Re: [tcpm] Impact on AccECN draft of change from EXP to PS

"Scheffenegger, Richard" <rs.ietf@gmx.at> Thu, 12 December 2019 16:15 UTC

Return-Path: <rs.ietf@gmx.at>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57CB51209A7; Thu, 12 Dec 2019 08:15:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6YA1FmZ6pTHT; Thu, 12 Dec 2019 08:15:02 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8258812099E; Thu, 12 Dec 2019 08:14:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1576167255; bh=Jl+5hJiZBBKHstUt0LK+2aG1B83iH5GXY7tdGFv8Xfk=; h=X-UI-Sender-Class:Subject:To:Cc:References:From:Date:In-Reply-To; b=bwawRMH0sAtdJU5R/6sRvBIHZPbQd3DyLMHMXCnuxHbGlzLu/SJzk+jhYSA49yjUU QNcGf/wiKVK2Gs9luSSGPJCRibS2Q2hXLffHlq742fiD8esTaIqdGoNMCRV84iQFxd sr10+wAQaRc1rvLhMhO3RoRdokcr4uamn3DAzUd4=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [10.249.70.154] ([217.70.211.15]) by mail.gmx.com (mrgmx104 [212.227.17.168]) with ESMTPSA (Nemesis) id 1N5GE1-1hhFDP3HiH-011EjN; Thu, 12 Dec 2019 17:14:14 +0100
To: Bob Briscoe <ietf@bobbriscoe.net>
Cc: tcpm IETF list <tcpm@ietf.org>, "tcpm-chairs@ietf.org" <tcpm-chairs@ietf.org>
References: <83880058-a057-66bf-24a3-855480b29f00@bobbriscoe.net> <49c9dfa7-019b-4d16-73f6-8a15c1077c73@bobbriscoe.net>
From: "Scheffenegger, Richard" <rs.ietf@gmx.at>
Message-ID: <a9a610b0-9f63-049b-548c-343b07903951@gmx.at>
Date: Thu, 12 Dec 2019 17:14:14 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <49c9dfa7-019b-4d16-73f6-8a15c1077c73@bobbriscoe.net>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: quoted-printable
X-Provags-ID: V03:K1:ZmVBwAsR0IQaFot0JTNvy/NzAnIvKHXn207udFQZg5ESgByA52B CNaBLY0yUFSfi0tvPVo21bUouzswQS08cSG3JCb/CUKhjUioqt1aJ/8jBIfJAnqCDwx9kiw XZHQiC14AUAOqSQrA91YiCfU9s1kr221P/EMTRmAwkaT7TnO1M1ocOG6O4y9uQY/O4Z0B6/ fcdz/O48GOcXRvzymIhYA==
X-UI-Out-Filterresults: notjunk:1;V03:K0:T0h2BRtXgcc=:IDPaz+O0eD6mVbgFo8nMOI v3cRcbxqfKWBti62U383gyGoMKkmPxDuZkDDp6pJJxSV3BL7waSV61zWl+1TuWC30ehr8kdDg BKGqfTniEmbEcy0CGdYc4quyeWYUavjIbuBJo3Ukv/82m3mACjdDmEH1EYBjOY1SbIV7F32PU epzDw4VTzw4QZ324Pyd7GlPUavbc+T0jZ0ZRykPhZ8ecl99BS4648fAeV0k4xemlUOo0ZCrqN X5ln67aHRoyrnNkadwS0LYGs57c7UvwEGGAtNOWMbPOeiXnUFYypCXIiuDGDRgVjEm9BDU36v AAKv2GVnHolAKKTYPrkdzbvGZkl5XrvW4XCeV5bHtNO58fpKJcPlH1vav8ylNJXLzcyFFAd4o vLuXVMWh0ATcgUnAPTLgYNJcG0AoKp7LGfHIARR/7vi2M05XPeTLrqllvi9CxvAGS8xCrygQN SRiqpygTzZjBJ30gUwT3z/ygT+02aVTWM4KDQTTg6zvoqAaIJOQKwnRsgBidDVawqFc59fJl1 kJmO6pwkCO8faX3zYAX/pBQiAJp3eWkUqjGE5nDOpsUmUzCHJDT60CFA5YSp05ij3NMH44RN+ tv1MemnVttMJsssY6lsbLP9eYZYlL+vXvJLxs/y045/Sn5c1Su8UguS52xS0+iA2hRyACcVD9 HvFRm66a1w5DkvjrzvOFXtPs0io4OSnkijDukBRhkl9k6LienFC9hkuKYAU/Pgb/OK0mslUiI cEf/D7qxhQ0eTaaIgjaGDTpfWUeY7Md+jc8Jsvp8Nz5WiJj+CSQgQAWeLxZRFGXzNFAAOk6z+ OTqq599xH/8iFEpXWCx4qAjCmOWeGUQLVdEsFEBGbtIbMk+eK7zD7cNdYYgxR4VpqD8sY+BHb FYnbOPFXre4sfyH7IhjJNye/U6FTWn4qiei6EQGxpkNGRUTvcrgglleLN624UCrvY5wMj3T0u G35sMXjYw/9UjdhtZLSgp8SJYaXiecnBLLLBody4h+cL/wlqbGxreqnsYgjyXH8TRN4YFKpSi VdJVG8XLg123WBQSx8ql33St+LnOtKOKtWh7mBY+JuXrHu1/iNeliLkw5V8z2+JohUV8nJUtx Ddd6x30okJS/4XIspMWoP6MmF5vhLaeZ7yiydEgDlR1OUiYRyb+dwHKkKwukq5KyxX1BvPsOH LHQvYyQ0PIS0A4eDQN+gMfj6R2XdWEOmydrgWdV6qlM7KhXa4T/MUtEGqlCPVJa7T8Zmw0e53 oA1fiQqjdlPrXdnf4PFbdxbYG/sWPIvFQv9ak9A==
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/MYonHFe1yggree91SHqQO80qV9E>
Subject: Re: [tcpm] Impact on AccECN draft of change from EXP to PS
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Dec 2019 16:15:05 -0000

As one of the authors, and also exposed to how the decision process in
corporations is driven by non-technical considerations, I do prefer
making AccECN standards track (PS).

Further, this would alleviate some of the procedural questions of
assigning a TCP header bit for the AccECN feedback, without violating
our (tcpm/ietf) own rules.

This is just to reiterate my preference - if the group consensus is to
have AccECN as Experimental (and a supporting standards-track document
allowing the assingment of the AE bit), I can live with that too - while
it will make deployment harder in certain environments.

Best regards,
   Richard


Am 11.12.2019 um 19:43 schrieb Bob Briscoe:
> tcpm chairs,
>
> At IETF-106 there was believed to be rough consensus in the room that
> AccECN ought to be stds track not expt track.
>
> I pointed out that we would need to check for that consensus on the
> list. We can't really move forward with the draft until that has been
> done. So would it be possible to do a consensus call on the list on that
> question ASAP?
>
> To provide some concrete data for the question, below I've quoted the
> analysis I did of what would have to be altered in the AccECN draft if
> it switched to the stds track. I've also just added one addendum to it.
>
> Thanks in advance
>
>
>
> Bob
>
> PS. (Also a consensus call on the list about the question of the process
> for assigning header flags pls.)
>
>
>
> On 23/11/2019 11:26, Bob Briscoe wrote:
>> tcpm-ers,
>>
>> Here's analysis of the things in draft-ietf-tcpm-accurate-ecn that
>> would have to be altered to upgrade it to PS from EXP. This was
>> generally favoured in the tcpm meeting today, but it has to be
>> ratified on this list, so I thought this info would be helpful.
>>
>> ==Header Block==
>> Intended Status: Proposed Standard
>> Updates: 3168
>>
>> ==Throughout==
>> (substituting intelligently):
>> s/experimental/standards track/
>> s/other experiments/experiments/
>> s/other variants/variants/
>>
>> ==1. Intro==
>> CURRENT:
>>  "Until the AccECN experiment succeeds, [RFC3168] will remain as the
>>    only standards track specification for adding ECN to TCP. "
>> PROPOSED:
>>   Instead, summarize here how this doc updates RFC3168, referring to a
>> new section XXX (below) that gives detailed updates.
>>
>> CURRENT:
>>  "It is completely independent of how TCP might respond to congestion
>>   feedback, which is out of scope. For that we refer to [RFC3168]..."
>> PROPOSED
>>  "It is completely independent of how TCP might respond to congestion
>>   feedback, which is out of scope. For that we refer to [RFC3168] and
>> [RFC8311], excepting the updates to RFC 3168 in Section XXX of the
>> present document that generalize the wording to include AccECN."
>>
>> ==1.1 Document Roadmap==
>> Remove ref to 1.3 & include a ref to the new section XXX detailing the
>> updates to 3168.
>>
>> ==1.3 Experiment Goals==
>> Delete section
>>
>> FYI, the two experiment goals are:
>> 1. fall-back strategies in the face of path traversal problems
>> 2. interaction of change-triggered ACKs and offloaded processing
>>
>> The two "MUST" requirements behind #2 have just been relaxed to
>> "SHOULD"s as part of the splitting up of change-triggered ACKs between
>> ACE and the AccECN TCP Option, as I mentioned in the presentation to
>> the WG.
>>
>> #1 is more likely to affect implementation than design, given the
>> design provides for fall-back in most conceivable circumstances (e.g.
>> it is designed for any or all AccECN TCP options to be sent but not
>> received {Note 1}) and there's considerable checking of mangling
>> already. Nonetheless, we might find byzantine middlebox behaviour,
>> e.g. stripping the TCP option from some packets but not others,
>> altering selected protocol fields, altering some header bits but not
>> others,... I'd like to see some large-scale testing over production
>> networks before the RFC is published.
>>
>> {Note 1}: Altho the latest change has made it necessary to receive the
>> first AccECN Option in each direction to be able to correctly
>> understand later options.
>>
>> ==XXX. Updates to RFC3168==
>> New section XXX between sections 3 & 4.
>> For content, see later in this email.
>>
>> ==3.2.6 The AccECN Option==
>> The Kind of the option can be assigned a permanent value, rather than
>> a 2B longer option with Kind=254 and a magic number.
>>
>> ==6. IANA Considerations==
>> Delete the para about using experimental option 254.
>>
>>
>>
>> ===Section XXX. Updates to RFC3168===
>>
>> The following sections of RFC3168 would be updated by the AccECN
>> specification, if it were stds track:
>>
>>   * The Introduction to Section "6. Support from the Transport
>>     Protocol" that summarizes the way TCP feeds back ECN markings
>>   * the whole of "6.1.1  TCP Initialization"
>>   * The whole of "6.1.2. The TCP Sender" except the second, third and
>>     last paras still apply to RFC5681 congestion control, but not
>>     necessarily to other experimental forms of ECN congestion control
>>     allowed by RFC8311 (specified by a suitable experimental RFC).
>>   * The whole of "6.1.3.  The TCP Receiver" except the last two
>>     sentences till stand (which are incidentally in the wrong section,
>>     because they relate to TCP sender behaviour):
>>         "Some care
>>        is required if the TCP sender is to avoid unnecessary reductions of
>>        the congestion window when a window of data includes both dropped
>>        packets and (marked) CE packets.  This is illustrated in
>>     [Floyd98]. "
>>   * The following text within "6.1.5. Retransmitted TCP packets" is
>>     updated as follows:
>>       o CURRENT:
>>         "the TCP data receiver SHOULD
>>         ignore the ECN field on arriving data packets that are outside
>>         of the
>>         receiver's current window."
>>       o UPDATED:
>>         "The TCP data receiver MUST ignore the CE codepoint on incoming
>>         segments that fail any validity check.  The validity check in
>>         section
>>         5.2 of [RFC5961] is RECOMMENDED."
>>   * Section "5.2 Dropped or Corrupted Packets" of RFC3168 says '"pure"
>>     ACK packets MUST NOT indicate ECN-Capability.' The AccECN draft
>>     will not update this aspect, but it will say what TCP should do if
>>     it receives an ECN-capable pure ACK.
>>
>> I'm slightly unsure about this one - any opinions?:
>>
>>   * Section "23.2 TCP header Flags" within the "IANA Considerations"
>>     Section:
>>     If AccECN is going to update 3168, we will need to consider
>>     whether to update the names ECE and CWR. Even though they don't do
>>     anything related to those names in AccECN, AccECN has to be able
>>     to fall-back to 3168, so I suggest we keep these names.
>>
>>
>> ==Opportunities to close loop-holes==
>>
>> I would also like people to check through RFC3168 to look for
>> opportunities to make behaviour for currently unused values in
>> protocol fields unambiguous - in order to allow for forward
>> compatibility (or remove unnecessary restrictions on forward
>> compatibility) for other future protocols derived from RFC3168.
>>
>> As well as the changes that AccECN already makes to the TCP part of
>> 3168, making AccECN stds track would give an opportunity to update
>> some TCP feedback-related aspects of 3168 that might have been
>> overlooked when 8311 was written. I can't think of any, but I'll check
>> and it would be good if others did too.
>>
>>
>>
>>
>> Bob
>>
>> --
>> ________________________________________________________________
>> Bob Briscoehttp://bobbriscoe.net/
>
> --
> ________________________________________________________________
> Bob Briscoehttp://bobbriscoe.net/
>
>
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm
>