Re: [tcpm] Milestones changed for tcpm WG

"Scharf, Michael" <Michael.Scharf@hs-esslingen.de> Tue, 04 May 2021 19:21 UTC

Return-Path: <Michael.Scharf@hs-esslingen.de>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECAF83A0E19; Tue, 4 May 2021 12:21:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hs-esslingen.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6n8qvB2_iYw1; Tue, 4 May 2021 12:21:00 -0700 (PDT)
Received: from mail.hs-esslingen.de (mail.hs-esslingen.de [134.108.32.78]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A8B243A0E1F; Tue, 4 May 2021 12:20:59 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.hs-esslingen.de (Postfix) with ESMTP id 8903A25A19; Tue, 4 May 2021 21:20:57 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hs-esslingen.de; s=mail; t=1620156057; bh=uT283F3gmC8se6FhtrougQ4Jd4pkNpm25tkbKgod2+0=; h=From:To:CC:Subject:Date:References:In-Reply-To:From; b=zhfq+kue8mD0X57pIfoq0c12Fya/xZvBh//VJcoCmcBwpWGWlOyfqLsj0bDslYuUB 47JLYqySU3u7Ntknj9k4OWEzmnmywO7sQ6HprVX59f0SNouyVXzdDmDDGSI+O/Nm9H OObEmnQRHQpZuVytTTUchbXXFqdABd0U4S4gEzGg=
X-Virus-Scanned: by amavisd-new-2.7.1 (20120429) (Debian) at hs-esslingen.de
Received: from mail.hs-esslingen.de ([127.0.0.1]) by localhost (hs-esslingen.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fNv1ckDqyllx; Tue, 4 May 2021 21:20:56 +0200 (CEST)
Received: from rznt8202.rznt.rzdir.fht-esslingen.de (rznt8202.hs-esslingen.de [134.108.48.165]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.hs-esslingen.de (Postfix) with ESMTPS; Tue, 4 May 2021 21:20:56 +0200 (CEST)
Received: from rznt8202.rznt.rzdir.fht-esslingen.de (134.108.48.165) by rznt8202.rznt.rzdir.fht-esslingen.de (134.108.48.165) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Tue, 4 May 2021 21:20:56 +0200
Received: from rznt8202.rznt.rzdir.fht-esslingen.de ([fe80::aca4:171a:3ee1:57e0]) by rznt8202.rznt.rzdir.fht-esslingen.de ([fe80::aca4:171a:3ee1:57e0%3]) with mapi id 15.01.2176.012; Tue, 4 May 2021 21:20:55 +0200
From: "Scharf, Michael" <Michael.Scharf@hs-esslingen.de>
To: Joe Touch <touch@strayalpha.com>, Yoshifumi Nishida <nsd.ietf@gmail.com>
CC: tcpm IETF list <tcpm@ietf.org>, tcpm-chairs <tcpm-chairs@ietf.org>
Thread-Topic: [tcpm] Milestones changed for tcpm WG
Thread-Index: AQHW/6iGGTI4OpADoU+Ptm6dDA6d8KrQwB6AgADrD4CAAMICAIAAqLmAgAAKjgCAAPKVsA==
Date: Tue, 04 May 2021 19:20:55 +0000
Message-ID: <2e6e1552fcc442fb8464668a649ce9e8@hs-esslingen.de>
References: <CAAK044RYPFaZU+X0GHFJksjbP0ub2WTZnLzv1RPzE4O5tn9sOg@mail.gmail.com> <B5AB51EF-01FD-4050-89B5-38E32141A63A@strayalpha.com>
In-Reply-To: <B5AB51EF-01FD-4050-89B5-38E32141A63A@strayalpha.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [134.108.140.248]
Content-Type: multipart/alternative; boundary="_000_2e6e1552fcc442fb8464668a649ce9e8hsesslingende_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/sOlpjKn4PCvV6SUUYaRjJ3mwXIE>
Subject: Re: [tcpm] Milestones changed for tcpm WG
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 May 2021 19:21:05 -0000

Hi Joe,

As far as I can see, the relevant section in draft-ietf-tcpm-tcp-edo-10 is:

   Implementers need to be careful about the potential for offload
   support interfering with this option. The EDO data needs to be
   passed to the protocol stack as part of the option space, not
   integrated with the user segment, to allow the offload to
   independently determine user data segment boundaries and combine
   them correctly with the extended option data. Some legacy hardware
   receive offload engines may present challenges in this regard, and
   may be incompatible with EDO where they incorrectly attempt to
   process segments with unknown options. Such offload engines are part
   of the protocol stack and updated accordingly. Issues with incorrect
   resegmentation by an offload engine can be detected in the same way
   as middlebox tampering.

In that paragraph, as non-native speaker, I don’t understand the sentence “Such offload engines are part of the protocol stack and updated accordingly.”

Maybe I miss something, but if there are potential issues with offloading, that could be described more explicitly and more clearly. In that case, more warning signs could be put in place at more prominent places in the document, too.

Personally, I would not be surprised if certain ways of offloading were more common than middlebox tampering. Well, I don’t know. Anyway, if that was true, a discussion regarding offloading might actually be more important than middlebox tempering.

Just as a random data point, if I were an implementer, I would probably expect a dedicated section regarding offloading, or something like that. And I would probably _not_ use the term “middlebox” when searching in the Web for material related to TSO…

My 2 cents

Michael



From: Joe Touch <touch@strayalpha.com>
Sent: Tuesday, May 4, 2021 6:48 AM
To: Yoshifumi Nishida <nsd.ietf@gmail.com>
Cc: tcpm IETF list <tcpm@ietf.org>; tcpm-chairs <tcpm-chairs@ietf.org>
Subject: Re: [tcpm] Milestones changed for tcpm WG

Yoshi,


On May 3, 2021, at 9:10 PM, Yoshifumi Nishida <nsd.ietf@gmail.com<mailto:nsd.ietf@gmail.com>> wrote:

Hi Joe,

On Mon, May 3, 2021 at 11:06 AM Joseph Touch <touch@strayalpha.com<mailto:touch@strayalpha.com>> wrote:
Hi, Yoshi,


On May 2, 2021, at 11:31 PM, Yoshifumi Nishida <nsd.ietf@gmail.com<mailto:nsd.ietf@gmail.com>> wrote:

Hi Joe,

Thanks for bringing this up again.
In my understanding, there was no clear consensus on the interactions with TSO yet. Or, have we settled?

I don’t understand what “consensus” would mean.

TSO isn’t a standard; it’s an implementation, i.e., which ought to follow the TCP standards.

Nothing we’re doing deviates from how standards-compliant implementations handle options. However, if an implementation incorrectly ignores unknown options, then it would could be problematic for this approach, as well as others.


I thought you'll update the draft for this.

I’m not sure what to say about this issue - do you want me to point out the issue with TSO sometimes causing problems because it’s out of spec?

If so, I can do that.


I think that would be helpful for the doc. But, I also think this doc should have a clear vision on the interaction with TSO beforehand.
I think we should have a consensus on this point such as:

* EDO should not be used with TSO
* It's fine to use EDO with TSO in any circumstances.
* it's fine to use EDO with TSO under a certain conditions
* The draft does not need to specify anything for TSO as it's out of scope of the doc.

These are not decisions for the WG. TSO isn’t a single thing; it’s a nickname for an implementation optimization.  Like all such optimizations, it’s always fine when it complies with specs and not when it doesn’t.

I.e., everything stated above is equally possible if you replace “TSO” with “Linux”.

It is out of scope for the WG to state anything about either (TSO or Linux) other then “it’s ok if it complies with secs and not when it doesn’t”.

This is not the doc to point out that TSO (or any other implementation) sometimes breaks TCPs rules or that these, like all options, put TCP behavior at risk when that happens.

Joe



Thanks,
--
Yoshi

_______________________________________________
tcpm mailing list
tcpm@ietf.org<mailto:tcpm@ietf.org>
https://www.ietf.org/mailman/listinfo/tcpm