Re: [tcpm] Impact on AccECN draft of change from EXP to PS

Bob Briscoe <ietf@bobbriscoe.net> Wed, 11 December 2019 18:44 UTC

Return-Path: <ietf@bobbriscoe.net>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 00AB01201DB; Wed, 11 Dec 2019 10:44:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.977
X-Spam-Level:
X-Spam-Status: No, score=-0.977 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MISSING_HEADERS=1.021, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6SJ8t7Usgy7Q; Wed, 11 Dec 2019 10:44:00 -0800 (PST)
Received: from server.dnsblock1.com (server.dnsblock1.com [85.13.236.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5ED80120052; Wed, 11 Dec 2019 10:43:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Type:In-Reply-To:MIME-Version:Date: Message-ID:Cc:References:From:Subject:Sender:Reply-To:To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=iZf0ln2xWvyduJdYm+6HCXJ4zcnILvjc+GZIXz6fBb4=; b=dCBHwZ93LgK5Tej9Tzqr68DFs B8qVRZbbpVZueX3TvaK4DfG34j5P7sMHT7DiSEqDXI9rdxSXOvZfbGRMzR7PzFmof/lcO8JeekPu3 SETeZ78SehCwi8BO88QJv8yAB439IwQAKLbvwtcOV+wnMeuME7QDgYbRzy/NJ/sc3zLU8q4F/eOha lsnG9vbK4vaecbAi2U7uNsTsiblv948FyVtsMaO8GqSnw5nPxw3hTN4+MQQEirpEgZPLH79KFguIo u3EUqw34gRKN3AH2RKTmBUQ72ybAZvNP/4PbiHTCYQ7p8aJRrSShd85Yxj2ZShqUMwtUePbVLfsY+ 0/Je7A6Vg==;
Received: from [31.185.128.31] (port=43688 helo=[192.168.0.11]) by server.dnsblock1.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.92) (envelope-from <ietf@bobbriscoe.net>) id 1if6xo-0004q0-AD; Wed, 11 Dec 2019 18:43:57 +0000
From: Bob Briscoe <ietf@bobbriscoe.net>
References: <83880058-a057-66bf-24a3-855480b29f00@bobbriscoe.net>
Cc: tcpm IETF list <tcpm@ietf.org>, "tcpm-chairs@ietf.org" <tcpm-chairs@ietf.org>
Message-ID: <49c9dfa7-019b-4d16-73f6-8a15c1077c73@bobbriscoe.net>
Date: Wed, 11 Dec 2019 18:43:54 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <83880058-a057-66bf-24a3-855480b29f00@bobbriscoe.net>
Content-Type: multipart/alternative; boundary="------------40CC808DB767F34622237EAD"
Content-Language: en-GB
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server.dnsblock1.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: server.dnsblock1.com: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: server.dnsblock1.com: in@bobbriscoe.net
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/MIfwP1Shz3obiAyKp4W9cLi30g0>
Subject: Re: [tcpm] Impact on AccECN draft of change from EXP to PS
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Dec 2019 18:44:02 -0000

tcpm chairs,

At IETF-106 there was believed to be rough consensus in the room that 
AccECN ought to be stds track not expt track.

I pointed out that we would need to check for that consensus on the 
list. We can't really move forward with the draft until that has been 
done. So would it be possible to do a consensus call on the list on that 
question ASAP?

To provide some concrete data for the question, below I've quoted the 
analysis I did of what would have to be altered in the AccECN draft if 
it switched to the stds track. I've also just added one addendum to it.

Thanks in advance



Bob

PS. (Also a consensus call on the list about the question of the process 
for assigning header flags pls.)



On 23/11/2019 11:26, Bob Briscoe wrote:
> tcpm-ers,
>
> Here's analysis of the things in draft-ietf-tcpm-accurate-ecn that 
> would have to be altered to upgrade it to PS from EXP. This was 
> generally favoured in the tcpm meeting today, but it has to be 
> ratified on this list, so I thought this info would be helpful.
>
> ==Header Block==
> Intended Status: Proposed Standard
> Updates: 3168
>
> ==Throughout==
> (substituting intelligently):
> s/experimental/standards track/
> s/other experiments/experiments/
> s/other variants/variants/
>
> ==1. Intro==
> CURRENT:
>  "Until the AccECN experiment succeeds, [RFC3168] will remain as the
>    only standards track specification for adding ECN to TCP. "
> PROPOSED:
>   Instead, summarize here how this doc updates RFC3168, referring to a 
> new section XXX (below) that gives detailed updates.
>
> CURRENT:
>  "It is completely independent of how TCP might respond to congestion
>   feedback, which is out of scope. For that we refer to [RFC3168]..."
> PROPOSED
>  "It is completely independent of how TCP might respond to congestion
>   feedback, which is out of scope. For that we refer to [RFC3168] and 
> [RFC8311], excepting the updates to RFC 3168 in Section XXX of the 
> present document that generalize the wording to include AccECN."
>
> ==1.1 Document Roadmap==
> Remove ref to 1.3 & include a ref to the new section XXX detailing the 
> updates to 3168.
>
> ==1.3 Experiment Goals==
> Delete section
>
> FYI, the two experiment goals are:
> 1. fall-back strategies in the face of path traversal problems
> 2. interaction of change-triggered ACKs and offloaded processing
>
> The two "MUST" requirements behind #2 have just been relaxed to 
> "SHOULD"s as part of the splitting up of change-triggered ACKs between 
> ACE and the AccECN TCP Option, as I mentioned in the presentation to 
> the WG.
>
> #1 is more likely to affect implementation than design, given the 
> design provides for fall-back in most conceivable circumstances (e.g. 
> it is designed for any or all AccECN TCP options to be sent but not 
> received {Note 1}) and there's considerable checking of mangling 
> already. Nonetheless, we might find byzantine middlebox behaviour, 
> e.g. stripping the TCP option from some packets but not others, 
> altering selected protocol fields, altering some header bits but not 
> others,... I'd like to see some large-scale testing over production 
> networks before the RFC is published.
>
> {Note 1}: Altho the latest change has made it necessary to receive the 
> first AccECN Option in each direction to be able to correctly 
> understand later options.
>
> ==XXX. Updates to RFC3168==
> New section XXX between sections 3 & 4.
> For content, see later in this email.
>
> ==3.2.6 The AccECN Option==
> The Kind of the option can be assigned a permanent value, rather than 
> a 2B longer option with Kind=254 and a magic number.
>
> ==6. IANA Considerations==
> Delete the para about using experimental option 254.
>
>
>
> ===Section XXX. Updates to RFC3168===
>
> The following sections of RFC3168 would be updated by the AccECN 
> specification, if it were stds track:
>
>   * The Introduction to Section "6. Support from the Transport
>     Protocol" that summarizes the way TCP feeds back ECN markings
>   * the whole of "6.1.1  TCP Initialization"
>   * The whole of "6.1.2. The TCP Sender" except the second, third and
>     last paras still apply to RFC5681 congestion control, but not
>     necessarily to other experimental forms of ECN congestion control
>     allowed by RFC8311 (specified by a suitable experimental RFC).
>   * The whole of "6.1.3.  The TCP Receiver" except the last two
>     sentences till stand (which are incidentally in the wrong section,
>     because they relate to TCP sender behaviour):
>         "Some care
>        is required if the TCP sender is to avoid unnecessary reductions of
>        the congestion window when a window of data includes both dropped
>        packets and (marked) CE packets.  This is illustrated in
>     [Floyd98]. "
>   * The following text within "6.1.5. Retransmitted TCP packets" is
>     updated as follows:
>       o CURRENT:
>         "the TCP data receiver SHOULD
>         ignore the ECN field on arriving data packets that are outside
>         of the
>         receiver's current window."
>       o UPDATED:
>         "The TCP data receiver MUST ignore the CE codepoint on incoming
>         segments that fail any validity check.  The validity check in
>         section
>         5.2 of [RFC5961] is RECOMMENDED."
>   * Section "5.2 Dropped or Corrupted Packets" of RFC3168 says '"pure"
>     ACK packets MUST NOT indicate ECN-Capability.' The AccECN draft
>     will not update this aspect, but it will say what TCP should do if
>     it receives an ECN-capable pure ACK.
>
> I'm slightly unsure about this one - any opinions?:
>
>   * Section "23.2 TCP header Flags" within the "IANA Considerations"
>     Section:
>     If AccECN is going to update 3168, we will need to consider
>     whether to update the names ECE and CWR. Even though they don't do
>     anything related to those names in AccECN, AccECN has to be able
>     to fall-back to 3168, so I suggest we keep these names.
>
>
> ==Opportunities to close loop-holes==
>
> I would also like people to check through RFC3168 to look for 
> opportunities to make behaviour for currently unused values in 
> protocol fields unambiguous - in order to allow for forward 
> compatibility (or remove unnecessary restrictions on forward 
> compatibility) for other future protocols derived from RFC3168.
>
> As well as the changes that AccECN already makes to the TCP part of 
> 3168, making AccECN stds track would give an opportunity to update 
> some TCP feedback-related aspects of 3168 that might have been 
> overlooked when 8311 was written. I can't think of any, but I'll check 
> and it would be good if others did too.
>
>
>
>
> Bob
>
> -- 
> ________________________________________________________________
> Bob Briscoehttp://bobbriscoe.net/

-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/