Re: [tcpm] New Version Notification for draft-kuehlewind-tcpm-ecn-fallback-00.txt

Michael Welzl <michawe@ifi.uio.no> Mon, 29 July 2013 16:11 UTC

Return-Path: <michawe@ifi.uio.no>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CB0A21F9FE9 for <tcpm@ietfa.amsl.com>; Mon, 29 Jul 2013 09:11:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oMSp0FKCa9sc for <tcpm@ietfa.amsl.com>; Mon, 29 Jul 2013 09:11:45 -0700 (PDT)
Received: from mail-out1.uio.no (mail-out1.uio.no [IPv6:2001:700:100:10::57]) by ietfa.amsl.com (Postfix) with ESMTP id 958AD21F9FCA for <tcpm@ietf.org>; Mon, 29 Jul 2013 09:10:58 -0700 (PDT)
Received: from mail-mx6.uio.no ([129.240.10.40]) by mail-out1.uio.no with esmtp (Exim 4.75) (envelope-from <michawe@ifi.uio.no>) id 1V3q23-0004lU-M8; Mon, 29 Jul 2013 18:10:47 +0200
Received: from dhcp-9049.meeting.ietf.org ([130.129.8.73]) by mail-mx6.uio.no with esmtpsa (TLSv1:AES128-SHA:128) user michawe (Exim 4.80.1) (envelope-from <michawe@ifi.uio.no>) id 1V3q22-0008VT-Us; Mon, 29 Jul 2013 18:10:47 +0200
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Michael Welzl <michawe@ifi.uio.no>
In-Reply-To: <A35F5647-8350-45D5-BA82-533A2E33C841@tik.ee.ethz.ch>
Date: Mon, 29 Jul 2013 12:10:46 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <C5BB0AE1-7DC7-4C95-B946-C1D481591575@ifi.uio.no>
References: <20130703154032.15474.58799.idtracker@ietfa.amsl.com> <82B14E2A-C7B8-4899-8954-80C66BACFB76@tik.ee.ethz.ch> <012C3117EDDB3C4781FD802A8C27DD4F25C03F89@SACEXCMBX02-PRD.hq.netapp.com> <6AE1ADEB-CADA-4BC5-AE3B-75001296C635@tik.ee.ethz.ch> <012C3117EDDB3C4781FD802A8C27DD4F25C2C2ED@SACEXCMBX02-PRD.hq.netapp.com> <E84E1F28-5DA4-4D68-90E6-B248C76FAAE9@tik.ee.ethz.ch> <22D18C14-152E-4487-936E-121E95A63B4E@ifi.uio.no> <D359AB72-8AC4-468A-9946-2AE0001A50CF@tik.ee.ethz.ch> <718D8F34-8A8F-46A8-88F7-0E68B3F0DB1C@ifi.uio.no> <A35F5647-8350-45D5-BA82-533A2E33C841@tik.ee.ethz.ch>
To: Brian Trammell <trammell@tik.ee.ethz.ch>
X-Mailer: Apple Mail (2.1508)
X-UiO-SPF-Received:
X-UiO-Ratelimit-Test: rcpts/h 3 msgs/h 1 sum rcpts/h 8 sum msgs/h 2 total rcpts 6170 max rcpts/h 40 ratelimit 0
X-UiO-Spam-info: not spam, SpamAssassin (score=-5.0, required=5.0, autolearn=disabled, UIO_MAIL_IS_INTERNAL=-5, uiobl=NO, uiouri=NO)
X-UiO-Scanned: 9DC3CB95DB5972A648DB1D1F168FDCD2AD1268C7
X-UiO-SPAM-Test: remote_host: 130.129.8.73 spam_score: -49 maxlevel 80 minaction 2 bait 0 mail/h: 1 total 75 max/h 10 blacklist 0 greylist 0 ratelimit 0
Cc: tcpm@ietf.org
Subject: Re: [tcpm] New Version Notification for draft-kuehlewind-tcpm-ecn-fallback-00.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jul 2013 16:11:54 -0000

On Jul 29, 2013, at 10:58 AM, Brian Trammell <trammell@tik.ee.ethz.ch> wrote:

> hi Michael,
> 
> inline below...
> 
> On 29 Jul 2013, at 14:14, Michael Welzl <michawe@ifi.uio.no> wrote:
> 
> <snip>
> 
>>>> - step 6: "In this case, the sender may continue using ECN, because while it may not work for detecting congestion, the use of ECN does not negatively affect connectivity." => I'd rather not have it used if it's not working - if a router marks ECN to CE but the next downstream router clears the codepoint, we ignore congestion, and we'd like to avoid that, no?
>>> 
>>> The problem in this case is that we don't know if we have an ECN-aware middlebox that is clearing a CE from the end system, on the assumption that it is closer to the end-system than one would expect -- we did see some of this activity in the study detailed in the PAM paper. In this case the CE-clearing is arguably correct (or at least acceptable). 
>> 
>> I'm beginning to understand your point. It's about this sentence in the draft:
>> "If the ECE flag is not set on the ACK segment(s) sent by the
>>      receiver acknowledging the CE probe segments, the path may or may
>>      not be usable, as that there might be middleboxes/gateways that
>>      (arguably correctly) clear CE on segments from end hosts, because
>>      they assume that congestion can not have occurred up to this
>>      point on the path."
>> 
>> But here you're assuming that this is the only possible reason for a CE to be cleared, i.e. CE cannot be cleared by a middlebox for any other reason. It might well be that a middlebox makes a mistake when it clears CE…  well, but if that wasn't seen in any of the measurement studies (the IMC one and yours), I'm inclined to accept that it's okay to leave ECN on then.
> 
> The question is one of requirements (and therefore one of philosophy): are we trying to guarantee (1) that ECN works, or (2) that attempts to activate ECN do not lead to connectivity problems. Given where we are now (increasing capability in endpoints, but not much activation in routers and clients) we think (2) is the more useful goal: we want to build confidence that TCP stacks could activate ECN negotiation on active open by default without causing connectivity issues that are hard for end-users and admins to debug.

I agree,


> We're not assuming that CE clearing is benign (though it does read that way; we'll need to be more explicit about a few things that aren't as clear as they should be in the -01 rev) -- rather, we're assuming that CE clearing that doesn't result in a dropped packet indicates that ECN can be activated on a path, even if you'll in effect never receive an ECE.

I agree.

Cheers,
Michael