Re: [tcpm] New Version Notification for draft-kuehlewind-tcpm-ecn-fallback-00.txt

Brian Trammell <trammell@tik.ee.ethz.ch> Mon, 29 July 2013 14:58 UTC

Return-Path: <trammell@tik.ee.ethz.ch>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D019321E805A for <tcpm@ietfa.amsl.com>; Mon, 29 Jul 2013 07:58:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.524
X-Spam-Level:
X-Spam-Status: No, score=-6.524 tagged_above=-999 required=5 tests=[AWL=0.075, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dbo3N4POy-mi for <tcpm@ietfa.amsl.com>; Mon, 29 Jul 2013 07:58:10 -0700 (PDT)
Received: from smtp.ee.ethz.ch (smtp.ee.ethz.ch [129.132.2.219]) by ietfa.amsl.com (Postfix) with ESMTP id B4B0C11E80EE for <tcpm@ietf.org>; Mon, 29 Jul 2013 07:58:09 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by smtp.ee.ethz.ch (Postfix) with ESMTP id D925AD930D; Mon, 29 Jul 2013 16:58:07 +0200 (MEST)
X-Virus-Scanned: by amavisd-new on smtp.ee.ethz.ch
Received: from smtp.ee.ethz.ch ([127.0.0.1]) by localhost (.ee.ethz.ch [127.0.0.1]) (amavisd-new, port 10024) with LMTP id AyN7wkzGlucx; Mon, 29 Jul 2013 16:58:07 +0200 (MEST)
Received: from dhcp-90be.meeting.ietf.org (dhcp-90be.meeting.ietf.org [130.129.8.190]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: briant) by smtp.ee.ethz.ch (Postfix) with ESMTPSA id 857A0D9304; Mon, 29 Jul 2013 16:58:07 +0200 (MEST)
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Brian Trammell <trammell@tik.ee.ethz.ch>
In-Reply-To: <718D8F34-8A8F-46A8-88F7-0E68B3F0DB1C@ifi.uio.no>
Date: Mon, 29 Jul 2013 16:58:07 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <A35F5647-8350-45D5-BA82-533A2E33C841@tik.ee.ethz.ch>
References: <20130703154032.15474.58799.idtracker@ietfa.amsl.com> <82B14E2A-C7B8-4899-8954-80C66BACFB76@tik.ee.ethz.ch> <012C3117EDDB3C4781FD802A8C27DD4F25C03F89@SACEXCMBX02-PRD.hq.netapp.com> <6AE1ADEB-CADA-4BC5-AE3B-75001296C635@tik.ee.ethz.ch> <012C3117EDDB3C4781FD802A8C27DD4F25C2C2ED@SACEXCMBX02-PRD.hq.netapp.com> <E84E1F28-5DA4-4D68-90E6-B248C76FAAE9@tik.ee.ethz.ch> <22D18C14-152E-4487-936E-121E95A63B4E@ifi.uio.no> <D359AB72-8AC4-468A-9946-2AE0001A50CF@tik.ee.ethz.ch> <718D8F34-8A8F-46A8-88F7-0E68B3F0DB1C@ifi.uio.no>
To: Michael Welzl <michawe@ifi.uio.no>
X-Mailer: Apple Mail (2.1508)
Cc: tcpm@ietf.org
Subject: Re: [tcpm] New Version Notification for draft-kuehlewind-tcpm-ecn-fallback-00.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jul 2013 14:58:18 -0000

hi Michael,

inline below...

On 29 Jul 2013, at 14:14, Michael Welzl <michawe@ifi.uio.no> wrote:

<snip>

>>> - step 6: "In this case, the sender may continue using ECN, because while it may not work for detecting congestion, the use of ECN does not negatively affect connectivity." => I'd rather not have it used if it's not working - if a router marks ECN to CE but the next downstream router clears the codepoint, we ignore congestion, and we'd like to avoid that, no?
>> 
>> The problem in this case is that we don't know if we have an ECN-aware middlebox that is clearing a CE from the end system, on the assumption that it is closer to the end-system than one would expect -- we did see some of this activity in the study detailed in the PAM paper. In this case the CE-clearing is arguably correct (or at least acceptable). 
> 
> I'm beginning to understand your point. It's about this sentence in the draft:
> "If the ECE flag is not set on the ACK segment(s) sent by the
>       receiver acknowledging the CE probe segments, the path may or may
>       not be usable, as that there might be middleboxes/gateways that
>       (arguably correctly) clear CE on segments from end hosts, because
>       they assume that congestion can not have occurred up to this
>       point on the path."
> 
> But here you're assuming that this is the only possible reason for a CE to be cleared, i.e. CE cannot be cleared by a middlebox for any other reason. It might well be that a middlebox makes a mistake when it clears CE…  well, but if that wasn't seen in any of the measurement studies (the IMC one and yours), I'm inclined to accept that it's okay to leave ECN on then.

The question is one of requirements (and therefore one of philosophy): are we trying to guarantee (1) that ECN works, or (2) that attempts to activate ECN do not lead to connectivity problems. Given where we are now (increasing capability in endpoints, but not much activation in routers and clients) we think (2) is the more useful goal: we want to build confidence that TCP stacks could activate ECN negotiation on active open by default without causing connectivity issues that are hard for end-users and admins to debug.

We're not assuming that CE clearing is benign (though it does read that way; we'll need to be more explicit about a few things that aren't as clear as they should be in the -01 rev) -- rather, we're assuming that CE clearing that doesn't result in a dropped packet indicates that ECN can be activated on a path, even if you'll in effect never receive an ECE.

Cheers,

Brian