Re: [tcpm] draft-ietf-tcpm-rfc8312bis questions

Vidhi Goel <vidhi_goel@apple.com> Wed, 28 July 2021 07:30 UTC

Return-Path: <vidhi_goel@apple.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EE783A1788 for <tcpm@ietfa.amsl.com>; Wed, 28 Jul 2021 00:30:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.552
X-Spam-Level:
X-Spam-Status: No, score=-2.552 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SH3ABVG9-Vqp for <tcpm@ietfa.amsl.com>; Wed, 28 Jul 2021 00:30:19 -0700 (PDT)
Received: from ma1-aaemail-dr-lapp03.apple.com (ma1-aaemail-dr-lapp03.apple.com [17.171.2.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D864B3A1800 for <tcpm@ietf.org>; Wed, 28 Jul 2021 00:30:18 -0700 (PDT)
Received: from pps.filterd (ma1-aaemail-dr-lapp03.apple.com [127.0.0.1]) by ma1-aaemail-dr-lapp03.apple.com (8.16.0.42/8.16.0.42) with SMTP id 16S7ISbX024594; Wed, 28 Jul 2021 00:30:15 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=/6tCBU3Dfs/1cY6bpxju08DQuD79gbVby3BXEuREmFE=; b=OozuK6Kd9dH+FqDVzd2JlSa09vgy1QdqQNBr1djTOEt8T/FUvt1pT2OOyBEbmwsLuZ/X Ru6o24bcAAt6SiBotB29qCfDdy+kQiedEP16n0ccOIvT8aQemeTgs9lWwzCqi/u6lPi3 k1s6VMJi56UDEmljUj+DZMKcZeS2RhoZbZiRSux0XiEN0OJMih5GbJWdhdNC+RXaaA2W vG6uvQpKzNWLPlxg7hmk2WM50HMxPtVTxmRKe41AOhhZsxorO8cRYN940sa3ZerthqwP t8jgnfL9qee3qLrVwCYsSVChA895vAyeeXZ+FpEdiIWMIT4KFlz7cqhY0YfTCzlKjT64 1g==
Received: from rn-mailsvcp-mta-lapp02.rno.apple.com (rn-mailsvcp-mta-lapp02.rno.apple.com [10.225.203.150]) by ma1-aaemail-dr-lapp03.apple.com with ESMTP id 3a236kfj5m-29 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Wed, 28 Jul 2021 00:30:15 -0700
Received: from rn-mailsvcp-mmp-lapp03.rno.apple.com (rn-mailsvcp-mmp-lapp03.rno.apple.com [17.179.253.16]) by rn-mailsvcp-mta-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.9.20210415 64bit (built Apr 15 2021)) with ESMTPS id <0QWY001MO26DUYC0@rn-mailsvcp-mta-lapp02.rno.apple.com>; Wed, 28 Jul 2021 00:30:13 -0700 (PDT)
Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp03.rno.apple.com by rn-mailsvcp-mmp-lapp03.rno.apple.com (Oracle Communications Messaging Server 8.1.0.9.20210415 64bit (built Apr 15 2021)) id <0QWY00D0025VYF00@rn-mailsvcp-mmp-lapp03.rno.apple.com>; Wed, 28 Jul 2021 00:30:13 -0700 (PDT)
X-Va-A:
X-Va-T-CD: 496dd5144492d37e6d353a65a06de324
X-Va-E-CD: 755c3673a619f35c03849d0dc5e0d415
X-Va-R-CD: 1a94df0043af936a262058355be6bd4c
X-Va-CD: 0
X-Va-ID: 28c22983-6201-4382-9d02-b54fd6285842
X-V-A:
X-V-T-CD: 496dd5144492d37e6d353a65a06de324
X-V-E-CD: 755c3673a619f35c03849d0dc5e0d415
X-V-R-CD: 1a94df0043af936a262058355be6bd4c
X-V-CD: 0
X-V-ID: 0560ba97-1602-477c-af38-bba7ca570023
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-07-28_05:2021-07-27, 2021-07-28 signatures=0
Received: from smtpclient.apple (unknown [17.234.31.61]) by rn-mailsvcp-mmp-lapp03.rno.apple.com (Oracle Communications Messaging Server 8.1.0.9.20210415 64bit (built Apr 15 2021)) with ESMTPSA id <0QWY0074L26C0Q00@rn-mailsvcp-mmp-lapp03.rno.apple.com>; Wed, 28 Jul 2021 00:30:12 -0700 (PDT)
From: Vidhi Goel <vidhi_goel@apple.com>
Message-id: <2FB9F21D-6D8B-40B0-8D73-7D10B2483CD0@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_BDAB24CA-18EC-4EEF-A1D7-BCED5E7C43E6"
MIME-version: 1.0 (Mac OS X Mail 14.0 \(3654.100.0.2.11\))
Date: Wed, 28 Jul 2021 00:30:12 -0700
In-reply-to: <CAK6E8=cia-1U+Q-wiw4H+U3FV4fDxqp-4JEsH6mZZm09kYvE-A@mail.gmail.com>
Cc: Praveen Balasubramanian <pravb=40microsoft.com@dmarc.ietf.org>, "tcpm@ietf.org" <tcpm@ietf.org>
To: Yuchung Cheng <ycheng@google.com>
References: <SA0PR00MB103641CC616E1E29A7761528B6EA9@SA0PR00MB1036.namprd00.prod.outlook.com> <CAK6E8=cia-1U+Q-wiw4H+U3FV4fDxqp-4JEsH6mZZm09kYvE-A@mail.gmail.com>
X-Mailer: Apple Mail (2.3654.100.0.2.11)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-07-28_05:2021-07-27, 2021-07-28 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/mFxaVJ5bGP_VGXah-4PVBHkd6WI>
Subject: Re: [tcpm] draft-ietf-tcpm-rfc8312bis questions
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Jul 2021 07:30:23 -0000

> btw it seems RFC5681 is even more conservative in dealing with stretched acks in terms of ABC adoption. 

Thanks Yuchung for double checking.

> "During slow start,....  While
>    traditionally TCP implementations have increased cwnd by precisely
>    SMSS bytes upon receipt of an ACK covering new data, we RECOMMEND
>    that TCP implementations increase cwnd, per:
> 
>       cwnd += min (N, SMSS)                      (2)

This is mentioned as a recommendation and not a MUST.

>    where N is the number of previously unacknowledged bytes acknowledged
>    in the incoming ACK.  This adjustment is part of Appropriate Byte
>    Counting [RFC3465] and provides robustness against misbehaving
>    receivers that may attempt to induce a sender to artificially inflate

Later, 5681 references RFC 3465 - although not for any guidance on the max limit. I am not sure if RFC 5681 needs any update but it would be good to update 3465 to reflect today’s practices.

Thanks,
Vidhi

> On Jul 27, 2021, at 5:57 PM, Yuchung Cheng <ycheng@google.com> wrote:
> 
> btw it seems RFC5681 is even more conservative in dealing with stretched acks in terms of ABC adoption. 
> 
> sec 3.1
> 
> "During slow start,....  While
>    traditionally TCP implementations have increased cwnd by precisely
>    SMSS bytes upon receipt of an ACK covering new data, we RECOMMEND
>    that TCP implementations increase cwnd, per:
> 
>       cwnd += min (N, SMSS)                      (2)
> 
>    where N is the number of previously unacknowledged bytes acknowledged
>    in the incoming ACK.  This adjustment is part of Appropriate Byte
>    Counting [RFC3465] and provides robustness against misbehaving
>    receivers that may attempt to induce a sender to artificially inflate
>    cwnd using a mechanism known as "ACK Division" [SCWA99]."
> 
> 
> 
> On Tue, Jul 27, 2021 at 5:54 PM Praveen Balasubramanian <pravb=40microsoft.com@dmarc.ietf.org <mailto:40microsoft.com@dmarc.ietf.org>> wrote:
> As discussed in the working group meeting, can you please clarify what behavior changes an implementation will see as a result of adopting 8312-bis versus RFC 8312? Particularly interested to know which changes will result in improved performance.
> 
>  
> 
> Thanks!
> 
>  
> 
>  
> 
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org <mailto:tcpm@ietf.org>
> https://www.ietf.org/mailman/listinfo/tcpm <https://www.ietf.org/mailman/listinfo/tcpm>