Re: [tcpm] I-D Action: draft-ietf-tcpm-1323bis-13.txt

Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be> Fri, 24 May 2013 07:57 UTC

Return-Path: <olivier.bonaventure@uclouvain.be>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1829F21F960F for <tcpm@ietfa.amsl.com>; Fri, 24 May 2013 00:57:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ksUpKKzOQ4wT for <tcpm@ietfa.amsl.com>; Fri, 24 May 2013 00:57:36 -0700 (PDT)
Received: from smtp6.sgsi.ucl.ac.be (smtp.sgsi.ucl.ac.be [130.104.5.67]) by ietfa.amsl.com (Postfix) with ESMTP id 4BE4221F962B for <tcpm@ietf.org>; Fri, 24 May 2013 00:57:36 -0700 (PDT)
Received: from mbpobo.dhcp.info.ucl.ac.be (haproxy2.sipr.ucl.ac.be [130.104.5.120]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: obonaventure@smtp6.sgsi.ucl.ac.be) by smtp6.sgsi.ucl.ac.be (Postfix) with ESMTPSA id 352721C6B62; Fri, 24 May 2013 09:57:28 +0200 (CEST)
X-DKIM: Sendmail DKIM Filter v2.8.3 smtp6.sgsi.ucl.ac.be 352721C6B62
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=uclouvain.be; s=selucl; t=1369382248; bh=eB40WPie+HF3BKypxKrIRTu33BllQVWha7zcOw/3hds=; h=Message-ID:Date:From:Reply-To:MIME-Version:To:CC:Subject: References:In-Reply-To:Content-Type:Content-Transfer-Encoding; b=ttysNQ9juvSWNU0/Q/LoPD9r5K4x1FleURHhPAoyt7NkEAhSL331QGyQiE12VGL3Y lrjunnNfk0KvuaEXs3NjnLumBB2FidZK1oP4VhSXQFQz7nMIv97CzGRiRNH2MoIR8s 5RldapYVJw/kliw+twMPLeZmbHUzx1CC64v939eM=
Message-ID: <519F1D68.604@uclouvain.be>
Date: Fri, 24 May 2013 09:57:28 +0200
From: Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:17.0) Gecko/20130509 Thunderbird/17.0.6
MIME-Version: 1.0
To: Joe Touch <touch@isi.edu>
References: <20130518155753.17946.96581.idtracker@ietfa.amsl.com> <CAK6E8=d_LTZgnGAncdWDAi+7ebd3Lo5aevPeGG0=KSbBMeBhcg@mail.gmail.com> <519A8322.6030405@isi.edu>
In-Reply-To: <519A8322.6030405@isi.edu>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: clamav-milter 0.97.7-exp at smtp-6.sipr-dc.ucl.ac.be
X-Virus-Status: Clean
X-Sgsi-Spamcheck: SASL authenticated,
X-SGSI-MailScanner-ID: 352721C6B62.A0DB4
X-SGSI-MailScanner: Found to be clean
X-SGSI-From: olivier.bonaventure@uclouvain.be
X-SGSI-Spam-Status: No
Cc: "tcpm@ietf.org Extensions" <tcpm@ietf.org>
Subject: Re: [tcpm] I-D Action: draft-ietf-tcpm-1323bis-13.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Olivier.Bonaventure@uclouvain.be
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 May 2013 07:57:41 -0000

Joe, Yuchung,

> I suggest clarifying this as:
>
>     Once TSopt has been successfully negotiated (sent and received)
>     during the <SYN>, <SYN,ACK> exchange, TSopt MUST be sent in every
>     non-<RST> segment for the duration of the connection, and SHOULD be
>     sent in a <RST> segment (see Section 4.2 for details).

I fail to see the rationale for forcing a TCP connection to always send 
the TSopt in every segment. The timestamp aids to estimate the rtt and 
provides PAWS for long connections. Given the size of the TCP option 
space, we should not force the utilisation of the TSopt in all segments. 
Consider a TCP implementation that supports SACK, RFC1323 and TCP-AO or 
Multipath TCP. When this implementation sends an ACK segment that 
contains a SACK, is it better to encode a long SACK block or to use 
option space to encode a timestamp ? I'd vote for providing a timestamp 
from time to time and reporting accurate SACK blocks.


 > If a non-
 >     <RST> segment is received without a TSopt, a TCP MUST drop the
 >     segment
 >     and MAY also send an <ACK> for the last in-sequence segment.
 >     A TCP MUST NOT abort a TCP connection because any segment lacks
 >     an expected TSopt.

Dropping segments that do not contain the TSopt is excessive. There are 
on the Internet middleboxes that coalesce or split segments. While doing 
that, they may remove options. Dropping a segment because it does not 
contain the TSopt which is only informative appears overkill to me. 
Dropping a segment that does not contain the negotiated TCP-AO option 
makes sens, but not for the TSopt.


Olivier


-- 
INL, ICTEAM, UCLouvain, Belgium, http://inl.info.ucl.ac.be