> I don't view this as looking at it from a transport
> vs. infrastructure perspective.
> 
> And, I am not disagreeing with your perspective.  My take is that
> the nub of what you're saying is that there are cases where we know
> something about the network.  And, that something let's us design a
> more savvy loss detection and response scheme.  E.g., because the
> link / path is known to be short and so using an initial RTO of 1sec
> is too long.  E.g., because the cause of loss is known or can be
> safely assumed to not be congestion.  And, I think that view is both
> correct and reasonable.
> 
> However, ...
> 
> (0) I do not view that view as inconsistent with this document at
>    all.
> 
> (1) Because there are cases where we know more doesn't make a set of
>    default requirements for the general case when we don't
>    understand the path any less valid.
> 
> (2) The document explicitly says alternates are fine modulo the
>    usual consensus.  I.e., in cases where we have more information
>    we can do things differently.  And, the cost of that is no
>    different than the cost today (i.e., specifying it and gaining
>    consensus).
> 
> So, my view is that this all boils down to making it clear that this
> is not somehow THE (best) way to do time-based loss detection for
> all cases.  Rather, following the guidelines with result in a
> safe-for-general-use loss detector.
> 
>> In the general case, delay across a
>>    network path depends not only on distance, but also a number of
>>    variable components such as the route and the level of buffering in
>>    intermediate devices.
>> 
>> Its is more the contending/conflicting traffic rather than the
>> buffering, or perhaps the time spent in queues, but “buffering” is
>> a link a transport colloquial term.
> 
> Per this and Gorry's note, I will tweak this to use queuing, as that
> is what I meant.
> 
>> Perhaps we could include a clearer disclaimer regarding the
>> non-best-effort-internet-end-to-end traffic?
>> You have some text on this down in section 2 but it is a bit buried.
> 
> OK, let me see if I can foreshadow this a bit more and/or pull some
> from section 2 to earlier.
> 
>> An exception to this rule is if an IETF standardized mechanism
>>        determines that a particular loss is due to a non-congestion
>>        event (e.g., packet corruption).
>> 
>> That is a bit heavy. It should be “a protocol” there than an IETF
>> standardarized mechanism. The IETF does not have a monopoly on
>> pre-blessing protocols before they are deployed.
>> [...]
>> 
>> In some cases you cannot tell the cause, but it is more important
>> to ignore the loss. OAM being a particularly good example.
> 
> First, I don't think I can readily change this without going against
> the consensus the document has already gathered.  (I.e., this is not
> about the intro, framing, context, etc. bits, but the actual meat of
> the technical stuff.)
> 
> Second, you are right that the IETF does not have a monopoly, but
> that doesn't make the statement in the document the wrong thing to
> say.
> 
> Third, I doubt I should change it.  The problem here from the
> standpoint of a set of default guidelines is that we'd like a
> mechanism to determine the cause of loss to **actually work** before
> it's OK to avoid a congestion control response.  If a standardized
> mechanism is used then we have some confidence that the mechanism
> has been vetted as reasonable.  If the mechanism is not standardized
> then we have no idea if it actually works or if it is some
> ill-conceived scheme that is badly broken.  In this latter case, I
> don't think we want to bless this approach as OK within the default.
> It may be OK, but it should get some consensus that it is OK.
> 
> allman