Re: [tcpm] AD review: draft-ietf-tcpm-ecnsyn-05

Sally Floyd <sallyfloyd@mac.com> Thu, 20 March 2008 00:31 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: ietfarch-tcpm-archive@core3.amsl.com
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EAB783A6872; Wed, 19 Mar 2008 17:31:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.248
X-Spam-Level:
X-Spam-Status: No, score=-101.248 tagged_above=-999 required=5 tests=[AWL=-0.811, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_ORG=0.611, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cOClIGGr9BPG; Wed, 19 Mar 2008 17:31:42 -0700 (PDT)
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DBC8F3A6883; Wed, 19 Mar 2008 17:31:42 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3EDE03A6973 for <tcpm@core3.amsl.com>; Wed, 19 Mar 2008 17:31:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EIchObRvjf48 for <tcpm@core3.amsl.com>; Wed, 19 Mar 2008 17:31:41 -0700 (PDT)
Received: from smtpoutm.mac.com (smtpoutm.mac.com [17.148.16.76]) by core3.amsl.com (Postfix) with ESMTP id 293113A6872 for <tcpm@ietf.org>; Wed, 19 Mar 2008 17:31:41 -0700 (PDT)
Received: from mac.com (asmtp006-s [10.150.69.69]) by smtpoutm.mac.com (Xserve/smtpout013/MantshX 4.0) with ESMTP id m2K0TL8Y001472; Wed, 19 Mar 2008 17:29:21 -0700 (PDT)
Received: from [192.168.1.85] (adsl-70-231-230-106.dsl.snfc21.sbcglobal.net [70.231.230.106]) (authenticated bits=0) by mac.com (Xserve/asmtp006/MantshX 4.0) with ESMTP id m2K0TGaq026871 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Wed, 19 Mar 2008 17:29:18 -0700 (PDT)
Message-Id: <DACE020D-57D2-4C29-AA22-8BDC7DD05672@mac.com>
From: Sally Floyd <sallyfloyd@mac.com>
To: Lars Eggert <lars.eggert@nokia.com>
In-Reply-To: <0A9BAFBD-68F2-4EC8-AC86-009905F9F01E@nokia.com>
Mime-Version: 1.0 (Apple Message framework v919.2)
Date: Wed, 19 Mar 2008 17:29:16 -0700
References: <20080212040134.0C2093AEC52@lawyers.icir.org> <0A9BAFBD-68F2-4EC8-AC86-009905F9F01E@nokia.com>
X-Mailer: Apple Mail (2.919.2)
Cc: Aleksandar Kuzmanovic <akuzma@northwestern.edu>, tcpm <tcpm@ietf.org>, Ted Faber <faber@isi.edu>, mallman@icir.org, Amit Mondal <a-mondal@northwestern.edu>, "K. K. Ramakrishnan" <kkrama@research.att.com>
Subject: Re: [tcpm] AD review: draft-ietf-tcpm-ecnsyn-05
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

Lars -

> I did my AD review for draft-ietf-tcpm-ecnsyn-05. Basically, it's  
> good to go to IETF last call. There are a few minor suggestions and  
> nits below. I'd suggest that we go to IETF Last Call and fix these  
> together with any other comments that we receive during the comment  
> period.
>
> (Alternatively, the authors could do another revisions now. Up to  
> you, just let me know which way you're going, so I can initiate the  
> last call or wait.)

Many thanks for the feedback.  I have made the changes (detailed  
feedback
is below), and the revised draft is at:
   http://www.icir.org/floyd/papers/draft-ietf-tcpm-ecnsyn-06.txt
   http://www.icir.org/floyd/papers/draft-ietf-tcpm-ecnsyn-06.pdf

I will submit it tomorrow.
(And by Friday I will have the simulation scripts on-line.)

Many thanks,
Sally


The detailed feedback:
> INTRODUCTION, paragraph 13:
> > This document is intended to update RFC 3168.
>
>  s/is intended to update/updates/
>  and also add an "Updates: 3168" header to the boilerplate.

DONE.

> Section 3., paragraph 0:
> > 3.  Proposal
>
>  s/Proposal/Specification/
>    (or Recommendation, but because the text below "only" changes a
>    MUST NOT to a MAY, that may be too strong)
>
>
> Section 3., paragraph 3:
> >    Assume that TCP node A transmits to TCP node B an ECN-setup SYN
> >    packet, indicating willingness to use ECN for this connection.   
> As
> >    specified by RFC 3168, if TCP node B is willing to use ECN,  
> node B
> >    responds with an ECN-setup SYN-ACK packet.
>
>  Suggestion: Start a new section before this paragraph, because the
>  remainder of the original section is more of a description of the
>  effects of the change, rather than continuing the specification.

Actually, there is some SHOULDs and a MUST in the rest of that
section.  I made sub-sections, to make it more clear.

> Section 4., paragraph 0:
> > 4.  Discussion
>
>  Nit: Section would be more readable if "Motivation:", "Flooding
>  attacks:" etc. became real, numbered subsections. (Same in Section  
> 7.)

DONE.

> Section 6.2., paragraph 2:
> > Simulations comparing the performance with Standard ECN (without  
> ECN-
> > marked SYN/ACK packets), ECN+ with NoWaiting, and ECN+ with Waiting
> > show little difference, in terms of aggregate congestion, between
> > ECN+ with NoWaiting and ECN+ with Waiting.  The details are given in
> > Appendix A below.  Our conclusions are that ECN+ with NoWaiting is
> > perfectly safe, and there are no congestion-related reasons for
> > preferring ECN+ with Waiting over ECN+ with NoWaiting.  That is,
> > there is no need for the TCP end-node to wait a round-trip time
> > before sending a data packet after receiving an acknowledgement of  
> an
> > ECN-marked SYN/ACK packet.
>
>  That recommendation (that NoWaiting is safe and Waiting therefore  
> need
>  not be preferred) should also briefly be discussed in Section 4 where
>  the approaches are first described.

DONE.

> Or, if NoWaiting is preferred,
>  maybe the Waiting alternative should be moved out of Section 4 and
>  into another Section (this one?)

I did the first one.

> Section 8., paragraph 2:
> > Future work will address the more general question of adding ECN-
> > Capability to relevant handshake packets in other protocols that use
> > retransmission-based reliability in their setup phase (e.g., SCTP,
> > DCCP, HIP, and the like).
>
>  That work doesn't seem to be happening, so I would suggest to remove
>  this section.

DONE.

> Section 100, paragraph 32:
> > Capabililty for SYN/ACK packets, it is possible that the ECN-Capable
>
>  Nit: s/Capabililty/Capability/

DONE.

> Section 100, paragraph 46:
> > [ECN-SYN] ECN-SYN web page with simulation scripts, URL to be added.
>
>  URL needs to be added now.

I added the URL (and I will add the simulations to the
web page indicated by the URL by Friday...)

> Section 100, paragraph 60:
> > [SYN-COOK]   Dan J. Bernstein, SYN cookies, 1997, see also
> > <http://cr.yp.to/syncookies.html>
>
>  Might also want to refer to RFC 4987.

DONE.  Many thanks.

_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm