[tcpm] Re: Last Call: <draft-ietf-tcpm-accurate-ecn-31.txt> (More Accurate Explicit Congestion Notification (ECN) Feedback in TCP) to Proposed Standard

Gorry Fairhurst <gorry@erg.abdn.ac.uk> Sat, 18 April 2026 07:13 UTC

Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tcpm@mail2.ietf.org
Delivered-To: tcpm@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 120A0DEB91B5; Sat, 18 Apr 2026 00:13:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1776496427; bh=VgC5cGox+Gh7px9FJw2v8owDPNeWcVA1F2F5gj8JZKU=; h=From:Subject:Date:References:Cc:In-Reply-To:To; b=ol1tm7Ke/FwhM9poQG9CK0o98HJF4uz/UPMzrvjvwOlFGVCMViq9EFGgd20bGHlMp OlMpgSjC2YjQMinU6/HNm4FGHDThPsQ5Npll54gl3BB8y218x+zAGqYUroc1Ma+mIb m8EDqvSKMCEs3Hp2Lvtw/016cXVqdEfQ/TF12G0E=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=erg.abdn.ac.uk
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mp5kpMoUknC9; Sat, 18 Apr 2026 00:13:40 -0700 (PDT)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk [137.50.19.135]) by mail2.ietf.org (Postfix) with ESMTP id AB28CDEB90C0; Sat, 18 Apr 2026 00:13:19 -0700 (PDT)
Received: from smtpclient.apple (fgrpf.plus.com [212.159.18.54]) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPSA id 1241C1B00182; Sat, 18 Apr 2026 08:13:10 +0100 (BST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=erg.abdn.ac.uk; s=default; t=1776496393; bh=VgC5cGox+Gh7px9FJw2v8owDPNeWcVA1F2F5gj8JZKU=; h=From:Subject:Date:References:Cc:In-Reply-To:To:From; b=qa+suun6ovYRTaKKFKfh3X5xcimPcO0QtJ3AmdmoscbRyC2aB+UReZYumCKupFnMn 6SEoQhmWMi6gtYei5tD+dSnPsyrpwSExcsxsf9TqavaTjCNQDqDCON6I1i/AbgMV2e 8ZzB8Ih9JEQXk2e3AC+LlyavB3FP7Y9UzrRowMXKgLoL8stPAcPmsRUqcnaTFQBdVV vuuxhapvzJWKGjYiThWo4gi75ofN92wQsa2XPs7pJIckqOzyUj4eImaR58jDEmH7LJ GNvJX+qYPWKMS8M1NSQE9MKqNhV3Kyw1Z+nNUVreM4sXCaQv+kg9XA38430EzHC84t oGe4ydM21Ix3A==
Content-Type: multipart/mixed; boundary="Apple-Mail-3BEE4AC2-DBAA-4DF4-9B98-F2F7F6776439"
Content-Transfer-Encoding: 7bit
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Mime-Version: 1.0 (1.0)
Date: Sat, 18 Apr 2026 08:13:09 +0100
Message-Id: <07F130B5-B624-44BE-9A79-F23B9ACAEE91@erg.abdn.ac.uk>
References: <8AA912DE-C756-4402-A1DB-E81237E4AAAC@apple.com>
In-Reply-To: <8AA912DE-C756-4402-A1DB-E81237E4AAAC@apple.com>
To: Stuart Cheshire <cheshire=40apple.com@dmarc.ietf.org>
X-Mailer: iPad Mail (19H394)
Message-ID-Hash: BKZLBPYWPQBPPQHBZT3MQG47D4477VY2
X-Message-ID-Hash: BKZLBPYWPQBPPQHBZT3MQG47D4477VY2
X-MailFrom: gorry@erg.abdn.ac.uk
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: draft-ietf-tcpm-accurate-ecn@ietf.org, tcpm@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [tcpm] Re: Last Call: <draft-ietf-tcpm-accurate-ecn-31.txt> (More Accurate Explicit Congestion Notification (ECN) Feedback in TCP) to Proposed Standard
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/6OQNXFyW2mmWJf0_ItJ5EmLcyGI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>

Hello Stuart,

Top posting here - this document is in the RFC Auth-48 state.  I believe the final form does address the issues raised by the review, and will be shortly issued as an RFC. From my own sides, I do also see this an important piece of work, and one that is the result of a lot of contributions! I look forward to seeing this published.

I will leave it to the editors , if they wish to add more to answer specific questions…

Best wishes,
Gorry

> 
> On 18 Apr 2026, at 00:45, Stuart Cheshire <cheshire=40apple.com@dmarc.ietf.org> wrote:
> 
> On Jan 27, 2025, at 11:59, The IESG <iesg-secretary@ietf.org> wrote:
> 
>> The IESG has received a request from the TCP Maintenance and Minor Extensions
>> WG (tcpm) to consider the following document: - 'More Accurate Explicit
>> Congestion Notification (ECN) Feedback in TCP'
>> <draft-ietf-tcpm-accurate-ecn-31.txt> as Proposed Standard
>> 
>> The IESG plans to make a decision in the next few weeks, and solicits final
>> comments on this action. Please send substantive comments to the
>> last-call@ietf.org mailing lists by 2025-02-10. Exceptionally, comments may
>> be sent to iesg@ietf.org instead. In either case, please retain the beginning
>> of the Subject line to allow automated sorting.
> 
> Just writing to check in on this.
> 
> It has been over a year since the Last Call on this document, and it has been in AUTH48 for a while.
> 
> I’m particularly interested in the following issue, which I previously mentioned in passing in my review on 6th February 2025:
> 
>> Testing for Zeroing of the ACE Field
>> 
>>  The possibility of re-ordering means that there is a small chance
>>  that the ACE field on the first packet to arrive is genuinely zero
>>  (without middlebox interference).  This would cause a host to
>>  unnecessarily disable ECN for a half connection.  Therefore, in
>>  environments where there is no evidence of the ACE field being
>>  zeroed, implementations can skip this test.
>> 
>> I have reservations about this test. The idea that this heuristic might suffer from false positives and falsely disable Accurate ECN for no good reason worries me. A user is expecting the low-latency benefits of L4S and Accurate ECN, and then though no fault of their own sometimes does not get these benefits. I also have mixed feelings about the trade-off that is implicit here: If there are defective middleboxes on the path, would we like to see these middleboxes fixed, or do we want to enable them to remain broken in perpetuity (to the detriment of all the people unfortunate enough to have their traffic traverse those defective middleboxes)?
>> 
>> Knowing what we know now in 2025, is this zero-ACE-field check still necessary? I would hate to have a heuristic designed to work around failures of the past end up becoming a liability that causes a new set of unpredictable failures indefinitely into the future.
> 
> Subsequently this mild reservation proved to be justified, when Koen De Schepper discovered it was causing real operational problems. I believe this code has been removed from Linux now, and I gave the attached presentation at IETF 124 in Montréal, November 2025. I believe we agreed that this text had proven unwise and should be removed before publication.
> 
> Where do we stand on this? Was the change made in the RFC to match the reality of what Linux (and other platforms) actually do? Is the RFC ready to publish?
> 
> TCP Accurate ECN is awesome work, and I hate to see it languish.
> 
> Stuart Cheshire
> 
> _______________________________________________
> tcpm mailing list -- tcpm@ietf.org
> To unsubscribe send an email to tcpm-leave@ietf.org