Re: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn

"Scharf, Michael (Nokia - DE/Stuttgart)" <michael.scharf@nokia.com> Tue, 17 July 2018 12:57 UTC

Return-Path: <michael.scharf@nokia.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9B78130EAC; Tue, 17 Jul 2018 05:57:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I4T9tsmDgBx0; Tue, 17 Jul 2018 05:57:05 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40134.outbound.protection.outlook.com [40.107.4.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8BD3D130DF5; Tue, 17 Jul 2018 05:57:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MFDKv4d33I5tW+mmUsY5tvn/Rh1F64mBRDbIWwb2cTo=; b=rliHNyDJupDfTTnrqDqv1Mucztsw3DxAs8exflC06IBQHhWXwiQq7K55P9ww5mzT0WdqOndNRAqCVlA3IjVPiAJqm7Bf22ONqNEDbJZTSDhIsBh0zEGQZU+9AGEDY3hfP9GDpbIq9FwJAcZdPXeDIZn0FQmFPDunRDFweL3ufIA=
Received: from VI1PR07MB0880.eurprd07.prod.outlook.com (10.161.108.22) by VI1PR07MB4365.eurprd07.prod.outlook.com (20.176.7.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.973.14; Tue, 17 Jul 2018 12:57:02 +0000
Received: from VI1PR07MB0880.eurprd07.prod.outlook.com ([fe80::3c69:da1e:3095:ab25]) by VI1PR07MB0880.eurprd07.prod.outlook.com ([fe80::3c69:da1e:3095:ab25%11]) with mapi id 15.20.0973.013; Tue, 17 Jul 2018 12:57:01 +0000
From: "Scharf, Michael (Nokia - DE/Stuttgart)" <michael.scharf@nokia.com>
To: Bob Briscoe <ietf@bobbriscoe.net>, "draft-ietf-tcpm-accurate-ecn@ietf.org" <draft-ietf-tcpm-accurate-ecn@ietf.org>, "tcpm@ietf.org" <tcpm@ietf.org>
Thread-Topic: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn
Thread-Index: AdQceOJERSLj2vrfRDK99tsOpJm3vgA5JfwAAAuIsyAAEAC+AAAADp/g
Date: Tue, 17 Jul 2018 12:57:01 +0000
Message-ID: <VI1PR07MB088038B7B4E017DCCF4F2718935C0@VI1PR07MB0880.eurprd07.prod.outlook.com>
References: <AM2PR07MB086725AB3E0DFF2CFFAAE07A935E0@AM2PR07MB0867.eurprd07.prod.outlook.com> <9cc642a7-10e9-3adb-2c49-4a52da9d206c@bobbriscoe.net> <VI1PR07MB0880170EF06C9CE1C63A464C935C0@VI1PR07MB0880.eurprd07.prod.outlook.com> <b9125c5a-d774-8d16-aec5-6712bd4bdb2f@bobbriscoe.net>
In-Reply-To: <b9125c5a-d774-8d16-aec5-6712bd4bdb2f@bobbriscoe.net>
Accept-Language: en-US, de-DE
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=michael.scharf@nokia.com;
x-originating-ip: [135.245.212.158]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB4365; 6:URoeyaF2gqVXrM9PKBf7ac/sf/6ZNR8xCumWaknalMsbwZ1N/5DJUSJLGL8mx0qsa2SFnIGxyOAgehZzoqTCBOvMbmBI+lzHfo1qEr8+z5FeCc4WO/nsppCBnvWJ5bIA76+N0IoOXWFkTUA61GKaT9gK+a7a2weUpY1xrO+9B47c7th0bLszrfsp5n1pUW0I4/GITC8D7W11WmU+9mxj1RQVlcd/s5qUE5zO6fxYdR0oQOL8Zy4ye8NzD5IzuAAVDQ7l72X7nUsPdPdzzQm6yOyXoBj71752pXV2djYTPQm5yS9vA4+wTRmpPtBpghdY7hKoN8hfxOodVigXv1oJrH8+CG4V8UfEy7pqPWDI4Sg/PYFgEVNch+Om8LBx2igp/oB0H7gDNnCbkO536fP1vmvZ7aU2JWn4Tm5GncjPmGc/Eo3mHOGsTbRtq1PsEJmCje+V74njAie7ltR4GhDXEQ==; 5:KuHCeeg14GXivYxAxh5En3BN1+YGEu/nwEHw12fwSJ8ohEAcvo7rMwbKhPA14au1xini9CcqBsA8utaMNzBVb/9sXD5Xld/3AIU4+eV46fdYiEOvV6OkZxHV7qFrjcc1e/doD0pD1m7Ekwnr3orPNdHe1BmvWg7EZ48ZBBrxSUo=; 7:FXa3B4qKwJLTlxwNP4v0Bf8AJTZHsTawvi+36gwQFMh9m55Ufwn8XRlE0WNsH8bUoyYa9+IwC8mrt3H+Bzudjp8JvQKpP3rkbo+1B6D44NAITcN/w1xTuZHFfX37F71udYPC6O0No8DS3O2BaZAIge0SN2amfp31BQmM/Cb2VBDoHpLGThI3E6yfmBw1PU76SSgFzq1D2CtT0cSiOEJj7gc+G1rw+5VEVcK6CtVR034ZVuhyd9mL7lJl6d1+9c4+
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 35489741-46f1-4f88-74eb-08d5ebe4ca2e
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:(109105607167333); BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(48565401081)(2017052603328)(7193020); SRVR:VI1PR07MB4365;
x-ms-traffictypediagnostic: VI1PR07MB4365:
x-microsoft-antispam-prvs: <VI1PR07MB43656BE4740A9E09BDB4CDD8935C0@VI1PR07MB4365.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(190756311086443)(158342451672863)(82608151540597)(109105607167333)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3002001)(3231311)(11241501184)(806099)(944501410)(52105095)(93006095)(93001095)(10201501046)(6055026)(149027)(150027)(6041310)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123558120)(20161123560045)(6072148)(201708071742011)(7699016); SRVR:VI1PR07MB4365; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB4365;
x-forefront-prvs: 073631BD3D
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(979002)(346002)(366004)(39860400002)(376002)(136003)(396003)(199004)(189003)(53754006)(99286004)(53546011)(81156014)(8676002)(606006)(76176011)(106356001)(55016002)(2906002)(26005)(105586002)(229853002)(446003)(110136005)(186003)(6506007)(11346002)(102836004)(6246003)(33656002)(97736004)(53376002)(66066001)(74316002)(6436002)(53936002)(7736002)(81166006)(8936002)(54896002)(7696005)(9686003)(5660300001)(68736007)(93886005)(25786009)(3846002)(236005)(2201001)(478600001)(316002)(790700001)(6116002)(14444005)(2501003)(14454004)(256004)(86362001)(5250100002)(2900100001)(476003)(486006)(966005)(6306002)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB4365; H:VI1PR07MB0880.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: mq9hKB82NfZiF2U6QaXBN03w/466hhO4gwt77SNYEzQmEWvAMJ86okY1ECVyDdgHTeqPu3jOzZweualJ8sYlTyR9GXKoWm6bMhFXaWe52H3MRc8cKXABJWivxx20jc1gHVSOTmTMXY687Rvvd70waJrufA/b4llkm4M8RSw6ka7NxVZb6M7N+mCRb9HvufMdfrCBHenYqC1siJbX/g82OSc2zCIvmKD2MHePSiJ6uzVTnhXPtx6oPWy+x20WL8DYZ+dp7Jn0YitWx644o+pkEtCTg8aXT/t+iycN/WdupaIifY4T6l2cidWzORubkrQSGFwag1BDMSRPUlgcbarfI78YaiVZ2Fq8F7rakVtZqOmPhBH2hYqNd5TBYJE+fDzketrSfD6xxiQ/z7pis8inMg==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR07MB088038B7B4E017DCCF4F2718935C0VI1PR07MB0880eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 35489741-46f1-4f88-74eb-08d5ebe4ca2e
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Jul 2018 12:57:01.8255 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB4365
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/JyBHqZuaamr2CORTf8dfGXJ3pnQ>
Subject: Re: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 12:57:09 -0000

I would prefer the first, shorter wording.

For instance, it would be possible that TCPM decides to obsolete RFC 5562. I’d suggest to keep the status and future use of RFC 5562 in combination with ECN++ outside of this document.

What might be in scope of the AccECN spec would be a hypothetical use of AccECN in combination with RFC 5562. But I would be fine with just omitting that. Alternatively, a more statement not related to the status would be “a combination of AccECN with RFC 5562 is outside the scope of this document”.

Actually, I am also not sure if this paragraph is a good example for RECOMMENDED in a capital letters. To me, the following would be sufficient:


   It is recommended that the AccECN protocol is implemented along with

   the experimental ECN++ protocol [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>].

Michael

From: Bob Briscoe [mailto:ietf@bobbriscoe.net]
Sent: Tuesday, July 17, 2018 2:43 PM
To: Scharf, Michael (Nokia - DE/Stuttgart) <michael.scharf@nokia.com>; draft-ietf-tcpm-accurate-ecn@ietf.org; tcpm@ietf.org
Subject: Re: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn

Michael,

I've written the proposed edits into a local copy of draft-08, which we'll post after this IETF.

Wile writing the last point, I thought it best to add an extra sentence.

   It is RECOMMENDED that the AccECN protocol is implemented along with

   the experimental ECN++ protocol [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>].

   [I-D.ietf-tcpm-generalized-ecn] is a proposed alternative to another

   experimental scheme [RFC5562] so there is no need to implement RFC

   5562 along with AccECN.




Bob
On 17/07/18 01:05, Scharf, Michael (Nokia - DE/Stuttgart) wrote:
This would for for me.

Thanks

Michael

From: Bob Briscoe [mailto:ietf@bobbriscoe.net]
Sent: Tuesday, July 17, 2018 1:34 AM
To: Scharf, Michael (Nokia - DE/Stuttgart) <michael.scharf@nokia.com><mailto:michael.scharf@nokia.com>; draft-ietf-tcpm-accurate-ecn@ietf.org<mailto:draft-ietf-tcpm-accurate-ecn@ietf.org>; tcpm@ietf.org<mailto:tcpm@ietf.org>
Subject: Re: [tcpm] Further comments on draft-ietf-tcpm-accurate-ecn

Michael,
On 15/07/18 16:54, Scharf, Michael (Nokia - DE/Stuttgart) wrote:

Hi all,



While reading draft-ietf-tcpm-accurate-ecn-07, I noticed the following:





Section 1. Introduction



   It is likely (but not required) that the AccECN protocol will be

   implemented along with the following experimental additions to the

   TCP-ECN protocol: ECN-capable TCP control packets and retransmissions

   [I-D.ietf-tcpm-generalized-ecn], which includes the ECN-capable SYN/

   ACK experiment [RFC5562]; and testing receiver non-compliance

   [I-D.moncaster-tcpm-rcv-cheat].



[ms] I have commented on this section before. And I still dislike the term "likely". To me, "likely" is speculation. A neutral phrasing would be "... it is possible..." or "... it is useful...". Having said this, I observe that draft-moncaster-tcpm-rcv-cheat-03 was last updated in 2014. How "likely" is it that the AccECN protocol will be implemented along with a mechanism documented in an ID that has been written more than 10 years ago and not been updated for about 4 years? Are implementers indeed so interested in draft-moncaster-tcpm-rcv-cheat that an implementation is "likely"?

I agree. For ECN++, I think something like your suggestion of "useful", or even RECOMMENDED is what is needed here. I think the testing receiver compliance one could be removed from the intro. It's mentioned under testing for unexpected interference and under integrity checking, which are sufficient.

Also, this makes me notice that the word "includes" is wrong. ECN++ intends to obsolete RFC5562, but I don't think we need to mention that here (cos it might change before ECN++ gets published).

CURRENT TEXT:

   It is likely (but not required) that the AccECN protocol will be

   implemented along with the following experimental additions to the

   TCP-ECN protocol: ECN-capable TCP control packets and retransmissions

   [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>], which includes the ECN-capable SYN/

   ACK experiment [RFC5562<https://tools.ietf.org/html/rfc5562>]; and testing receiver non-compliance

   [I-D.moncaster-tcpm-rcv-cheat<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.moncaster-tcpm-rcv-cheat>].
PROPOSED TEXT:

   It is RECOMMENDED that the AccECN protocol is implemented along with

   the experimental ECN++ protocol [I-D.ietf-tcpm-generalized-ecn<https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-07#ref-I-D.ietf-tcpm-generalized-ecn>].










Section 2.1.  Capability Negotiation



   The TCP server sends the AccECN

   Option on the SYN/ACK and the client sends it on the first ACK to

   test whether the network path forwards the option correctly.



[ms] According to Section 3.2.6, options are RECOMMENDED. While Section 2 is not normative, the whole Section 2 does not really describe well the actual requirements regarding options. This paragraph in Section 2.1 is one example for that. It would make sense to be more explicit in Section 2 to which extent options have to be supported.
OK, we need to review section 2, to ensure it is consistent with changes that have been made in the normative section 3 since it was written.

In this particular case, we already promised to check (offlist with an implementer) that there was no text that contradicted the optionality of the option stated at the end of Section 3.2.6.

I have already started this with a list I prepared (also offlist) of which middlebox checking sections an implementer could ignore if they were only reading but not sending the TCP options.




Bob





--

________________________________________________________________

Bob Briscoe                               http://bobbriscoe.net/



--

________________________________________________________________

Bob Briscoe                               http://bobbriscoe.net/