[tcpm] Further comments on draft-ietf-tcpm-accurate-ecn

"Scharf, Michael (Nokia - DE/Stuttgart)" <michael.scharf@nokia.com> Sun, 15 July 2018 20:54 UTC

Return-Path: <michael.scharf@nokia.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C0C0130E77; Sun, 15 Jul 2018 13:54:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1PwDRUAWlJ0Y; Sun, 15 Jul 2018 13:54:39 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on072b.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe1e::72b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6AD1F130E6A; Sun, 15 Jul 2018 13:54:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZJNmN827VpBuKNEVuZRyLRX+A1N2oUQ9IXEzd149WBw=; b=ciHOvz4W5m7iVqO2XC8rH77pv4c2mtZmm1i5oPFE6WIfFZZnurFIrmbuueI4V4upB879m3QGNfCtjzUuQ7eUWzVC7G+mve1VVgNDldVeg/jS2PxhCHJ4KTOG0f/sAXADhnWIZoVCPEZBZ5nE1mfFUgbrDgFgVVLwgBuNA7wLy7M=
Received: from AM2PR07MB0867.eurprd07.prod.outlook.com (10.161.71.153) by AM2PR07MB0562.eurprd07.prod.outlook.com (10.160.32.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.952.14; Sun, 15 Jul 2018 20:54:31 +0000
Received: from AM2PR07MB0867.eurprd07.prod.outlook.com ([fe80::2408:bde2:6996:189d]) by AM2PR07MB0867.eurprd07.prod.outlook.com ([fe80::2408:bde2:6996:189d%10]) with mapi id 15.20.0973.013; Sun, 15 Jul 2018 20:54:31 +0000
From: "Scharf, Michael (Nokia - DE/Stuttgart)" <michael.scharf@nokia.com>
To: "draft-ietf-tcpm-accurate-ecn@ietf.org" <draft-ietf-tcpm-accurate-ecn@ietf.org>, "tcpm@ietf.org" <tcpm@ietf.org>
Thread-Topic: Further comments on draft-ietf-tcpm-accurate-ecn
Thread-Index: AdQceOJERSLj2vrfRDK99tsOpJm3vg==
Date: Sun, 15 Jul 2018 20:54:31 +0000
Message-ID: <AM2PR07MB086725AB3E0DFF2CFFAAE07A935E0@AM2PR07MB0867.eurprd07.prod.outlook.com>
Accept-Language: en-US, de-DE
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=michael.scharf@nokia.com;
x-originating-ip: [92.203.139.253]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM2PR07MB0562; 7:p49oQMrj9rYun5LRObxssNPt/YYbDcNuhzghwEZvRJysMNQwRw0F5h/rpkzTdjoVElfvc6xDekREwJBDQ/yXIkVfySEp3Er3wOX4j2pnKMC0XFxNleOG3goIaFjzuvZW9kZL0FWfQ+1YcLI8zt315dZxR7MkKizzT7jxph+qRMC25FbrXWZttj3GlizpzeM3CNKl+ggRnZOZ2suCPRYq3CJTg4W8rCMH9Do4VypRU/ZHSQ+7ogY5W3ON2Y85T+Qw
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: e1e00372-31f9-4453-e422-08d5ea9529df
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(48565401081)(5600053)(711020)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7193020); SRVR:AM2PR07MB0562;
x-ms-traffictypediagnostic: AM2PR07MB0562:
x-microsoft-antispam-prvs: <AM2PR07MB05620C2E2AD6182DFA3D93B6935E0@AM2PR07MB0562.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(190756311086443)(158342451672863)(72170088055959)(192374486261705);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(3231311)(11241501184)(806099)(944501410)(52105095)(3002001)(93006095)(93001095)(10201501046)(6055026)(149027)(150027)(6041310)(20161123558120)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(6072148)(201708071742011)(7699016); SRVR:AM2PR07MB0562; BCL:0; PCL:0; RULEID:; SRVR:AM2PR07MB0562;
x-forefront-prvs: 07349BFAD2
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(979002)(366004)(396003)(136003)(346002)(39860400002)(376002)(53754006)(199004)(189003)(26005)(5660300001)(5250100002)(2501003)(106356001)(2906002)(6506007)(186003)(102836004)(14454004)(53936002)(486006)(110136005)(478600001)(476003)(66066001)(450100002)(99286004)(316002)(25786009)(105586002)(7696005)(14444005)(7736002)(9686003)(86362001)(2900100001)(256004)(33656002)(74316002)(6116002)(68736007)(8676002)(305945005)(3846002)(8936002)(6436002)(55016002)(81156014)(97736004)(81166006)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1102; SCL:1; SRVR:AM2PR07MB0562; H:AM2PR07MB0867.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: iUyEMm9C/TA8/pOhTgm5wvkMTjHNc1mVu1k3PFVsJIjHyATTMYt1P4SoRUyQYM2rCMnaKwevuTfrrSk7aQEFvEu4EncCpwMfwMY6ofbHZQ9MbWtU+Sw5u+DLUZXVhH1p/trIMh2zmdVaAGQDKW5BQ0RJoOltyXr/Wvpe9wj3UrICYhCfVji05TY2CDSjN2/544kg/Dy4idhNBmZLtoPmt34gX2yZtU92x8VVk0jHFBRrZmKADHZE1biYLpRHpy1729VtyNut0+PDoQgj78WCSXDUqkUJ886/zNWUQ2oNtASUwEmDl0E726yFSxBX+J192Ey90zn6/n88M4sM5uOX5kA1tddhaQecJEU4VwQgTMfKKS7pb74Q+HPrXZdachgxwo8jqs5fnhfhjq+EjT8Jxw==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e1e00372-31f9-4453-e422-08d5ea9529df
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jul 2018 20:54:31.4477 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM2PR07MB0562
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/OMFwhNLPWTL2oedgZW3CeKO8xtI>
Subject: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 Jul 2018 20:54:42 -0000

Hi all,

While reading draft-ietf-tcpm-accurate-ecn-07, I noticed the following:


Section 1. Introduction

   It is likely (but not required) that the AccECN protocol will be
   implemented along with the following experimental additions to the
   TCP-ECN protocol: ECN-capable TCP control packets and retransmissions
   [I-D.ietf-tcpm-generalized-ecn], which includes the ECN-capable SYN/
   ACK experiment [RFC5562]; and testing receiver non-compliance
   [I-D.moncaster-tcpm-rcv-cheat].

[ms] I have commented on this section before. And I still dislike the term "likely". To me, "likely" is speculation. A neutral phrasing would be "... it is possible..." or "... it is useful...". Having said this, I observe that draft-moncaster-tcpm-rcv-cheat-03 was last updated in 2014. How "likely" is it that the AccECN protocol will be implemented along with a mechanism documented in an ID that has been written more than 10 years ago and not been updated for about 4 years? Are implementers indeed so interested in draft-moncaster-tcpm-rcv-cheat that an implementation is "likely"?


Section 2.1.  Capability Negotiation
   
   The TCP server sends the AccECN
   Option on the SYN/ACK and the client sends it on the first ACK to
   test whether the network path forwards the option correctly.

[ms] According to Section 3.2.6, options are RECOMMENDED. While Section 2 is not normative, the whole Section 2 does not really describe well the actual requirements regarding options. This paragraph in Section 2.1 is one example for that. It would make sense to be more explicit in Section 2 to which extent options have to be supported.


Section 7.  Security Considerations

[ms] I wonder about the security implications of "confusing" classic ECN and AccECN feedback in (passive) network monitoring solutions, most notably if packet sampling is used and no per-connection state is applied. At least theoretically, passive monitoring of "classic ECN" TCP header flags could be used for network monitoring, e.g., to estimate congestion levels in a network, no? How would such a (hypothetical) passive monitoring solution be able to distinguish the standard ECN feedback from an ongoing AccECN experiment, in particular in a sampled packet stream w/o having access to the SYN negotiation? Would there be security or safety implications when experimenting with AccECN in networks using network monitoring solutions that only support ECN as standardized by the IETF?


Thanks

Michael (chair hat off)