Re: [tcpm] AD review: draft-ietf-tcpm-ecnsyn-05
Sally Floyd <sallyfloyd@mac.com> Thu, 20 March 2008 00:31 UTC
Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: ietfarch-tcpm-archive@core3.amsl.com
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EAB783A6872; Wed, 19 Mar 2008 17:31:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.248
X-Spam-Level:
X-Spam-Status: No, score=-101.248 tagged_above=-999 required=5 tests=[AWL=-0.811, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_ORG=0.611, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cOClIGGr9BPG; Wed, 19 Mar 2008 17:31:42 -0700 (PDT)
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DBC8F3A6883; Wed, 19 Mar 2008 17:31:42 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3EDE03A6973 for <tcpm@core3.amsl.com>; Wed, 19 Mar 2008 17:31:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EIchObRvjf48 for <tcpm@core3.amsl.com>; Wed, 19 Mar 2008 17:31:41 -0700 (PDT)
Received: from smtpoutm.mac.com (smtpoutm.mac.com [17.148.16.76]) by core3.amsl.com (Postfix) with ESMTP id 293113A6872 for <tcpm@ietf.org>; Wed, 19 Mar 2008 17:31:41 -0700 (PDT)
Received: from mac.com (asmtp006-s [10.150.69.69]) by smtpoutm.mac.com (Xserve/smtpout013/MantshX 4.0) with ESMTP id m2K0TL8Y001472; Wed, 19 Mar 2008 17:29:21 -0700 (PDT)
Received: from [192.168.1.85] (adsl-70-231-230-106.dsl.snfc21.sbcglobal.net [70.231.230.106]) (authenticated bits=0) by mac.com (Xserve/asmtp006/MantshX 4.0) with ESMTP id m2K0TGaq026871 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Wed, 19 Mar 2008 17:29:18 -0700 (PDT)
Message-Id: <DACE020D-57D2-4C29-AA22-8BDC7DD05672@mac.com>
From: Sally Floyd <sallyfloyd@mac.com>
To: Lars Eggert <lars.eggert@nokia.com>
In-Reply-To: <0A9BAFBD-68F2-4EC8-AC86-009905F9F01E@nokia.com>
Mime-Version: 1.0 (Apple Message framework v919.2)
Date: Wed, 19 Mar 2008 17:29:16 -0700
References: <20080212040134.0C2093AEC52@lawyers.icir.org> <0A9BAFBD-68F2-4EC8-AC86-009905F9F01E@nokia.com>
X-Mailer: Apple Mail (2.919.2)
Cc: Aleksandar Kuzmanovic <akuzma@northwestern.edu>, tcpm <tcpm@ietf.org>, Ted Faber <faber@isi.edu>, mallman@icir.org, Amit Mondal <a-mondal@northwestern.edu>, "K. K. Ramakrishnan" <kkrama@research.att.com>
Subject: Re: [tcpm] AD review: draft-ietf-tcpm-ecnsyn-05
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org
Lars - > I did my AD review for draft-ietf-tcpm-ecnsyn-05. Basically, it's > good to go to IETF last call. There are a few minor suggestions and > nits below. I'd suggest that we go to IETF Last Call and fix these > together with any other comments that we receive during the comment > period. > > (Alternatively, the authors could do another revisions now. Up to > you, just let me know which way you're going, so I can initiate the > last call or wait.) Many thanks for the feedback. I have made the changes (detailed feedback is below), and the revised draft is at: http://www.icir.org/floyd/papers/draft-ietf-tcpm-ecnsyn-06.txt http://www.icir.org/floyd/papers/draft-ietf-tcpm-ecnsyn-06.pdf I will submit it tomorrow. (And by Friday I will have the simulation scripts on-line.) Many thanks, Sally The detailed feedback: > INTRODUCTION, paragraph 13: > > This document is intended to update RFC 3168. > > s/is intended to update/updates/ > and also add an "Updates: 3168" header to the boilerplate. DONE. > Section 3., paragraph 0: > > 3. Proposal > > s/Proposal/Specification/ > (or Recommendation, but because the text below "only" changes a > MUST NOT to a MAY, that may be too strong) > > > Section 3., paragraph 3: > > Assume that TCP node A transmits to TCP node B an ECN-setup SYN > > packet, indicating willingness to use ECN for this connection. > As > > specified by RFC 3168, if TCP node B is willing to use ECN, > node B > > responds with an ECN-setup SYN-ACK packet. > > Suggestion: Start a new section before this paragraph, because the > remainder of the original section is more of a description of the > effects of the change, rather than continuing the specification. Actually, there is some SHOULDs and a MUST in the rest of that section. I made sub-sections, to make it more clear. > Section 4., paragraph 0: > > 4. Discussion > > Nit: Section would be more readable if "Motivation:", "Flooding > attacks:" etc. became real, numbered subsections. (Same in Section > 7.) DONE. > Section 6.2., paragraph 2: > > Simulations comparing the performance with Standard ECN (without > ECN- > > marked SYN/ACK packets), ECN+ with NoWaiting, and ECN+ with Waiting > > show little difference, in terms of aggregate congestion, between > > ECN+ with NoWaiting and ECN+ with Waiting. The details are given in > > Appendix A below. Our conclusions are that ECN+ with NoWaiting is > > perfectly safe, and there are no congestion-related reasons for > > preferring ECN+ with Waiting over ECN+ with NoWaiting. That is, > > there is no need for the TCP end-node to wait a round-trip time > > before sending a data packet after receiving an acknowledgement of > an > > ECN-marked SYN/ACK packet. > > That recommendation (that NoWaiting is safe and Waiting therefore > need > not be preferred) should also briefly be discussed in Section 4 where > the approaches are first described. DONE. > Or, if NoWaiting is preferred, > maybe the Waiting alternative should be moved out of Section 4 and > into another Section (this one?) I did the first one. > Section 8., paragraph 2: > > Future work will address the more general question of adding ECN- > > Capability to relevant handshake packets in other protocols that use > > retransmission-based reliability in their setup phase (e.g., SCTP, > > DCCP, HIP, and the like). > > That work doesn't seem to be happening, so I would suggest to remove > this section. DONE. > Section 100, paragraph 32: > > Capabililty for SYN/ACK packets, it is possible that the ECN-Capable > > Nit: s/Capabililty/Capability/ DONE. > Section 100, paragraph 46: > > [ECN-SYN] ECN-SYN web page with simulation scripts, URL to be added. > > URL needs to be added now. I added the URL (and I will add the simulations to the web page indicated by the URL by Friday...) > Section 100, paragraph 60: > > [SYN-COOK] Dan J. Bernstein, SYN cookies, 1997, see also > > <http://cr.yp.to/syncookies.html> > > Might also want to refer to RFC 4987. DONE. Many thanks. _______________________________________________ tcpm mailing list tcpm@ietf.org https://www.ietf.org/mailman/listinfo/tcpm
- [tcpm] draft-ietf-tcpm-ecnsyn-04 Sally Floyd
- Re: [tcpm] draft-ietf-tcpm-ecnsyn-04 Sally Floyd
- Re: [tcpm] draft-ietf-tcpm-ecnsyn-04 Mark Allman
- [tcpm] tcpillust release announcement Yoshifumi Nishida
- [tcpm] AD review: draft-ietf-tcpm-ecnsyn-05 Lars Eggert
- Re: [tcpm] AD review: draft-ietf-tcpm-ecnsyn-05 Sally Floyd