Re: [tcpm] Milestones changed for tcpm WG

"Scharf, Michael" <Michael.Scharf@hs-esslingen.de> Wed, 05 May 2021 08:57 UTC

Return-Path: <Michael.Scharf@hs-esslingen.de>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 931783A18CF; Wed, 5 May 2021 01:57:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hs-esslingen.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gno0A5T6bY_z; Wed, 5 May 2021 01:57:29 -0700 (PDT)
Received: from mail.hs-esslingen.de (mail.hs-esslingen.de [134.108.32.78]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 41C603A18CB; Wed, 5 May 2021 01:57:28 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.hs-esslingen.de (Postfix) with ESMTP id EDE1225A19; Wed, 5 May 2021 10:57:26 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hs-esslingen.de; s=mail; t=1620205047; bh=fYG/WcA/5q4fotW5rTpMUbWjeLqAFxa8ZZWe+6TSbI4=; h=From:To:CC:Subject:Date:References:In-Reply-To:From; b=kV/HGUthJEqeHIK109KxUC2YvFvzMHt4bQVsscVdTqffXis3S0BZMovnDTYXya9L1 CySdQuDtbeQLAsxY4oqM3RwrFzfaRu8ea1mxT+rZPZ55mpg6OibbHSbrqj89wpfnUy jLG7/7DK1Vt095EsdIjzae8XQezYY9x7toUZ/iiI=
X-Virus-Scanned: by amavisd-new-2.7.1 (20120429) (Debian) at hs-esslingen.de
Received: from mail.hs-esslingen.de ([127.0.0.1]) by localhost (hs-esslingen.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r4wPQGXaoA9b; Wed, 5 May 2021 10:57:25 +0200 (CEST)
Received: from rznt8201.rznt.rzdir.fht-esslingen.de (rznt8201.hs-esslingen.de [134.108.48.164]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.hs-esslingen.de (Postfix) with ESMTPS; Wed, 5 May 2021 10:57:25 +0200 (CEST)
Received: from rznt8202.rznt.rzdir.fht-esslingen.de (134.108.48.165) by rznt8201.rznt.rzdir.fht-esslingen.de (134.108.48.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Wed, 5 May 2021 10:57:23 +0200
Received: from rznt8202.rznt.rzdir.fht-esslingen.de ([fe80::aca4:171a:3ee1:57e0]) by rznt8202.rznt.rzdir.fht-esslingen.de ([fe80::aca4:171a:3ee1:57e0%3]) with mapi id 15.01.2176.012; Wed, 5 May 2021 10:57:23 +0200
From: "Scharf, Michael" <Michael.Scharf@hs-esslingen.de>
To: Joseph Touch <touch@strayalpha.com>
CC: Yoshifumi Nishida <nsd.ietf@gmail.com>, tcpm IETF list <tcpm@ietf.org>, tcpm-chairs <tcpm-chairs@ietf.org>
Thread-Topic: [tcpm] Milestones changed for tcpm WG
Thread-Index: AQHW/6iGGTI4OpADoU+Ptm6dDA6d8KrQwB6AgADrD4CAAMICAIAAqLmAgAAKjgCAAPKVsIAAE6aAgADt4rA=
Date: Wed, 05 May 2021 08:57:23 +0000
Message-ID: <b6ef493662594409877ca870686d9942@hs-esslingen.de>
References: <CAAK044RYPFaZU+X0GHFJksjbP0ub2WTZnLzv1RPzE4O5tn9sOg@mail.gmail.com> <B5AB51EF-01FD-4050-89B5-38E32141A63A@strayalpha.com> <2e6e1552fcc442fb8464668a649ce9e8@hs-esslingen.de> <DB679A55-CD0B-4975-A585-12F76736318C@strayalpha.com>
In-Reply-To: <DB679A55-CD0B-4975-A585-12F76736318C@strayalpha.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [134.108.140.248]
Content-Type: multipart/alternative; boundary="_000_b6ef493662594409877ca870686d9942hsesslingende_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/i0qMoEOhSeKo1sKqMhWlOhm867I>
Subject: Re: [tcpm] Milestones changed for tcpm WG
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 May 2021 08:57:36 -0000

Hi Joe,

Adding more explicit text would improve the document.

And I suggest avoiding a discussion whether certain offloading mechanisms indeed follow the TCP specification, or not. Offloading seems to be a widely used technology. It is simply not our (i.e., the IETF’s) job to make judgement calls about design decisions of implementers.

IMHO it is just sufficient to clearly describe in the EDO specification any known issues and potential mitigation strategies.

Michael



From: Joseph Touch <touch@strayalpha.com>
Sent: Tuesday, May 4, 2021 10:27 PM
To: Scharf, Michael <Michael.Scharf@hs-esslingen.de>
Cc: Yoshifumi Nishida <nsd.ietf@gmail.com>; tcpm IETF list <tcpm@ietf.org>; tcpm-chairs <tcpm-chairs@ietf.org>
Subject: Re: [tcpm] Milestones changed for tcpm WG

Hi, Michael,

Below, yes - the text could be more clear.

I think what might best be said, in short, would be:

- some TSOs (like some middle boxes, though a separate issue) may not deal with this option properly (like any unknown option)
- we have a method to detect that but, like all protocols, don’t anticipate using it all the time just to detect implementations that don’t follow the specs

So yes, the text could be revised (and will be). I think that’s a little different from a WG consensus call on whether to endorse misbehaving TSOs as something we should either endorse or design against in the default case.

Joe


On May 4, 2021, at 12:20 PM, Scharf, Michael <Michael.Scharf@hs-esslingen.de<mailto:Michael.Scharf@hs-esslingen.de>> wrote:

Hi Joe,

As far as I can see, the relevant section in draft-ietf-tcpm-tcp-edo-10 is:

   Implementers need to be careful about the potential for offload
   support interfering with this option. The EDO data needs to be
   passed to the protocol stack as part of the option space, not
   integrated with the user segment, to allow the offload to
   independently determine user data segment boundaries and combine
   them correctly with the extended option data. Some legacy hardware
   receive offload engines may present challenges in this regard, and
   may be incompatible with EDO where they incorrectly attempt to
   process segments with unknown options. Such offload engines are part
   of the protocol stack and updated accordingly. Issues with incorrect
   resegmentation by an offload engine can be detected in the same way
   as middlebox tampering.

In that paragraph, as non-native speaker, I don’t understand the sentence “Such offload engines are part of the protocol stack and updated accordingly.”

Maybe I miss something, but if there are potential issues with offloading, that could be described more explicitly and more clearly. In that case, more warning signs could be put in place at more prominent places in the document, too.

Personally, I would not be surprised if certain ways of offloading were more common than middlebox tampering. Well, I don’t know. Anyway, if that was true, a discussion regarding offloading might actually be more important than middlebox tempering.

Just as a random data point, if I were an implementer, I would probably expect a dedicated section regarding offloading, or something like that. And I would probably _not_ use the term “middlebox” when searching in the Web for material related to TSO…

My 2 cents

Michael



From: Joe Touch <touch@strayalpha.com<mailto:touch@strayalpha.com>>
Sent: Tuesday, May 4, 2021 6:48 AM
To: Yoshifumi Nishida <nsd.ietf@gmail.com<mailto:nsd.ietf@gmail.com>>
Cc: tcpm IETF list <tcpm@ietf.org<mailto:tcpm@ietf.org>>; tcpm-chairs <tcpm-chairs@ietf.org<mailto:tcpm-chairs@ietf.org>>
Subject: Re: [tcpm] Milestones changed for tcpm WG

Yoshi,



On May 3, 2021, at 9:10 PM, Yoshifumi Nishida <nsd.ietf@gmail.com<mailto:nsd.ietf@gmail.com>> wrote:

Hi Joe,

On Mon, May 3, 2021 at 11:06 AM Joseph Touch <touch@strayalpha.com<mailto:touch@strayalpha.com>> wrote:
Hi, Yoshi,



On May 2, 2021, at 11:31 PM, Yoshifumi Nishida <nsd.ietf@gmail.com<mailto:nsd.ietf@gmail.com>> wrote:

Hi Joe,

Thanks for bringing this up again.
In my understanding, there was no clear consensus on the interactions with TSO yet. Or, have we settled?

I don’t understand what “consensus” would mean.

TSO isn’t a standard; it’s an implementation, i.e., which ought to follow the TCP standards.

Nothing we’re doing deviates from how standards-compliant implementations handle options. However, if an implementation incorrectly ignores unknown options, then it would could be problematic for this approach, as well as others.



I thought you'll update the draft for this.

I’m not sure what to say about this issue - do you want me to point out the issue with TSO sometimes causing problems because it’s out of spec?

If so, I can do that.


I think that would be helpful for the doc. But, I also think this doc should have a clear vision on the interaction with TSO beforehand.
I think we should have a consensus on this point such as:

* EDO should not be used with TSO
* It's fine to use EDO with TSO in any circumstances.
* it's fine to use EDO with TSO under a certain conditions
* The draft does not need to specify anything for TSO as it's out of scope of the doc.

These are not decisions for the WG. TSO isn’t a single thing; it’s a nickname for an implementation optimization.  Like all such optimizations, it’s always fine when it complies with specs and not when it doesn’t.

I.e., everything stated above is equally possible if you replace “TSO” with “Linux”.

It is out of scope for the WG to state anything about either (TSO or Linux) other then “it’s ok if it complies with secs and not when it doesn’t”.

This is not the doc to point out that TSO (or any other implementation) sometimes breaks TCPs rules or that these, like all options, put TCP behavior at risk when that happens.

Joe




Thanks,
--
Yoshi

_______________________________________________
tcpm mailing list
tcpm@ietf.org<mailto:tcpm@ietf.org>
https://www.ietf.org/mailman/listinfo/tcpm