Re: [tcpm] Genart last call review of draft-ietf-tcpm-rto-consider-14

Martin Duke <martin.h.duke@gmail.com> Fri, 19 June 2020 18:58 UTC

Return-Path: <martin.h.duke@gmail.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB6D73A0D9B; Fri, 19 Jun 2020 11:58:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QIDYmO708fkk; Fri, 19 Jun 2020 11:58:12 -0700 (PDT)
Received: from mail-io1-xd2a.google.com (mail-io1-xd2a.google.com [IPv6:2607:f8b0:4864:20::d2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4373A3A0D7C; Fri, 19 Jun 2020 11:58:12 -0700 (PDT)
Received: by mail-io1-xd2a.google.com with SMTP id r2so12557695ioo.4; Fri, 19 Jun 2020 11:58:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8Cgp+v3g4iO/D+r/hmIHw63Xf/nb37jsC5MX/EKpzSk=; b=rkhkgjXgHtO7ox3I4FNkTaKb8DlMK02Olchx8mUL/JSOTP30kCAh23rkrNolGLMVUH F/29S2Sr+DIpEbxvax0XN1dOz1n2Kahhfk3t6/SJmxjIHQFxoGyfIkCQJp/Hszgl81yM zwF4ed5nFhO5AiVO5mLYzaBjmIOQsapFaRJRHidwt48uAj0AKZsrKib2saC77Fw4yXE/ wAcWAbP2iuly1qPkaBhU5Z6S0JaTBmxKEoBhMUF77OcmYsL9O5OBDnBUz5Ji82GDRCys LJxFc7FbZk5NttqKN0TYpK1IC+NX+b1LxubN93DZV0CFRbNhUNcmFThyr90Nw+qZZAqU tp4w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8Cgp+v3g4iO/D+r/hmIHw63Xf/nb37jsC5MX/EKpzSk=; b=bRL0Ule2i/dUEXNPx8q0StmShPF4v3zOZql3pojKIslU89mpL12lSWqwhqkuLUQMif QswEKgyGWXwbw29HX1K/La+3xe51N911+Fn2ZOgDToqPMEzj8RvXod6P0NqyPM2Oa0c7 P7q3aYIYqb0pHocY00gP8KT8vuvcDOAWj4+DbCNECEAJy1lSnor28lwJUoNR4TJqmpfG Fvg+0wVoT8NaNGeGCA38r9AerHDBSRT+iBfwQ4Z9VpPsdtcABzcSsUaQpuIh5e28303n oF31ouu66qEAYh1NIQ8UXxGkNkDbr4VnxGakpEG/vnpVDrI+L88jUUdPsvmhV2NjkoMd 0DNg==
X-Gm-Message-State: AOAM530weSLZoQKWai7MuxW01O94lcC2nbc8XQa5IJaBrYczDtlhAr+1 fRskUpYdMnQEw9CQSXyyX4GzHuG64CiPjc3YZAM=
X-Google-Smtp-Source: ABdhPJyV1SE0w6cxyFZv/aFpoNeesjQKYrTAzdACrpYabdhSXYTomC62jgdh90f9kpZfZoxq37fM690ivAOpobPvxMQ=
X-Received: by 2002:a6b:440d:: with SMTP id r13mr5557119ioa.95.1592593091489; Fri, 19 Jun 2020 11:58:11 -0700 (PDT)
MIME-Version: 1.0
References: <159083802039.5596.14695350463305243689@ietfa.amsl.com> <FE0FA7D5-176D-4111-95DA-BD5424A24FE2@icir.org> <9A0DBDC4-2E39-4D09-80A6-FEDE72ED205B@gmail.com> <0F4B56B1-C8B9-493E-B3CD-AC2FBA9E62E4@icir.org> <CAM4esxTAMgUc4gfL-_Z2bjChjaHJGWL0F5VJn8Nd-=j2Zj5V_A@mail.gmail.com> <CAM4esxROPy-MX8_fu5inMvsKYVKR16jjTkAntt9qy=vfGM+mUg@mail.gmail.com> <EB54EC6A-418E-430F-91B1-C6832A606257@gmail.com> <C275B130-44DE-46DC-B50C-9D288EE3A1A4@icir.org> <A970FFAB-5737-46E3-BAD6-73A9377FBFA3@gmail.com>
In-Reply-To: <A970FFAB-5737-46E3-BAD6-73A9377FBFA3@gmail.com>
From: Martin Duke <martin.h.duke@gmail.com>
Date: Fri, 19 Jun 2020 11:58:00 -0700
Message-ID: <CAM4esxTzsR1Ew2xaf1yzj=tAnnutGOiAZxmsOPjZp3W8E6YOUQ@mail.gmail.com>
To: Stewart Bryant <stewart.bryant@gmail.com>
Cc: Mark Allman <mallman@icir.org>, Review Team <gen-art@ietf.org>, tcpm <tcpm@ietf.org>, Last Call <last-call@ietf.org>, draft-ietf-tcpm-rto-consider.all@ietf.org, tom petch <daedulus@btconnect.com>
Content-Type: multipart/alternative; boundary="0000000000007d763e05a8747947"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/K-AR0qQPG78RMeGf_7SmeiuHU0w>
Subject: Re: [tcpm] Genart last call review of draft-ietf-tcpm-rto-consider-14
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Jun 2020 18:58:15 -0000

Hi Stewart,

I'm going to ship draft-16 to the IESG today. Any last concerns beyond the
stated differences from WG consensus?

Yoshi, please update the shepherd writeup to cover the flavor of this
discussion.

On Thu, Jun 18, 2020 at 7:18 AM Stewart Bryant <stewart.bryant@gmail.com>
wrote:

> Here is how we should proceed.
>
> We make as much progress as we can agree on which will clear some of the
> issue below.
>
> For any remaining issues for which you have wider consensus but where we
> cannot agree, I modify my review and the IESG decides how they wish to
> proceed.
>
> I am prepared to be in the rough but I have a duty to draw attention to
> concerns.
>
> Best regards
>
> Stewart
>
>
> > On 18 Jun 2020, at 14:32, Mark Allman <mallman@icir.org> wrote:
> >
> >
> > Last comment first ...
> >
> >> We are getting there, but I would ask that you take the transport
> >> hat off and look again from an infrastructure and packet transport
> >> perspective.
> >
> > I don't view this as looking at it from a transport
> > vs. infrastructure perspective.
> >
> > And, I am not disagreeing with your perspective.  My take is that
> > the nub of what you're saying is that there are cases where we know
> > something about the network.  And, that something let's us design a
> > more savvy loss detection and response scheme.  E.g., because the
> > link / path is known to be short and so using an initial RTO of 1sec
> > is too long.  E.g., because the cause of loss is known or can be
> > safely assumed to not be congestion.  And, I think that view is both
> > correct and reasonable.
> >
> > However, ...
> >
> > (0) I do not view that view as inconsistent with this document at
> >    all.
> >
> > (1) Because there are cases where we know more doesn't make a set of
> >    default requirements for the general case when we don't
> >    understand the path any less valid.
> >
> > (2) The document explicitly says alternates are fine modulo the
> >    usual consensus.  I.e., in cases where we have more information
> >    we can do things differently.  And, the cost of that is no
> >    different than the cost today (i.e., specifying it and gaining
> >    consensus).
> >
> > So, my view is that this all boils down to making it clear that this
> > is not somehow THE (best) way to do time-based loss detection for
> > all cases.  Rather, following the guidelines with result in a
> > safe-for-general-use loss detector.
> >
> >> In the general case, delay across a
> >>    network path depends not only on distance, but also a number of
> >>    variable components such as the route and the level of buffering in
> >>    intermediate devices.
> >>
> >> Its is more the contending/conflicting traffic rather than the
> >> buffering, or perhaps the time spent in queues, but “buffering” is
> >> a link a transport colloquial term.
> >
> > Per this and Gorry's note, I will tweak this to use queuing, as that
> > is what I meant.
> >
> >> Perhaps we could include a clearer disclaimer regarding the
> >> non-best-effort-internet-end-to-end traffic?
> >> You have some text on this down in section 2 but it is a bit buried.
> >
> > OK, let me see if I can foreshadow this a bit more and/or pull some
> > from section 2 to earlier.
> >
> >> An exception to this rule is if an IETF standardized mechanism
> >>        determines that a particular loss is due to a non-congestion
> >>        event (e.g., packet corruption).
> >>
> >> That is a bit heavy. It should be “a protocol” there than an IETF
> >> standardarized mechanism. The IETF does not have a monopoly on
> >> pre-blessing protocols before they are deployed.
> >> [...]
> >>
> >> In some cases you cannot tell the cause, but it is more important
> >> to ignore the loss. OAM being a particularly good example.
> >
> > First, I don't think I can readily change this without going against
> > the consensus the document has already gathered.  (I.e., this is not
> > about the intro, framing, context, etc. bits, but the actual meat of
> > the technical stuff.)
> >
> > Second, you are right that the IETF does not have a monopoly, but
> > that doesn't make the statement in the document the wrong thing to
> > say.
> >
> > Third, I doubt I should change it.  The problem here from the
> > standpoint of a set of default guidelines is that we'd like a
> > mechanism to determine the cause of loss to **actually work** before
> > it's OK to avoid a congestion control response.  If a standardized
> > mechanism is used then we have some confidence that the mechanism
> > has been vetted as reasonable.  If the mechanism is not standardized
> > then we have no idea if it actually works or if it is some
> > ill-conceived scheme that is badly broken.  In this latter case, I
> > don't think we want to bless this approach as OK within the default.
> > It may be OK, but it should get some consensus that it is OK.
> >
> > allman
>
>