Re: [tcpm] Working group acceptance call draft-bagnulo-tcpm-generalized-ecn-04

Bob Briscoe <ietf@bobbriscoe.net> Fri, 14 July 2017 19:04 UTC

Return-Path: <ietf@bobbriscoe.net>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E390131798 for <tcpm@ietfa.amsl.com>; Fri, 14 Jul 2017 12:04:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ypLYdEdrviQT for <tcpm@ietfa.amsl.com>; Fri, 14 Jul 2017 12:04:04 -0700 (PDT)
Received: from server.dnsblock1.com (server.dnsblock1.com [85.13.236.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1DAEC1316A8 for <tcpm@ietf.org>; Fri, 14 Jul 2017 12:04:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Type:In-Reply-To:MIME-Version:Date: Message-ID:References:Cc:To:From:Subject:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=LcyeJGn3uZTg/xclcoLlMlY+tQvrWiQPrE9qaxUPoCE=; b=neKJEEOCHzTQnzxCRfPILXl9E azMaSkpPotjEOW46oA3AwI4kY1coPFVusEhegvar4mceHNQrY/onmcdolkuKtxBQieatWt1feHtzr dGTIS5VRHuR2u652B2OLk+FcVb1Lg1dwmV/9ofEf0kyznCjWxeshEw6ksB4TLt4tHEQ7mPDFE5sQC LpFU19zUuxXIM0Z6SRf50oykof+0Teyard+75BWuDP4Ndy1rV+SI9vCzo1nPW/TltfDGpkpu9zTl2 eBKzQXomVKD1FkU7t59lAxUdxq3EKvumlfxUnE30YxfzqZyjC7cEVwLh+ojZdQiQ/q7sUtZVcgreI aes9TNy6A==;
Received: from [31.185.128.124] (port=51246 helo=[192.168.0.13]) by server.dnsblock1.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.89) (envelope-from <ietf@bobbriscoe.net>) id 1dW5sg-0005c1-1u; Fri, 14 Jul 2017 20:04:02 +0100
From: Bob Briscoe <ietf@bobbriscoe.net>
To: gorry@erg.abdn.ac.uk
Cc: "tcpm@ietf.org" <tcpm@ietf.org>
References: <DB4PR07MB348CA7CD6395A93F37406AAC2DE0@DB4PR07MB348.eurprd07.prod.outlook.com> <59537985.5010603@erg.abdn.ac.uk> <1e3c61e3-7886-8418-8837-8c0e30da0f03@bobbriscoe.net>
Message-ID: <574fa87c-16f2-7908-b392-b362ce1de3b1@bobbriscoe.net>
Date: Fri, 14 Jul 2017 20:03:54 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <1e3c61e3-7886-8418-8837-8c0e30da0f03@bobbriscoe.net>
Content-Type: multipart/alternative; boundary="------------7019FF74FD10DEF08FC49674"
Content-Language: en-GB
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server.dnsblock1.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: server.dnsblock1.com: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: server.dnsblock1.com: in@bobbriscoe.net
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/_VC-FQyMjnbyG8fM2qqvC_huycE>
Subject: Re: [tcpm] Working group acceptance call draft-bagnulo-tcpm-generalized-ecn-04
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jul 2017 19:04:15 -0000

Gorry,

I have prepared text that addresses your comments (and Padma's), ready 
to submit when the servers open (Michael Scharf has asked me to submit 
-00 without other changes, then put queued up changes in -01).

I have a couple of follow-ups...

On 03/07/17 00:27, Bob Briscoe wrote:
> Gorry,
>
> Thx for your (as always) detailed and useful review. My replies tagged 
> [BB] inline are my personal opinion, without having consulted with my 
> co-author (Marcelo).
>
> On 28/06/17 10:40, Gorry Fairhurst wrote:
>>
>> I support adoption of this work. I think there this is useful, and I 
>> will review future versions. I would also like to contribute 
>> measurements to inform the deployment of ECN methods.
>>
>> However, I query the inclusion of SCTP-specific text in this draft, 
>> and suggest this can be removed and contributions made to the related 
>> TSVWG work item to update the SCTP Spec. (Please see suggestions below.)
>>
>> Best wishes,
>>
>> Gorry
>>
>> —
>> TEXT (SCTP):
>> The present document also considers the implications for common
>> derivatives and variants of TCP, such as SCTP [RFC4960], if the
>> experiment is successful.
>> - I am not sure this is appropriate, in particular, I doubt it is 
>> helpful to explicitly speculate about changes to addd ECN to SCTP 
>> that have yet to be progressed in the IETF. I’d much prefer this to 
>> refer to more general advice saying that similar methods may apply 
>> also to other transports that provide ECN support. (But see later, 
>> because I try to suggest a different approach).
>> - Similarly I am not sure why section 5.1 is helpful in a TCPM document.
>> —
>> TEXT (SCTP):
>> The following subsections discuss any interactions between setting
>> ECT on all all packets and using the following popular variants or
>> derivatives of TCP: SCTP, IW10 and TFO.
>> - Section 5 discusses SCTP as a variant of TCP, I do not think this 
>> is appropriate. While SCTP can - and does - share congestion control 
>> mechanisms with TCP, it is regarded as a separate protocol. I think 
>> if kept, a change in wording would be really helpful.
>> —
>> My recommendations to consider regarding SCTP:
>>
>> (1) I would encourage you to remove the SCTP-specific text and think 
>> whether the draft could instead have a section saying something a 
>> little like:
>> /If the IETF specifies ECN for other IETF protocols, it is expected 
>> that these specifications should also mark IP packets for their 
>> transport flows in the same way as described in this specification 
>> for TCP./
>> … with detail as required. I would see such text as informative, but 
>> very useful for UDP-based methods as well as for SCTP, DCCP, etc.
>>
>> (2) I suggest instead that if this is adopted by TCPM, some 
>> appropriate text is proposed to the TSVWG document: 
>> draft-ietf-tsvwg-rfc4960-errata. This document is a set of 
>> corrections that TSVWG will use to update the annexe to refer to this 
>> EXP spec. The paragraphs in this spec seem like a great starting 
>> point for such text and would be welcome in TSVWG.
> [BB] You're right. Our draft was wrong to get too specific about a 
> draft on adding ECN to SCTP that was only an individual draft and was 
> never adopted. Your proposed approach is a better one, which I would 
> like to follow (if adopted).
[BB] I've looked at 4960. I'm afraid adding ECN to SCTP will require 
more than errata. The ECN appendix in RFC4960 only specified the wire 
protocol, not the behaviour. So there's nothing there about setting or 
not setting ECT on control packets, or how to respond or anything. I 
think a separate ECN draft will be necessary. 
draft-stewart-tsvwg-sctpecn was a good start, so this might be 
resurrected. I guess a whole protocol spec masquerading as errata could 
be added to draft-ietf-tsvwg-rfc4960-errata, but I doubt that was the 
intention.

In ECN++, I have generalized the title of the SCTP subsection to "TCP 
Derivatives" with just 2 paras. One just introductory:  what SCTP is, 
and that there have been some attempts to add ECN to it. Then the second 
saying "Experience from experiments on adding ECN support to all TCP 
packets ought to be directly transferable to derivatives of TCP, like 
SCTP or QUIC". I also referred to Ingemar's ECN-QUIC draft.

>> ——
>> TEXT (Question on retransmissions):
>> It can ignore the prohibition in section
>> 6.1.5 of RFC 3168 against setting ECT on retransmissions.
>> - I am not sure this is quite thought through yet: When loss occurs 
>> as a result of a path change - i.e. encountering a middlebox-like 
>> behaviour that does not allow "normal" ECN on the new path, an 
>> updated path may not allow ECN to work in the way it is envisaged. 
>> This is actually a very similar case of ECN SYN negotiation. To me, 
>> this means a need for some form of fall-back and caching may need to 
>> be invoked when a retransmission is triggered and fails.
>> - The measurement section probably would be improved in there was 
>> some note made that network path changes need to be considered as a 
>> potential cause of loss that could result in change of the ECN 
>> handling of the end-to-end path.
> [BB] Yes, Padma had already made a similar point for a case without an 
> ECT SYN where ECT retransmissions of the client's first data packet 
> are not getting through. I suggested text that Padma was happy with 
> for that case. But the route change case is more general and needs 
> more thought so I won't rush to propose a fix tonight. But we will 
> attempt to address this in the next rev.
[BB] Done (New section "3.2.8 General Fall-back for all Control Packets 
and Retransmissions")


>> - When the retransmission occurs, TCP is already reacting to loss 
>> detection. DCTCP and ABE both call loss out as a form of congestion 
>> detection that can not be handled by the ECN logic - i.e. the cwnd is 
>> reduced according to the loss reaction, not teh CE-marking. A CE-mark 
>> in this case offers little extra congestion information - somehow the 
>> text I think needs to be clearer here.
>
[BB]: You might have missed the existing penultimate para in the 
rationale section on retransmissions (4.8)

    "Finally, the third argument is about over-reacting to congestion.
    The argument goes that, if a retransmitted packet is dropped, the
    sender will not detect it, so it will not react again to congestion
    (it would have reduced its congestion window already when it
    retransmitted the packet). Whereas, if retransmitted packets can be
    CE tagged instead of dropped, senders could potentially react more
    than once to congestion. However, we argue that it is legitimate to
    respond again to congestion if it still persists in subsequent round
    trip(s).

    Therefore, in all three cases, it is not incorrect to set ECT on
    retransmissions.
    "


Cheers



Bob

-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/