[tcpm] FW: Review of draft-bagnulo-tcpm-generalized-ecn (David Black)

"Black, David" <David.Black@dell.com> Fri, 07 April 2017 15:46 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36D5A128959 for <tcpm@ietfa.amsl.com>; Fri, 7 Apr 2017 08:46:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.721
X-Spam-Level:
X-Spam-Status: No, score=-2.721 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=dell.com header.b=ETWKD16r; dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=emc.com header.b=p2Vnhweq
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Srj54iZNuAXm for <tcpm@ietfa.amsl.com>; Fri, 7 Apr 2017 08:46:37 -0700 (PDT)
Received: from esa7.dell-outbound.iphmx.com (esa7.dell-outbound.iphmx.com [68.232.153.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C01B1293D6 for <tcpm@ietf.org>; Fri, 7 Apr 2017 08:46:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=dell.com; i=@dell.com; q=dns/txt; s=smtpout; t=1491579699; x=1523115699; h=from:cc:to:subject:date:message-id: content-transfer-encoding:mime-version; bh=qBzGdrUyBj5fNzPWstDxunYQzw8BdsYsvd7WorF9zeo=; b=ETWKD16rhVd/tOuJCsUFdYn5g+oparyM9fpkvvUvgebjJCmkmr4pvCcw lcQwNFXbd6qfLewqx0kwKkdwUQBJtcRTO3nPu/gMWnFRCXI8DpidGzzqD yySAyrtOsL69vvqmjnMXIsUuZIzQVzV20NixaAaD4gfFWc5vFDsFbYbAj g=;
Received: from esa1.dell-outbound2.iphmx.com ([68.232.153.201]) by esa7.dell-outbound.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Apr 2017 10:41:39 -0500
From: "Black, David" <David.Black@dell.com>
Cc: "Black, David" <David.Black@dell.com>
Received: from mailuogwhop.emc.com ([168.159.213.141]) by esa1.dell-outbound2.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Apr 2017 21:44:45 +0600
Received: from maildlpprd04.lss.emc.com (maildlpprd04.lss.emc.com [10.253.24.36]) by mailuogwprd03.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id v37FkXxA029053 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <tcpm@ietf.org>; Fri, 7 Apr 2017 11:46:35 -0400
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd03.lss.emc.com v37FkXxA029053
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1491579995; bh=ZvNKz00YuGBEb3YLVRwT1USc2fQ=; h=From:To:CC:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=p2VnhweqKv0cS0QoO+eoFe8gTTh7qi2t1fXWs3uC28KdW+a1F5qoP5g51wGxtPy6k ZdFNCqU9D8aOI2iooXfLcYcxdwGFJil3Prm2zcI4pcqACTOhKdybC1dE0ceL+aMIt5 kXO7dWJconwrbxlqMWBYBnR9EvAnf9whyikcjYpc=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd03.lss.emc.com v37FkXxA029053
Received: from mailusrhubprd54.lss.emc.com (mailusrhubprd54.lss.emc.com [10.106.48.19]) by maildlpprd04.lss.emc.com (RSA Interceptor) for <tcpm@ietf.org>; Fri, 7 Apr 2017 11:45:09 -0400
Received: from MXHUB303.corp.emc.com (MXHUB303.corp.emc.com [10.146.3.29]) by mailusrhubprd54.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id v37FkH9K024204 (version=TLSv1.2 cipher=AES128-SHA256 bits=128 verify=FAIL) for <tcpm@ietf.org>; Fri, 7 Apr 2017 11:46:17 -0400
Received: from MX307CL04.corp.emc.com ([fe80::849f:5da2:11b:4385]) by MXHUB303.corp.emc.com ([10.146.3.29]) with mapi id 14.03.0266.001; Fri, 7 Apr 2017 11:46:17 -0400
To: "tcpm@ietf.org" <tcpm@ietf.org>
Thread-Topic: FW: Review of draft-bagnulo-tcpm-generalized-ecn (David Black)
Thread-Index: AdKvtheSW8e/Q8HxSQe3bn4h+L8u/Q==
Date: Fri, 07 Apr 2017 15:46:16 +0000
Message-ID: <CE03DB3D7B45C245BCA0D243277949362F9B2DB4@MX307CL04.corp.emc.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.238.44.125]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd54.lss.emc.com
X-RSA-Classifications: public
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/B5oXjSP0GwmD66MWlMXZDZQwBJA>
Subject: [tcpm] FW: Review of draft-bagnulo-tcpm-generalized-ecn (David Black)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Apr 2017 15:46:39 -0000

I sent this review to the draft authors privately, and they asked that I forward to the TCPM list; this version had been edited slightly from what I sent to the draft authors.  Please cc: me directly on any responses or follow-up emails, as I'm not currently on the TCPM list.

In general, I think this draft is headed in the right direction.  I've limited this review to items with at least moderate technical impact.  I apologize that it's taken over 4 months to get this review done - the day job has been putting much more pressure on my IETF activity that expected since the start of this year.

Overall concern: Abstract and Introduction should make it clear  that this draft is primarily about Accurate ECN, with applicability to vanilla RFC 3168 ECN being an open question for further discussion.  It's also not clear to me whether applicability to vanilla RFC 3168 ECN is a single global decision for all packet types vs. a per-packet-type decision.

-- Section 1.3

OLD
   RFC3168 does not prevents from using ECN in TCP
   control packets lightly.  It provides a number of specific reasons
   for each packet type.  In this Section 4, we revisit each of the
   arguments provided by RFC3168 and explore possibilities to enable the
   ECN capability in the different packet types.
NEW
   RFC3168 does not prohibit use of ECN for TCP
   control packets lightly.  It provides a number of specific reasons why
   ECN should not be used for each packet type.  In this Section 4, we analyze
   each of the reasons provided by RFC3168 as part of explaining why this
   experiment is reasonable to conduct for each of the different packet types.

Last sentence in old text is too weak - "explore possibilities" doesn't sound like providing a solid rationale for experimentation.

-- Section 2

OLD
   Retransmission: A TCP segment that has been retransmitted by the TCP
   sender because it determined that the original segment was lost,
   which may or may not be the case.
NEW
   Retransmission: A TCP segment that has been retransmitted by the TCP
   sender.

Shortened definition to improve clarity.

-- Section 3.1

This section is problematic as written, as it appears to require a router to parse TCP packets and maintain enough state to detect retransmissions.  That's surely not what was intended ;-).   This section should be rewritten and dramatically shorted to require that routers treat ECT-marked TCP control packets and retransmissions just like any other ECT-marked packet, as specified in RFC 3168 (and don't repeat lengthy RFC 3168 text here).

The reason to rewrite this section to point to RFC 3168 is that any divergence from RFC 3168 network node behavior for other ECT-marked packets is likely to not only be a bad idea, but to also be fatal to this proposal.  It's ok to cite RFCs beyond 3168 if needed to specify  the network node behavior.

-- Section 3.2.1.1

   The server SHOULD not set any of the ECT codepoints if
   the server is included in the cache as not supporting ECN in the SYN
   packet.

Which cache?  The natural reading of this text is "the client's cache" in which case this requirement is unimplementable as written because the server can't see the client's cache.  I suspect that the actual requirement is that the server not change its ECN behavior until any client cache entry for it is certain to have aged out (how long would that be? provide an answer ...).   There appears to be an analogous concern with the server cache in 3.2.1.2.

--Section 3.2.2.1

   Also, it should be noted than if an ACK
   is dropped due to congestion the sender of the ACK does not react by
   reducing the load in any way.

Given that statement, much of the discussion of how to reduce sender load on the network may be irrelevant.   In the quoted sentence, at  least the first instance of "ACK" should be "pure ACK".

-- Section 3.2.3.1

I think the reduction in offered load discussion in this section is pointless; the sender should behave as if the Zero Window Probe were dropped.

-- End of Section 3.2

This would be a good place to summarize sender and receiver behavior changes.  That summary is needed anyhow, as the changes to RFC 3168 need to be clearly called out, and preferably summarized in one place.

-- Section 4.1

   In particular, setting the CE
   codepoint in the very same packet seem to fulfill this criteria,
   since either the packet is delivered and the CE codepoint signal is
   delivered to the endpoint, or the packet is dropped, so the original
   congestion signal through the packet loss is delivered to the
   endpoint.

That assumes that "the very same packet" will be retransmitted, which is correct for data packets, but not control packets (e.g., a pure ACK  or a zero window probe).  What may be missing (or not well stated in the rest of this paragraph) is that drops of these packets don't cause congestion reactions. 

   As currently specified, ECN adoption implies an increased reliability
   of the ECN congestion signal and a decrease in the reliability in the
   TCP control packets.  We believe that it is possible and desirable to
   restore the tradeoff existent in non ECN capable networks in terms of
   reliability, where the congestion signal delivery is as reliable as
   in a non ECN capable network and so it is the delivery of TCP control
   packets.

Add a section reference for decrease in reliability - to Section 1.1 ??

Thanks, --David
--------------------------------------------------------
David L. Black, Distinguished Engineer
Dell EMC, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953     Cell: +1 (978) 394-7754
David.Black@dell.com  <=== NEW ===
--------------------------------------------------------