Re: [tcpm] [Last-Call] Last Call: <draft-ietf-tcpm-rto-consider-14.txt> (Requirements for Time-Based Loss Detection) to Best Current Practice

tom petch <daedulus@btconnect.com> Thu, 28 May 2020 16:32 UTC

Return-Path: <daedulus@btconnect.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0BAA23A0FF3; Thu, 28 May 2020 09:32:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7-vPAY_ogRQb; Thu, 28 May 2020 09:32:41 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60134.outbound.protection.outlook.com [40.107.6.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 27C3C3A1013; Thu, 28 May 2020 09:32:23 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=i2wvV/GLKc2zrJtpP10TwnC4dLFnOlFmYTxPdbf1vsRnlUS64rXdhB4x2IlUgbp9Fm3ReOQ90bsF4TpDMKVNJlA344H/BcQcGGgK8OK1te4K2Mvwo4ZsiEYQpdbp0tXXoL9F821tYVCesB+ZFKMHgUIzHyefarLxeuI1eFBT/0muSF1xYiZ7dLHERqLBLONYR3rvfsLZLrJtVoqAG+40R4/Wgkh7fsg/e+Y4qw0/sPwlLZPLYcp3aB9nctxH55DOqMmOtwJiBKbB+jPGP+e6b2IQmyxTQnQPaSbjLnUOOwJs/t6I5UckQdPj3hT9enbGXv8YqxYn2aw63Wgib7qa6g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jr4rHBSEYtqm35zF7BlowWt5VeIg2AzjrccxVgwmvnc=; b=QVv2XsVKk6icjY6xBv6HH+mPWS/cZ4ggrj3MpYkkI67jU+H3hEQ5GO/Yhr6m+So3eSnE1HnHaRtMU3q8WVcJRkTHPvOnpC7byUe7lDjuWgQkqF4gFR/QsYldf66/LhOZcv40sH4LVCU/S39i5Mxvb7QztP1UvpyNdEfKU8zgjbNtnMTurYlKihrH6i6vsuLvB6pg8y6r9peANCJGP08DOhh3u8Pu8CfH2JCUd7Xfg6R8a1xrR/cexjzy548AFoS0tpwD6y7E1aHTkOYMbV0azKWmw1UjmL4rCcaxNEYRJStuSA7z/UHin0tN90/FPBhRAVZx993/bJi/NE75zSoe+w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jr4rHBSEYtqm35zF7BlowWt5VeIg2AzjrccxVgwmvnc=; b=v+RvDPJsSjDWPqMn2aV/7fWXXp6QVZNoRssmWhZKnXUCKFrTyrS+bNYT+hWTdD8stk/lqaJ13VldaN28sJCJFv6P1s66KCxBIxeJEGidKpUyrzszYMMheCznbrZ/WKZwAs9tXXAFOFa10gNq7Eg+gx28JsBpKfXxBCDXRHSP5W0=
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=btconnect.com;
Received: from VI1PR0701MB2480.eurprd07.prod.outlook.com (2603:10a6:800:63::16) by VI1PR0701MB2781.eurprd07.prod.outlook.com (2603:10a6:801:d::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3045.13; Thu, 28 May 2020 16:32:21 +0000
Received: from VI1PR0701MB2480.eurprd07.prod.outlook.com ([fe80::3474:b82e:e75a:b176]) by VI1PR0701MB2480.eurprd07.prod.outlook.com ([fe80::3474:b82e:e75a:b176%11]) with mapi id 15.20.3045.015; Thu, 28 May 2020 16:32:21 +0000
To: last-call@ietf.org
References: <158981133458.2481.15195759097492819350@ietfa.amsl.com> <DB7PR07MB53406A74483D8123C75ADD70A28E0@DB7PR07MB5340.eurprd07.prod.outlook.com>
Cc: tcpm@ietf.org, draft-ietf-tcpm-rto-consider@ietf.org, tcpm-chairs@ietf.org
From: tom petch <daedulus@btconnect.com>
Message-ID: <5ECFE791.3050400@btconnect.com>
Date: Thu, 28 May 2020 17:32:17 +0100
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
In-Reply-To: <DB7PR07MB53406A74483D8123C75ADD70A28E0@DB7PR07MB5340.eurprd07.prod.outlook.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: LO3P123CA0008.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:ba::13) To VI1PR0701MB2480.eurprd07.prod.outlook.com (2603:10a6:800:63::16)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [192.168.1.65] (81.131.229.108) by LO3P123CA0008.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:ba::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3045.17 via Frontend Transport; Thu, 28 May 2020 16:32:20 +0000
X-Originating-IP: [81.131.229.108]
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 763b12d9-1b6b-4ba8-8498-08d80324b1d3
X-MS-TrafficTypeDiagnostic: VI1PR0701MB2781:
X-Microsoft-Antispam-PRVS: <VI1PR0701MB27817D8F6618E58CF2E39B3FC68E0@VI1PR0701MB2781.eurprd07.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:9508;
X-Forefront-PRVS: 0417A3FFD2
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: FXN03wlfXTYdMNYi6nrHCr5TEyrZwLqP1AoHtll1lKNxEvJbdMGRHoHEPDztzIQwDImcEZkktG503VDhcfmIc7axFVMl14AxFyaeewG1V/pNKZdkovriCnVkf0m83YoXiNb+sNzNeZDzooQU7tG6oC890SCwx3rHVU5iwCJKHUf+FlH+fRAsE82qgEavl1nPZ+X49MpIKoqTbCPn3LMBneRXpW5d5QpCDgsEORaq5ZjeGovdh/glwdyWVGohCDr/V9kDo5wQUDTfnXqjDXoh7k9mbf/sdoJD38SoiRRMAZyj4n9gsYBpj5ZRbyJDzuccyRucGc0B7O3dxyFzz8dn+CuUSeUl3LG+20kgYO5CGbXgE6l30wrLuf5uzXQa6WdC3hvfPX/OpsfNpbSqqFAmbw==
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR0701MB2480.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(346002)(376002)(396003)(366004)(136003)(39860400002)(87266011)(186003)(450100002)(26005)(4326008)(16526019)(478600001)(66476007)(966005)(956004)(66556008)(2616005)(83380400001)(66946007)(5660300002)(36756003)(6666004)(66574014)(16576012)(33656002)(6916009)(53546011)(2906002)(8676002)(6486002)(86362001)(8936002)(52116002)(316002); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData: YwaY6Sdmg83S+qfzW6XSffcBRlCL/hkdXqhMqawcy7BX4mjDCz5B3OusPbRGNVYj72oWigCAsGu0RLL4bJP3Orv7GdL2o7JvkX9FNgLmQGR06hJou/TUtTDNes3ph0RRQ83szGNRXHg5rXaQPNZuCDv5J5MyCoTVZyYdN2YVVdn1he3+jCSdXu9/zm7iRIrgfqn1emZm+Ugse+OJqh0zw6aM9i2hWIRh44qJxMHcZX91SZs7R/4HqwKSgvsbPrXCLCGkIWRHWpG4n+JFM9ryFoizqHdJWtiVq6oDaHjWfNh7wF1OYIJ3vvO65G6Dhjjl2mYWBtghZtHc+u9B1BC0MWZs0zfAIPI87u6OQqV5KW0y0WqzftcLpSZ9YbgW8RI/PhPti4xDL8V2qLrfSpN+XGyo7im4TMJxZA/o6BnndiB7sqXLMXNuvPmcqTkIfC9Xj/IT1ULiXvV6Gf14DfrXq9vBrSsuUz2Q+RnUW74tm5g=
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 763b12d9-1b6b-4ba8-8498-08d80324b1d3
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 May 2020 16:32:21.4288 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: l2ZmqF3QyeYlgwT1+CRAXQCuK86UmcSWPJhB0G/r5+Adn87qjWo2vIbdg/ExlbkJYretbf6v9LljN+3K2Cfsig==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2781
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/YvbJEsgVPsiZVnfcWt9u8q_Ks5A>
Subject: Re: [tcpm] [Last-Call] Last Call: <draft-ietf-tcpm-rto-consider-14.txt> (Requirements for Time-Based Loss Detection) to Best Current Practice
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 May 2020 16:32:45 -0000

The content of this I-D puzzles me, a bit as if an academic paper had
been removed from its context and allowed to float away.

It talks of  'Within the standards process ...' which the rest of the
I-D implies is the IETF Standards process but it then recommends a
minimum RTO of one second which would be a catastrophe for some IETF
protocols which must detect failure in 10 milli-second so that repair is
effected within 50.

There are many references to safety so I looked at the Security
Considerations to see what the dangers are; none.  I am unclear what
these references to safety mean. What is the danger, what is the threat?

" When this time period passes without delivery confirmation the sender
concludes the data was lost in transit...." or the response was lost or
the response was witheld.  I hope that you never get an e-mail delivery
confirmation from me because while the protocol includes it, I will
always configure my MUA to suppress it; breach of security.

"Some protocols use keepalives, heartbeats or other messages to exchange
control information."  I struggle to think of an example of this.  On
the other hand, it came as a surprise to one protocol designer that when
he removed the plug on his connection, literally, nothing happened.
Layer 2 did not tell layer 3, layer 3 did not tell layer 4 and the
application was blissfully unaware, typical of the IETF protocol stack.
Ok failure detection is out of scope but I see heartbeat as primarily
for that purpose and have recommended it on a number of occasions.  (In
a similar vein, some IETF protocols are simplex so the best that can be
done is to add a heartbeat so that the urgent alarm, when it comes, has
a better chance of getting through). I find it hard to draw a hard 
distinction between failure detection and
loss detection.

I am ignorant of the technology encountered in server farms nowadays but
wonder if there is a degree of spoofing there, of ACK being generated at a
front end giving an illusion of a shorter FT, like a recursive resolver
but more so.

Overall the flavour I have is a document about TCP over the
ever-unreliable IP and lacking more general application.  TCP already 
has a rich literature of documents about timeout.  Not wrong, but
likely to be useful to the designer(s) of a new layer four protocol.

Tom Petch

>> ________________________________________
>> From: tcpm <tcpm-bounces@ietf.org> on behalf of The IESG
> <iesg-secretary@ietf.org>
>> Sent: 18 May 2020 15:15
>> To: IETF-Announce
>> Cc: tcpm@ietf.org; draft-ietf-tcpm-rto-consider@ietf.org;
> tcpm-chairs@ietf.org
>> Subject: [tcpm] Last Call: <draft-ietf-tcpm-rto-consider-14.txt>
> (Requirements for Time-Based Loss Detection) to Best Current Practice
>>
>>
>> The IESG has received a request from the TCP Maintenance and Minor
> Extensions
>> WG (tcpm) to consider the following document: - 'Requirements for
> Time-Based
>> Loss Detection'
>>    <draft-ietf-tcpm-rto-consider-14.txt> as Best Current Practice
>>
>> The IESG plans to make a decision in the next few weeks, and solicits
> final
>> comments on this action. Please send substantive comments to the
>> last-call@ietf.org mailing lists by 2020-06-01. Exceptionally,
> comments may
>> be sent to iesg@ietf.org instead. In either case, please retain the
> beginning
>> of the Subject line to allow automated sorting.
>>
>> Abstract
>>
>>
>>      Many protocols must detect packet loss for various reasons (e.g.,
> to
>>      ensure reliability using retransmissions or to understand the
> level
>>      of congestion along a network path).  While many mechanisms have
>>      been designed to detect loss, protocols ultimately can only count
> on
>>      the passage of time without delivery confirmation to declare a
>>      packet "lost".  Each implementation of a time-based loss detection
>>      mechanism represents a balance between correctness and timeliness
>>      and therefore no implementation suits all situations.  This
> document
>>      provides high-level requirements for time-based loss detectors
>>      appropriate for general use in the Internet.  Within the
>>      requirements, implementations have latitude to define particulars
>>      that best address each situation.
>>
>>
>>
>>
>> The file can be obtained via
>> https://datatracker.ietf.org/doc/draft-ietf-tcpm-rto-consider/
>>
>>
>>
>> No IPR declarations have been submitted directly on this I-D.
>>
>>
>>