Re: [tcpm] PLPMTUD for all protocols

Mikael Abrahamsson <swmike@swm.pp.se> Thu, 29 March 2018 20:41 UTC

Return-Path: <swmike@swm.pp.se>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1284812DA42 for <tcpm@ietfa.amsl.com>; Thu, 29 Mar 2018 13:41:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.31
X-Spam-Level:
X-Spam-Status: No, score=-4.31 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=swm.pp.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W8v8OPLjdyHr for <tcpm@ietfa.amsl.com>; Thu, 29 Mar 2018 13:41:09 -0700 (PDT)
Received: from uplift.swm.pp.se (ipv6.swm.pp.se [IPv6:2a00:801::f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D2B112741D for <tcpm@ietf.org>; Thu, 29 Mar 2018 13:41:09 -0700 (PDT)
Received: by uplift.swm.pp.se (Postfix, from userid 501) id 9FB59AF; Thu, 29 Mar 2018 22:41:06 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=swm.pp.se; s=mail; t=1522356066; bh=AWAimcmjE3mi/1BgjFFoLw1dgig0SC7EZG8lUH3/AzE=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=oxEP7NDPf6deRzfGog3i21Pc3FM9Nv3IQL4tSRR7wAbH/6HxE1FQTtUMnglPxACbE WMjm+WHtV6y+Mmk899rQ1uKTvlq94f8mF+XhIK+8P4pIGpphCe8+4MPiQbrsta+OGd 4LUZ1selvC02g0J1DuCdPSLka8O82aa2SawnV+kQ=
Received: from localhost (localhost [127.0.0.1]) by uplift.swm.pp.se (Postfix) with ESMTP id 9DA4A9F; Thu, 29 Mar 2018 22:41:06 +0200 (CEST)
Date: Thu, 29 Mar 2018 22:41:06 +0200
From: Mikael Abrahamsson <swmike@swm.pp.se>
To: William Herrin <bill@herrin.us>
cc: Joe Touch <touch@strayalpha.com>, tcpm@ietf.org
In-Reply-To: <CAP-guGWhyS0UW9YwsQyA10iN_M=yc4H8NqKAgWH=zPBFhscJxQ@mail.gmail.com>
Message-ID: <alpine.DEB.2.20.1803292235430.20609@uplift.swm.pp.se>
References: <alpine.DEB.2.20.1803281034310.20609@uplift.swm.pp.se> <CAP-guGVEcnk09yi8sz+fmghpeb91Y8tQb+LsEmSF+0e+f6oGhw@mail.gmail.com> <alpine.DEB.2.20.1803281747020.20609@uplift.swm.pp.se> <B323BA47-32DF-498B-9D1F-5A378E7ABB98@strayalpha.com> <CAP-guGXfds60dwJXgnSYdbtQ-qOCJGpiw1kcYUkJR8L3jwsFSA@mail.gmail.com> <alpine.DEB.2.20.1803291727100.20609@uplift.swm.pp.se> <CAP-guGWhyS0UW9YwsQyA10iN_M=yc4H8NqKAgWH=zPBFhscJxQ@mail.gmail.com>
User-Agent: Alpine 2.20 (DEB 67 2015-01-07)
Organization: People's Front Against WWW
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/MHpGkiEbBzIJsdLhFGaymEXAFjY>
Subject: Re: [tcpm] PLPMTUD for all protocols
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Mar 2018 20:41:12 -0000

On Thu, 29 Mar 2018, William Herrin wrote:

> How would PLPMTUD detect a path MTU black hole for DNS response packets 
> from an anycasted node? It's fire and forget; the server is not 
> expecting another packet from the querent.

Then the resolver needs to ask again, but make sure that the response is 
small enough. This is up to the protocol implementer to figure out. If the 
protocol implementer wants stateless unicast to work as a deployment 
scenario, then they need to design the protocol for PLPMTUD to work.

> I have no problem with falling back after a smart enough delay/retry 
> cycle concludes a very high probability a PMTUD black hole. I have 
> little problem with those connections suffering the performance hit of 
> small packets for the duration. I have a bigger problem if routine 
> packet loss or a brief path outage gets commonly misdetected as a PMTUD 
> black hole. I worry most that allowing the algorithm to the hunt for the 
> MTU will justify allowing a higher false positive rate for black hole 
> detection so that everybody suffers a performance hit even when there 
> are no black holes. There are no obvious ways to implement that hunt 
> which don't harm performance. I'd rather see it fall back and stay back 
> with an OS tunable for how confident it has to be of a black hole before 
> it falls back.

I am perfectly fine with the PMTUD blackhole algorithm kicking in after 5 
seconds of complete loss and TCP going back to slow start. I do not care 
much if performance is really bad when there is a PMTUD blackhole. What I 
want to avoid is that things don't work at all. Abysmal performance is 
better than things not working at all (which is often the case right now).

Also, if PMTUD blackhole detect kicks in, I'd like to be able to diagnose 
it with counters or logs from the TCP stack, telling me that this is going 
on.

-- 
Mikael Abrahamsson    email: swmike@swm.pp.se