[tcpm] Re: Last Call: <draft-ietf-tcpm-accurate-ecn-31.txt> (More Accurate Explicit Congestion Notification (ECN) Feedback in TCP) to Proposed Standard
Stuart Cheshire <cheshire@apple.com> Fri, 17 April 2026 23:45 UTC
Return-Path: <cheshire@apple.com>
X-Original-To: tcpm@mail2.ietf.org
Delivered-To: tcpm@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 9A08EDEA1171 for <tcpm@mail2.ietf.org>; Fri, 17 Apr 2026 16:45:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1776469502; bh=dbUaF/ssQTDMndIQsWYZwD6mTUSDqWKk67/vpd8V0ro=; h=From:Subject:Date:In-reply-to:Cc:To:References; b=B/bqaC/2wz7s2/yE42K3aYYd11ESRLLjJLFrZnLi1DNma9gig3huXKBzyiGCtgBKl inz9CT6pIdqyEeBxmnrfp0OJgJR8w3YsqkSeDsLu3wgz1hTHTgxs7XZYCSXTlcis2G rajgXiVeVnbmSjygITd4D1LCCLNaIJsoksZE5Pks=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.798
X-Spam-Level:
X-Spam-Status: No, score=-2.798 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_NONE=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rdnNkMBcVNNM for <tcpm@mail2.ietf.org>; Fri, 17 Apr 2026 16:45:01 -0700 (PDT)
Received: from rn-mx01.apple.com (rn-mx01.apple.com [17.132.108.0]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 3716EDEA10C1 for <tcpm@ietf.org>; Fri, 17 Apr 2026 16:44:30 -0700 (PDT)
Received: from mr55p01nt-mtap03.apple.com (mr55p01nt-mtap03.ise.apple.com [10.170.185.206]) by mr55p01nt-mxp01.apple.com (Oracle Communications Messaging Server 8.1.0.28.20250821 64bit (built Aug 21 2025)) with ESMTPS id <0TDN1WO3ZWLZWI20@mr55p01nt-mxp01.apple.com> for tcpm@ietf.org; Fri, 17 Apr 2026 23:44:23 +0000 (GMT)
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49 definitions=2026-04-17_03,2026-04-17_04,2025-10-01_01
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=cc : content-type : date : from : in-reply-to : message-id : mime-version : references : subject : to; s=20180706; bh=X3z0bfFSqTnjNMYzNR/5YlhROUpRkVwoqebcyh/Rfkk=; b=fVZhUobGYIN8m/Oye6LbltWhZ3a1boKVNJkErHZDl/qQsQACMSzV98P9XV3mEqKT1rxQ u9WM/xAiHISBLz85/HkHLlV9d4p8dCqGBf7wmh58XOETJj7luVMwAxdIhg0xh+BgeXRp QimF2Vtg71bd9SahDjxntVU6lLZl29n8pvNokW8frvCHltt9KxevokImegvHzTdk2nVd qZJKvfdKoe98BJb77Qukjpdr5KqVl9CIXSeN3lK2/n3XXnqEjlFbJT3bGuoqy/v/n6sp /7U3ULaXGEmF30DbRF7hjgL8F0HCseS3Y8XxNRvrcy0pAtChr029BrEHG81QnYjZqvSH 8w==
Received: from mr55p01nt-mmpp08.apple.com (mr55p01nt-mmpp08.ise.apple.com [10.170.185.194]) by mr55p01nt-mtap03.apple.com (Oracle Communications Messaging Server 8.1.0.28.20250821 64bit (built Aug 21 2025)) with ESMTPS id <0TDN25OG6WLZ8EO0@mr55p01nt-mtap03.apple.com>; Fri, 17 Apr 2026 23:44:23 +0000 (GMT)
Received: from process_milters-daemon.mr55p01nt-mmpp08.apple.com by mr55p01nt-mmpp08.apple.com (Oracle Communications Messaging Server 8.1.0.28.20250821 64bit (built Aug 21 2025)) id <0TDN2BY00W7GN500@mr55p01nt-mmpp08.apple.com>; Fri, 17 Apr 2026 23:44:23 +0000 (GMT)
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49 definitions=2026-04-17_03,2026-04-17_04,2025-10-01_01
Received: from smtpclient.apple (unknown [17.11.210.215]) by mr55p01nt-mmpp08.apple.com (Oracle Communications Messaging Server 8.1.0.28.20250821 64bit (built Aug 21 2025)) with ESMTPSA id <0TDN2BOENWL4T100@mr55p01nt-mmpp08.apple.com>; Fri, 17 Apr 2026 23:43:52 +0000 (GMT)
From: Stuart Cheshire <cheshire@apple.com>
Message-id: <8AA912DE-C756-4402-A1DB-E81237E4AAAC@apple.com>
Content-type: multipart/mixed; boundary="Apple-Mail=_8FC862EE-21DE-4502-B4E7-AF5DFE54AE92"
MIME-version: 1.0 (Mac OS X Mail 16.0 \(3826.700.81.1.4\))
Date: Fri, 17 Apr 2026 16:43:52 -0700
In-reply-to: <173799719723.953971.3060040620713008945@dt-datatracker-5584d84fb4-tg2td>
To: draft-ietf-tcpm-accurate-ecn@ietf.org, tcpm@ietf.org
References: <173799719723.953971.3060040620713008945@dt-datatracker-5584d84fb4-tg2td>
X-Mailer: Apple Mail (2.3826.700.81.1.4)
Message-ID-Hash: 3M2RTU22ECGPWEKD2S7SNHNSZ2GDWBLU
X-Message-ID-Hash: 3M2RTU22ECGPWEKD2S7SNHNSZ2GDWBLU
X-MailFrom: cheshire@apple.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [tcpm] Re: Last Call: <draft-ietf-tcpm-accurate-ecn-31.txt> (More Accurate Explicit Congestion Notification (ECN) Feedback in TCP) to Proposed Standard
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/XD_O2foNrZAWQd6SNUIDh7pPwcY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>
On Jan 27, 2025, at 11:59, The IESG <iesg-secretary@ietf.org> wrote: > The IESG has received a request from the TCP Maintenance and Minor Extensions > WG (tcpm) to consider the following document: - 'More Accurate Explicit > Congestion Notification (ECN) Feedback in TCP' > <draft-ietf-tcpm-accurate-ecn-31.txt> as Proposed Standard > > The IESG plans to make a decision in the next few weeks, and solicits final > comments on this action. Please send substantive comments to the > last-call@ietf.org mailing lists by 2025-02-10. Exceptionally, comments may > be sent to iesg@ietf.org instead. In either case, please retain the beginning > of the Subject line to allow automated sorting. Just writing to check in on this. It has been over a year since the Last Call on this document, and it has been in AUTH48 for a while. I’m particularly interested in the following issue, which I previously mentioned in passing in my review on 6th February 2025: > Testing for Zeroing of the ACE Field > > The possibility of re-ordering means that there is a small chance > that the ACE field on the first packet to arrive is genuinely zero > (without middlebox interference). This would cause a host to > unnecessarily disable ECN for a half connection. Therefore, in > environments where there is no evidence of the ACE field being > zeroed, implementations can skip this test. > > I have reservations about this test. The idea that this heuristic might suffer from false positives and falsely disable Accurate ECN for no good reason worries me. A user is expecting the low-latency benefits of L4S and Accurate ECN, and then though no fault of their own sometimes does not get these benefits. I also have mixed feelings about the trade-off that is implicit here: If there are defective middleboxes on the path, would we like to see these middleboxes fixed, or do we want to enable them to remain broken in perpetuity (to the detriment of all the people unfortunate enough to have their traffic traverse those defective middleboxes)? > > Knowing what we know now in 2025, is this zero-ACE-field check still necessary? I would hate to have a heuristic designed to work around failures of the past end up becoming a liability that causes a new set of unpredictable failures indefinitely into the future. Subsequently this mild reservation proved to be justified, when Koen De Schepper discovered it was causing real operational problems. I believe this code has been removed from Linux now, and I gave the attached presentation at IETF 124 in Montréal, November 2025. I believe we agreed that this text had proven unwise and should be removed before publication. Where do we stand on this? Was the change made in the RFC to match the reality of what Linux (and other platforms) actually do? Is the RFC ready to publish? TCP Accurate ECN is awesome work, and I hate to see it languish. Stuart Cheshire
- [tcpm] Last Call: <draft-ietf-tcpm-accurate-ecn-3… The IESG
- [tcpm] Re: Last Call: <draft-ietf-tcpm-accurate-e… Stuart Cheshire
- [tcpm] Re: Last Call: <draft-ietf-tcpm-accurate-e… Mirja Kuehlewind
- [tcpm] Re: Last Call: <draft-ietf-tcpm-accurate-e… Stuart Cheshire
- [tcpm] Re: Last Call: <draft-ietf-tcpm-accurate-e… Gorry Fairhurst
- [tcpm] Re: Last Call: <draft-ietf-tcpm-accurate-e… Mirja Kuehlewind