Re: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn

"Scharf, Michael (Nokia - DE/Stuttgart)" <michael.scharf@nokia.com> Wed, 18 July 2018 13:12 UTC

Return-Path: <michael.scharf@nokia.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F69E1311F1; Wed, 18 Jul 2018 06:12:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U-jdkVN0e66t; Wed, 18 Jul 2018 06:12:31 -0700 (PDT)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70135.outbound.protection.outlook.com [40.107.7.135]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1451A1311FB; Wed, 18 Jul 2018 06:12:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=a2EGFn2fpReXDtMsKnLfo0uyXNi44jNqUt/fi+8lFiM=; b=XFP8ZS1GXvSBEo1tu0Ded8N1KzI5DubZ6zF+4JE33DOpAgy6aSdBhrdUKfvFv1499H9ZB/RaYNnP5+I3suu4spUDNGy5hWi6xoG0P6wVerCDdNwAPrb/PGwyCunBaxfWEcX5Pgnb6Jzhj+clgJYm8ZoVgP45Ejz3iJJ624beJWg=
Received: from VI1PR07MB0880.eurprd07.prod.outlook.com (10.161.108.22) by VI1PR07MB3373.eurprd07.prod.outlook.com (10.175.244.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.973.16; Wed, 18 Jul 2018 13:12:04 +0000
Received: from VI1PR07MB0880.eurprd07.prod.outlook.com ([fe80::3c69:da1e:3095:ab25]) by VI1PR07MB0880.eurprd07.prod.outlook.com ([fe80::3c69:da1e:3095:ab25%11]) with mapi id 15.20.0973.016; Wed, 18 Jul 2018 13:12:04 +0000
From: "Scharf, Michael (Nokia - DE/Stuttgart)" <michael.scharf@nokia.com>
To: Bob Briscoe <ietf@bobbriscoe.net>, "draft-ietf-tcpm-accurate-ecn@ietf.org" <draft-ietf-tcpm-accurate-ecn@ietf.org>, "tcpm@ietf.org" <tcpm@ietf.org>
Thread-Topic: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn
Thread-Index: AdQceOJERSLj2vrfRDK99tsOpJm3vgA5JfwAAAuIsyAAEAC+AAAADp/gABA0BIAAAApQUAAc0kiAAAAe2AAABcVwAA==
Date: Wed, 18 Jul 2018 13:12:04 +0000
Message-ID: <VI1PR07MB0880A773470BEAF2B86AE69393530@VI1PR07MB0880.eurprd07.prod.outlook.com>
References: <AM2PR07MB086725AB3E0DFF2CFFAAE07A935E0@AM2PR07MB0867.eurprd07.prod.outlook.com> <9cc642a7-10e9-3adb-2c49-4a52da9d206c@bobbriscoe.net> <VI1PR07MB0880170EF06C9CE1C63A464C935C0@VI1PR07MB0880.eurprd07.prod.outlook.com> <b9125c5a-d774-8d16-aec5-6712bd4bdb2f@bobbriscoe.net> <VI1PR07MB088038B7B4E017DCCF4F2718935C0@VI1PR07MB0880.eurprd07.prod.outlook.com> <c79e6b9f-c270-64b6-c6c0-1250b0c04fc6@bobbriscoe.net> <VI1PR07MB088008BBCA30D8391D31E302935C0@VI1PR07MB0880.eurprd07.prod.outlook.com> <fad5a5f9-b861-fc32-85e3-142212fb0113@bobbriscoe.net> <2faf9b21-28ba-283c-3bea-8fd3941ccb40@bobbriscoe.net>
In-Reply-To: <2faf9b21-28ba-283c-3bea-8fd3941ccb40@bobbriscoe.net>
Accept-Language: en-US, de-DE
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=michael.scharf@nokia.com;
x-originating-ip: [135.245.212.158]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB3373; 6:5bmjt3iznyiSDPNNTDt5jq0sHs9kisZkvAZCOR7Jd1HNbO3XTYHIa53jVarrCJr6LGiRKZdvbT5LkqjMnjfq7Axzgq9x1jKJYfAPgO6ihcGAZeWNeg1ax+kckWITQMz9nrbZU11Gd9QPU2cGHIgVHZZL04PBCBr3onh2XC5IBzREZe4mCZFSsfLKV3icxrFbaO9ASa3R8fVGXHdA23qLq2/WtJRa+rp6yyxVzLl7KJm/MRC2fqckWT0Egyha0PuiT7MdE9Nr76TC5BrKd1t91xFQdzBJwyo6xHyAJobJ5K9xB8CES/+JbDAnP5JNe7rvee90kIFwknwqzApAwQGieIcfWvAMPhgfrmURsBuc7rNkd0vvb4fMQ+9Wjxp5DaFcZv3hOC9qTKLrKAp1FsgoV0Z76o1oS4bElhVQeSX38ujMAjTBF8lKHWZDJrZY1uDyOJJEdDUrJuXWa1I9J5kvzQ==; 5:7d9m+FjCAxPo7u/gZy/2fW2AB49xwBbNi65HrN9btiEn+aWVeOyTCqWKZ4s4bd0bmJ0BCfCulxqyuCt2tI9FRQF1SLIJXei5xzyE6Dz8ZZV8S2ttGWRoBkw/Ll5BVOJqIluncu/9WnnHko0Vc0FAqigthtmw79O85dkwFtcvaGA=; 7:9GN1lRZlssqH/ZKXQhMC2TWXaTQ/4TJQh/CRupuOrZVIM5C9leOJa4unKvVIuIJumkZoR1zAOuNueXU7BoQqkyJvv8CbRooKhN2xzf86UQYDnC50szIFC5Hv9qdKLVVgzHujEnB2l/aELS5HO/f6e7ow/AAYpuALsUFt+rh0Ra0OxRsPC5TwtUMTyNzMcUJ1/E4vzix9L4GyGHRx84w4gOepy4RUYb7Geb/euShQhT3YT/RxIRMteRE6wo1vT8n2
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 95ddcda9-c449-469b-1260-08d5ecb00e6b
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:(109105607167333); BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(48565401081)(2017052603328)(7193020); SRVR:VI1PR07MB3373;
x-ms-traffictypediagnostic: VI1PR07MB3373:
x-microsoft-antispam-prvs: <VI1PR07MB3373E5BA47C92C866F1108BA93530@VI1PR07MB3373.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(190756311086443)(158342451672863)(82608151540597)(109105607167333)(195916259791689)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(3002001)(3231311)(11241501184)(806099)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123558120)(20161123564045)(6072148)(201708071742011)(7699016); SRVR:VI1PR07MB3373; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB3373;
x-forefront-prvs: 0737B96801
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(376002)(366004)(136003)(39860400002)(346002)(53754006)(189003)(199004)(93886005)(6116002)(3846002)(606006)(316002)(5250100002)(2501003)(2906002)(11346002)(256004)(790700001)(476003)(2900100001)(110136005)(6436002)(14444005)(446003)(99286004)(8936002)(66066001)(229853002)(86362001)(2201001)(486006)(53936002)(33656002)(7736002)(6246003)(6506007)(53546011)(26005)(81156014)(81166006)(236005)(53376002)(97736004)(68736007)(8676002)(76176011)(54896002)(6306002)(966005)(9686003)(55016002)(74316002)(5660300001)(25786009)(186003)(478600001)(7696005)(102836004)(106356001)(105586002)(14454004); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB3373; H:VI1PR07MB0880.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: kCMq6wagfT1+dathezd5010RAlQitdQGj3ZQ93mqHYyud+dox2RsOPZCuN2wasQr1LwWjO67gLILc69aoL0LostgU5wCgka/JWHUu6hGx8b/hTUsmx5t/BCrHLVOnpTMOfnLhaiu/4ItCefgRlMvgkICmD1eUPibKMYyEBIwXx4l+pmwJq+LEl+NJ2hS8KqoG9cGQtORksLLukrs2sQiigEnoUcv5dLZ+llrDPokv9KWYT+p+Dj++XmC+Hn6UQrs63NPFx+03e2t4Dlm3bBZhHrYDC9Y3RKwvyCDogYNdL/HQnyM6ucDSAz6OuhVUfHTrg1yHzNhSFjGuE+Dk/KYHxTZYjXAsSfmQ+oZhV54n9C0w2coM8Calat2IXGNXXI7e2gK33w6QzRCdv/hnFAG7Q==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR07MB0880A773470BEAF2B86AE69393530VI1PR07MB0880eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 95ddcda9-c449-469b-1260-08d5ecb00e6b
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2018 13:12:04.0748 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB3373
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/FPrND-_SHrwKmYBi8GSIhph9aDA>
Subject: Re: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Jul 2018 13:12:46 -0000

The following wording might work for me:

   It is recommended that the AccECN protocol is implemented alongside

   the experimental ECN++ protocol [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>].

   Therefore, this specification does not discuss implementing AccECN alongside

   [RFC5562], which is an earlier experimental protocol.

As far as I know, the experiment of RFC 5562 has not been officially finished so far, i.e., use of past tense might not be appropriate.

(Personally, I could imagine that TCPM decides to finish the experiment of RFC 5562, but that question does not belong into this I-D.)

Michael


From: Bob Briscoe [mailto:ietf@bobbriscoe.net]
Sent: Wednesday, July 18, 2018 12:18 PM
To: Scharf, Michael (Nokia - DE/Stuttgart) <michael.scharf@nokia.com>; draft-ietf-tcpm-accurate-ecn@ietf.org; tcpm@ietf.org
Subject: Re: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn

Michael,

Sorry, I meant to add back in 'Therefore':

   It is recommended that the AccECN protocol is implemented alongside

   the experimental ECN++ protocol [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>].

   Therefore, this specification does not discuss implementing AccECN alongside

   [RFC5562], which was an earlier experimental protocol with narrower

   scope than ECN++.


Bob
On 18/07/18 06:14, Bob Briscoe wrote:
Michael,

That regains the problem I said I was trying remove, of risking implying "AccECN could also be combined with RFC5562, but this isn't the place to talk about it?", by not explaining that ECN++ subsumes the function of RFC5562. How about:

   It is recommended that the AccECN protocol is implemented alongside

   the experimental ECN++ protocol [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>].

   This specification does not discuss implementing AccECN alongside

   [RFC5562], which was an earlier experimental protocol with narrower

   scope than ECN++.



Bob
On 17/07/18 17:01, Scharf, Michael (Nokia - DE/Stuttgart) wrote:
This wording would imply that ECN++ and RFC 5562 are indeed “alternatives”. That is IMHO not fully correct, ECN++ seems to have a broader scope.

I think something along the lines of …


   It is recommended that the AccECN protocol is implemented alongside

   the experimental ECN++ protocol [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>].

   This specification does not discuss implementing AccECN

   alongside the experimental protocol [RFC5562].

… does the job.

Michael



From: Bob Briscoe [mailto:ietf@bobbriscoe.net]
Sent: Tuesday, July 17, 2018 10:28 PM
To: Scharf, Michael (Nokia - DE/Stuttgart) <michael.scharf@nokia.com><mailto:michael.scharf@nokia.com>; draft-ietf-tcpm-accurate-ecn@ietf.org<mailto:draft-ietf-tcpm-accurate-ecn@ietf.org>; tcpm@ietf.org<mailto:tcpm@ietf.org>
Subject: Re: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn

Michael,

OK RECOMMENDED -> recommended.
That's good, otherwise I think ECN++ would have become a normative reference.



Alternatively, a more statement not related to the status would be “a combination of AccECN with RFC 5562 is outside the scope of this document”.
Someone who had never even thought about combining AccECN with RFC5562 might think we mean "AccECN could also be combined with RFC5562, but this isn't the place to talk about it?"

How about:

   It is recommended that the AccECN protocol is implemented alongside

   the experimental ECN++ protocol [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>].

   Therefore, this specification does not discuss implementing AccECN

   alongside the earlier experimental alternative to ECN++ in [RFC5562].




Bob
On 17/07/18 08:57, Scharf, Michael (Nokia - DE/Stuttgart) wrote:
I would prefer the first, shorter wording.

For instance, it would be possible that TCPM decides to obsolete RFC 5562. I’d suggest to keep the status and future use of RFC 5562 in combination with ECN++ outside of this document.

What might be in scope of the AccECN spec would be a hypothetical use of AccECN in combination with RFC 5562. But I would be fine with just omitting that. Alternatively, a more statement not related to the status would be “a combination of AccECN with RFC 5562 is outside the scope of this document”.

Actually, I am also not sure if this paragraph is a good example for RECOMMENDED in a capital letters. To me, the following would be sufficient:


   It is recommended that the AccECN protocol is implemented along with

   the experimental ECN++ protocol [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>].

Michael

From: Bob Briscoe [mailto:ietf@bobbriscoe.net]
Sent: Tuesday, July 17, 2018 2:43 PM
To: Scharf, Michael (Nokia - DE/Stuttgart) <michael.scharf@nokia.com><mailto:michael.scharf@nokia.com>; draft-ietf-tcpm-accurate-ecn@ietf.org<mailto:draft-ietf-tcpm-accurate-ecn@ietf.org>; tcpm@ietf.org<mailto:tcpm@ietf.org>
Subject: Re: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn

Michael,

I've written the proposed edits into a local copy of draft-08, which we'll post after this IETF.

Wile writing the last point, I thought it best to add an extra sentence.

   It is RECOMMENDED that the AccECN protocol is implemented along with

   the experimental ECN++ protocol [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>].

   [I-D.ietf-tcpm-generalized-ecn] is a proposed alternative to another

   experimental scheme [RFC5562] so there is no need to implement RFC

   5562 along with AccECN.




Bob
On 17/07/18 01:05, Scharf, Michael (Nokia - DE/Stuttgart) wrote:
This would for for me.

Thanks

Michael

From: Bob Briscoe [mailto:ietf@bobbriscoe.net]
Sent: Tuesday, July 17, 2018 1:34 AM
To: Scharf, Michael (Nokia - DE/Stuttgart) <michael.scharf@nokia.com><mailto:michael.scharf@nokia.com>; draft-ietf-tcpm-accurate-ecn@ietf.org<mailto:draft-ietf-tcpm-accurate-ecn@ietf.org>; tcpm@ietf.org<mailto:tcpm@ietf.org>
Subject: Re: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn

Michael,
On 15/07/18 16:54, Scharf, Michael (Nokia - DE/Stuttgart) wrote:

Hi all,



While reading draft-ietf-tcpm-accurate-ecn-07, I noticed the following:





Section 1. Introduction



   It is likely (but not required) that the AccECN protocol will be

   implemented along with the following experimental additions to the

   TCP-ECN protocol: ECN-capable TCP control packets and retransmissions

   [I-D.ietf-tcpm-generalized-ecn], which includes the ECN-capable SYN/

   ACK experiment [RFC5562]; and testing receiver non-compliance

   [I-D.moncaster-tcpm-rcv-cheat].



[ms] I have commented on this section before. And I still dislike the term "likely". To me, "likely" is speculation. A neutral phrasing would be "... it is possible..." or "... it is useful...". Having said this, I observe that draft-moncaster-tcpm-rcv-cheat-03 was last updated in 2014. How "likely" is it that the AccECN protocol will be implemented along with a mechanism documented in an ID that has been written more than 10 years ago and not been updated for about 4 years? Are implementers indeed so interested in draft-moncaster-tcpm-rcv-cheat that an implementation is "likely"?

I agree. For ECN++, I think something like your suggestion of "useful", or even RECOMMENDED is what is needed here. I think the testing receiver compliance one could be removed from the intro. It's mentioned under testing for unexpected interference and under integrity checking, which are sufficient.

Also, this makes me notice that the word "includes" is wrong. ECN++ intends to obsolete RFC5562, but I don't think we need to mention that here (cos it might change before ECN++ gets published).

CURRENT TEXT:

   It is likely (but not required) that the AccECN protocol will be

   implemented along with the following experimental additions to the

   TCP-ECN protocol: ECN-capable TCP control packets and retransmissions

   [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>], which includes the ECN-capable SYN/

   ACK experiment [RFC5562<https://tools.ietf.org/html/rfc5562>]; and testing receiver non-compliance

   [I-D.moncaster-tcpm-rcv-cheat<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.moncaster-tcpm-rcv-cheat>].
PROPOSED TEXT:

   It is RECOMMENDED that the AccECN protocol is implemented along with

   the experimental ECN++ protocol [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>].












Section 2.1.  Capability Negotiation



   The TCP server sends the AccECN

   Option on the SYN/ACK and the client sends it on the first ACK to

   test whether the network path forwards the option correctly.



[ms] According to Section 3.2.6, options are RECOMMENDED. While Section 2 is not normative, the whole Section 2 does not really describe well the actual requirements regarding options. This paragraph in Section 2.1 is one example for that. It would make sense to be more explicit in Section 2 to which extent options have to be supported.
OK, we need to review section 2, to ensure it is consistent with changes that have been made in the normative section 3 since it was written.

In this particular case, we already promised to check (offlist with an implementer) that there was no text that contradicted the optionality of the option stated at the end of Section 3.2.6.

I have already started this with a list I prepared (also offlist) of which middlebox checking sections an implementer could ignore if they were only reading but not sending the TCP options.




Bob







--

________________________________________________________________

Bob Briscoe                               http://bobbriscoe.net/





--

________________________________________________________________

Bob Briscoe                               http://bobbriscoe.net/




--

________________________________________________________________

Bob Briscoe                               http://bobbriscoe.net/



--

________________________________________________________________

Bob Briscoe                               http://bobbriscoe.net/



--

________________________________________________________________

Bob Briscoe                               http://bobbriscoe.net/