Re: [tcpm] TCP EDO and SYN-EXT-OPT finalization - request for discussion

"touch@strayalpha.com" <touch@strayalpha.com> Mon, 31 October 2022 15:34 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8792FC152578 for <tcpm@ietfa.amsl.com>; Mon, 31 Oct 2022 08:34:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.326
X-Spam-Level:
X-Spam-Status: No, score=-1.326 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a6w86QLWIb7Q for <tcpm@ietfa.amsl.com>; Mon, 31 Oct 2022 08:34:17 -0700 (PDT)
Received: from server217-2.web-hosting.com (server217-2.web-hosting.com [198.54.115.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A4DEC1524DD for <tcpm@ietf.org>; Mon, 31 Oct 2022 08:34:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=msFWpHK1D5mTudkN3vwnD4JVbkeHXeE7oJn5zEwF9Ls=; b=YyawyZTADZeUMTX7V0JUJ1U3Hs 3PLpfDuwejNW7fmfu5vZHw00XY41QG6KXxMuGPOzbnmtr8jfRnaRSgjDddw9sOIdO9OUPE/PYEkMR sJRUnrYFPpR47z1WYHApCEXJ28tdJpeItAc5lsqzNRko4xDjGafD55WyoQQSrzZO5n2HxjnSVla7Y o6Kw0DIhOyVCa+s5JNpiE1QqFNbO3Xxq2oD01mS45KEebmZ4aP67WT7Z8LPYRYBUg+Y4ydq2Pp+np 9mps8nvxXvioActOGbZ4gOwkAEQSjdHmzigTIzYEQkSlKtZ8LCya4cdHO2WvgdH8eDkT8PfOUUH0V BoJNeQIQ==;
Received: from cpe-172-114-237-88.socal.res.rr.com ([172.114.237.88]:60881 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from <touch@strayalpha.com>) id 1opWnf-006Aqm-2D; Mon, 31 Oct 2022 11:34:12 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_939F1576-5BD6-4861-A521-6A7CD1D5A3C3"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.200.110.1.12\))
From: "touch@strayalpha.com" <touch@strayalpha.com>
In-Reply-To: <CAAK044QQQeJBPw0CmqhC3Js6wr-aLw0_pH+vLVTytZJ3JrCXtw@mail.gmail.com>
Date: Mon, 31 Oct 2022 08:33:56 -0700
Cc: tcpm <tcpm@ietf.org>
Message-Id: <F760E14C-DC81-4F06-9AF8-68E2EB1C9D5D@strayalpha.com>
References: <0FF01EB8-C286-481D-9694-673DC3C59C7A@strayalpha.com> <96c57846-bb58-d186-82a1-dac649370602@mti-systems.com> <0102C65C-1847-4DD6-8624-50C25E1A2AD2@strayalpha.com> <4CDA7158-89EA-4833-9636-74595E96F739@strayalpha.com> <CAAK044RP0vE8U0go9bZHaqCW6pcduVyMo7KQNBbtfwReN5O5kw@mail.gmail.com> <689D6379-9DAE-4CC0-A7FF-57E04B2B0352@strayalpha.com> <CAAK044QQQeJBPw0CmqhC3Js6wr-aLw0_pH+vLVTytZJ3JrCXtw@mail.gmail.com>
To: Yoshifumi Nishida <nsd.ietf@gmail.com>
X-Mailer: Apple Mail (2.3731.200.110.1.12)
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/PK-iqAHTyK1CuOn18jOZOalrN_A>
Subject: Re: [tcpm] TCP EDO and SYN-EXT-OPT finalization - request for discussion
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 Oct 2022 15:34:21 -0000

Hi, Yoshi, 

> On Oct 31, 2022, at 1:38 AM, Yoshifumi Nishida <nsd.ietf@gmail.com> wrote:
> 
> Hi Joe, 
> 
> Thanks for the clarification. 
> As far as I read the draft, I guess the summaries for EDO with TSO are something like this. Is this correct?
> 
> 1: EDO can live with TSO adopters if they don't coalesce nor split the segments with unknown options. If not, they need to be updated.

Yes, that’s specifically for legacy TSO adapters.

> 2: This means when EDO is used in a connection, TSO will be disabled for the connection as EDO option must be placed in all segments

No; only incorrectly implemented legacy TSO adapter would need to be disabled for that connection. 

A legacy TSO adapter that handled unknown options correctly would basically disable itself, so no application-level action would be needed.

An EDO-aware TSO would not need to be disabled and would not need to disable itself.

> 3: EDO can identify wrong TSO behavior if it uses EDO option with segment length, but cannot with EDO option with simple variant

Yes.

> 4: If TSO-enabled adopters support EDO, TSO can be used with EDO without disabling the feature.

Or if legacy TSO implementations either already did the correct thing or were updated to do the correct thing for unknown options.

> 5: in order to achieve 4:, one approach could be to standardize EDO.   

Standardizing EDO is already in TCPM charter.

Standardizing EDO affects only whether/when TSO implementations could support EDO; either way, incorrectly implemented TSOs can be fixed right now.

The better way to think of this is that standardizing EDO can help users detect incorrectly implemented TSO, which means that bug (of not ignoring unknown TCP options) can get fixed, which benefits not only EDO but all new TCP options.

Joe

> --
> Yoshi
> 
> On Sat, Oct 29, 2022 at 10:45 AM touch@strayalpha.com <mailto:touch@strayalpha.com> <touch@strayalpha.com <mailto:touch@strayalpha.com>> wrote:
>> Sure - the issue was clarifying the way in which EDO interacts with TCP segment offload (TSO). The diffs are at the end of section 9, as shown here:
>> https://www.ietf.org/rfcdiff?url2=draft-ietf-tcpm-tcp-edo-13.txt
>> 
>> The goal is to be more clear that this is a bug in TSO that EDO adopters need to be on the lookout for.
>> 
>> Joe
>> 
>> —
>> Dr. Joe Touch, temporal epistemologist
>> www.strayalpha.com <http://www.strayalpha.com/>
>> 
>>> On Oct 24, 2022, at 10:13 AM, Yoshifumi Nishida <nsd.ietf@gmail.com <mailto:nsd.ietf@gmail.com>> wrote:
>>> 
>>> Hi Joe,
>>> 
>>> Thanks for the update. Could you elaborate the changes a bit more? I am sorry that I missed what the feedback was. 
>>> --
>>> Yoshi
>>> 
>>> On Sat, Oct 22, 2022 at 4:25 PM touch@strayalpha.com <mailto:touch@strayalpha.com> <touch@strayalpha.com <mailto:touch@strayalpha.com>> wrote:
>>>> FYI - both docs have been updated.
>>>> 
>>>> The EDO doc includes some long-pending changes based on feedback from Michael Scharf, regarding TSO. It should be ready for WGLC.
>>>> 
>>>> Joe
>>>> 
>>>> —
>>>> Dr. Joe Touch, temporal epistemologist
>>>> www.strayalpha.com <http://www.strayalpha.com/>
>>>> 
>>>>> On Mar 4, 2022, at 11:05 AM, touch@strayalpha.com <mailto:touch@strayalpha.com> wrote:
>>>>> 
>>>>> Hi, all,
>>>>> 
>>>>> I’d like to request:
>>>>> 
>>>>> a) WGLC for EDO
>>>>> 
>>>>> b) some sort of WG decision on whether to adopt it as experimental (and, AFAICT, go to WGLC, given we’re already been around the block with it) or give me the go-ahead to submit it as individual experimental
>>>>> 
>>>>> Both drafts are active through April, so I’ll hold on re-issuing until (b).
>>>>> 
>>>>> Thanks,
>>>>> 
>>>>> 
>>>>> —
>>>>> Dr. Joe Touch, temporal epistemologist
>>>>> www.strayalpha.com <http://www.strayalpha.com/>
>>>>> 
>>>>>> On Oct 12, 2021, at 1:07 PM, Wesley Eddy <wes@mti-systems.com <mailto:wes@mti-systems.com>> wrote:
>>>>>> 
>>>>>> On 10/12/2021 3:50 PM, touch@strayalpha.com <mailto:touch@strayalpha.com> wrote:
>>>>>>> 
>>>>>>> - are there any open issues or pending suggestions to TCP EDO to prepare it for last call?
>>>>>>> 
>>>>>> I think it's in good shape for a last call.  It's stable and addresses all of the feedback to date, aside from greater implementation and field experience.  At the moment, it seems like QUIC has solved the burning need we had for TCP options space, by attracting all the work that would normally need more options. However, after many years of discussion about how to handle this for TCP, and many candidates, the EDO approach was the one the working group was able to get consensus around, and we really should wrap up and publish it, IMHO.
>>>>>> 
>>>>>> 
>>>>>>> - would the WG like to adopt SYN-EXT-OPT as experimental as well or would it be preferred (and OK) to submit this as individual/experimental if not?
>>>>>>> 
>>>>>> Either approach is fine with me, and I prefer either of them rather than not advancing anything.  I would be willing to contribute reviews for either path.
>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> tcpm mailing list
>>>>>> tcpm@ietf.org <mailto:tcpm@ietf.org>
>>>>>> https://www.ietf.org/mailman/listinfo/tcpm
>>>>> 
>>>>> _______________________________________________
>>>>> tcpm mailing list
>>>>> tcpm@ietf.org <mailto:tcpm@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/tcpm
>>>> 
>> 
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm