Re: [TLS] Efficiency of ACKing scheme
Hanno Becker <Hanno.Becker@arm.com> Mon, 06 April 2020 11:19 UTC
Return-Path: <Hanno.Becker@arm.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97D373A0EDC for <tls@ietfa.amsl.com>; Mon, 6 Apr 2020 04:19:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=2S5Jc/bV; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=2S5Jc/bV
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PzBYp_xFbJTV for <tls@ietfa.amsl.com>; Mon, 6 Apr 2020 04:19:26 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30085.outbound.protection.outlook.com [40.107.3.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99C863A0EDE for <tls@ietf.org>; Mon, 6 Apr 2020 04:19:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TAxw/tvhUpA+5tGfvTROtEZTI8kOXstLkcLs01X2d4U=; b=2S5Jc/bV3kg0pHlO1i5Oq7JFFxyARpSo4UHIadvENgVghNmxuJ2NTekLOcpd0KYNEz6Y3b4unxSW6prgNXvRdhPZc1oBVkg7NTV5bmulAYblT91yzNALSyLCaXn1plIvpUxbaQz3Kc98L/blcqaLzgE28K/rZVocN9rWzjrL5kk=
Received: from DB8PR03CA0032.eurprd03.prod.outlook.com (2603:10a6:10:be::45) by AM6PR08MB4341.eurprd08.prod.outlook.com (2603:10a6:20b:b9::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2878.16; Mon, 6 Apr 2020 11:19:22 +0000
Received: from DB5EUR03FT041.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:be:cafe::e4) by DB8PR03CA0032.outlook.office365.com (2603:10a6:10:be::45) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2878.15 via Frontend Transport; Mon, 6 Apr 2020 11:19:22 +0000
Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT041.mail.protection.outlook.com (10.152.21.4) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2856.17 via Frontend Transport; Mon, 6 Apr 2020 11:19:22 +0000
Received: ("Tessian outbound 4b84da486446:v50"); Mon, 06 Apr 2020 11:19:22 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 0e530980c0d8b779
X-CR-MTA-TID: 64aa7808
Received: from 02d8de94bb98.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id A82F90FA-52B8-4B76-A6C5-B838447362FA.1; Mon, 06 Apr 2020 11:19:17 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 02d8de94bb98.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Mon, 06 Apr 2020 11:19:17 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mamw7SgKRZ91aem94uHHmYMl+T4InWyxxYv00l27L5w/No6/98+cOJ8IFrer9qAUXYEfNHABZidSawGiAqRwdz5S13gOkp7Q2Tl8SZARDRxqbvcJAsBTOLtQz36HQimEUJVNFVsBUbVMZIWyK+YTOVnZR6wYwX/E3KvO8PbICvP+RN/Mw1pU7SDd/XSH5oWrcqhYdIycS1YKQ9bZEyaJQ860lJvJYGvSaBN2NfEmigTtz7OANlgpGI+LqwGU0et4yNczV8tPiBHF1uTXP+x4yeAK1UKhJfBZHtRxxhoPTvgSAxriteB9KyMyQuEgjlJ2mef4mhH0gJxc7wckqlURdg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TAxw/tvhUpA+5tGfvTROtEZTI8kOXstLkcLs01X2d4U=; b=Hj6UR6uxE8eP+And/T3PV4t5SLTI9DawBeVnMGAATcfMrw/VqSET0/5k/ZW2w3sG7g7Yqml6peRcQd2icypxREq1rFHoMLYitT52BnFDfbX5qNATCd7rWPGsHoXjzaK12LT8a3OzO2jf0HNwUWRgFEh8q16ymw1C+UfRLgCWkstqWzBnMyFr6XhfCkdB/O5zPbsXLnLVcg/OZ8Wa4CVKWEWY8ZlMwGQbWerk6uEFFG73MCLX2z1bOu5HHYGDeG3Npfv+09dLinfkxFuKwRkd0/Wv6brkogvx/7Kayqv2XvCl7YvoIs6jxt3i7u2up+A1T/BwWXWYb7iO8F5VaVo7vg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TAxw/tvhUpA+5tGfvTROtEZTI8kOXstLkcLs01X2d4U=; b=2S5Jc/bV3kg0pHlO1i5Oq7JFFxyARpSo4UHIadvENgVghNmxuJ2NTekLOcpd0KYNEz6Y3b4unxSW6prgNXvRdhPZc1oBVkg7NTV5bmulAYblT91yzNALSyLCaXn1plIvpUxbaQz3Kc98L/blcqaLzgE28K/rZVocN9rWzjrL5kk=
Received: from AM6PR08MB3318.eurprd08.prod.outlook.com (52.135.163.143) by AM6PR08MB5031.eurprd08.prod.outlook.com (10.255.123.12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2878.16; Mon, 6 Apr 2020 11:19:15 +0000
Received: from AM6PR08MB3318.eurprd08.prod.outlook.com ([fe80::1579:b7d9:f543:200d]) by AM6PR08MB3318.eurprd08.prod.outlook.com ([fe80::1579:b7d9:f543:200d%5]) with mapi id 15.20.2878.021; Mon, 6 Apr 2020 11:19:15 +0000
From: Hanno Becker <Hanno.Becker@arm.com>
To: Thomas Fossati <Thomas.Fossati@arm.com>, Martin Thomson <mt@lowentropy.net>, "tls@ietf.org" <tls@ietf.org>
Thread-Topic: [TLS] Efficiency of ACKing scheme
Thread-Index: AQHWCdUmcw6BnTFxZ0GrZHianQcZlahnnDQQgAO7OoCAAKsoAP//8Q2h
Date: Mon, 06 Apr 2020 11:19:15 +0000
Message-ID: <AM6PR08MB3318E464EE47713AF7F481E09BC20@AM6PR08MB3318.eurprd08.prod.outlook.com>
References: <AM6PR08MB331820C710440F07055382739BC70@AM6PR08MB3318.eurprd08.prod.outlook.com> <AM6PR08MB331832C84A0E5D04AA5612A99BC70@AM6PR08MB3318.eurprd08.prod.outlook.com> <8fed27dc-f5eb-4104-8308-186c361781bc@www.fastmail.com>, <6EC8987C-A1E0-454F-AF09-A43260EB2B56@arm.com>
In-Reply-To: <6EC8987C-A1E0-454F-AF09-A43260EB2B56@arm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: spf=none (sender IP is ) smtp.mailfrom=Hanno.Becker@arm.com;
x-originating-ip: [2a00:23c5:ee06:1300:652b:aa23:b6e3:8afc]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 2dab4602-d489-4b52-939b-08d7da1c5bc1
x-ms-traffictypediagnostic: AM6PR08MB5031:|AM6PR08MB5031:|AM6PR08MB4341:
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS: <AM6PR08MB43416188FF516D68F7A50C549BC20@AM6PR08MB4341.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:3968;OLM:3968;
x-forefront-prvs: 0365C0E14B
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR08MB3318.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(10009020)(4636009)(136003)(39860400002)(346002)(376002)(396003)(366004)(55016002)(33656002)(966005)(478600001)(9686003)(5660300002)(2906002)(53546011)(110136005)(6506007)(316002)(66476007)(66556008)(64756008)(66446008)(52536014)(8676002)(81156014)(71200400001)(186003)(8936002)(81166006)(86362001)(76116006)(7696005)(66946007); DIR:OUT; SFP:1101;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
x-ms-exchange-antispam-messagedata: gpRqZd9skPnMvlAcKiUju365zzukTtUcebbupLjVFRbCs1+VDzf2Ox1jcKxNFR+ZBvuMPJWt8TSohfY1mI3Mpgycwl/zd6+R+UWbeBGlXMXfkDu0nVS9WbK5bMmBvMX8i3h4JKboncVKOXTF8XkSS/cSY2YHDVtgmPMMuxjPQDRmm11J6dt1pYml41swJM+gGh5OSqMv7Pjl4ZKkQ1OIYQ==
Content-Type: multipart/alternative; boundary="_000_AM6PR08MB3318E464EE47713AF7F481E09BC20AM6PR08MB3318eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB5031
Original-Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Hanno.Becker@arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT041.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:; SFS:(10009020)(4636009)(396003)(39860400002)(346002)(376002)(136003)(46966005)(55016002)(966005)(336012)(478600001)(86362001)(82740400003)(30864003)(110136005)(316002)(33656002)(356004)(7696005)(186003)(5660300002)(9686003)(26826003)(47076004)(26005)(8936002)(6506007)(53546011)(2906002)(52536014)(70586007)(8676002)(81156014)(81166006)(70206006); DIR:OUT; SFP:1101;
X-MS-Office365-Filtering-Correlation-Id-Prvs: 49baf3b9-9d57-44cc-55db-08d7da1c573c
X-Forefront-PRVS: 0365C0E14B
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Apr 2020 11:19:22.9476 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2dab4602-d489-4b52-939b-08d7da1c5bc1
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4341
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/6cMFuKpXoGOap_5R__a19BKtwAI>
Subject: Re: [TLS] Efficiency of ACKing scheme
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Apr 2020 11:19:30 -0000
Hey Martin, Thanks a lot for your reply! > I think that you are assuming a lot about how the loss recovery part of the sender is operating here My assumptions follow what the spec says SHOULD be done, though - nothing more and nothing less. > If you receive ACK { 1, 3 }, then it might be > reasonable to assume that 2 got lost, but it seems > to me that assuming anything about 4 is premature I agree, but again this is what the spec unambiguously does by saying implementations SHOULD resend the complement of what was ACKed. I think in principle we agree on reasonable measures for improving the ACK efficiency. However, I disagree with the assessment that the scheme as-described provides sufficient efficiency for common uses, since large fragmentation and low MTU networks will be a common characteristic for IoT deployments, and DTLS 1.3 'out of the box' implementations should suite these, where by out of the box I mean implementations that do precisely what the spec says they SHOULD do. On first sight, an easy improvement seems to be mentioning/recommending implementations to buffer ACKs for some time, but we have to be careful with this since it affects the semantics of ACKs in a major way which may lead to interoperability issues: If ACKs are buffered on the receiver, they can be sent recurringly, and also be split. This way, they are no longer 'negative' in the sense that they indicate a disruption, as is the case now. If, in turn, ACKs are not necessarily buffered but trigger immediate retransmission, implementations should not use them recurringly. Thus, in a nutshell, leaving the question of whether ACKs should be buffered or not on the receiver to the implementor, leads to interoperability issues. Cheers, Hanno ________________________________ From: TLS <tls-bounces@ietf.org> on behalf of Thomas Fossati <Thomas.Fossati@arm.com> Sent: Monday, April 6, 2020 12:01 PM To: Martin Thomson <mt@lowentropy.net>; tls@ietf.org <tls@ietf.org> Subject: Re: [TLS] Efficiency of ACKing scheme On 06/04/2020, 02:49, Martin Thomson <mt@lowentropy.net> wrote: > I think that you are assuming a lot about how the loss recovery part > of the sender is operating here. > > If you receive ACK { 1, 3 }, then it might be reasonable to assume > that 2 got lost, but it seems to me that assuming anything about 4 is > premature. The spec as currently written says that the signal "ACK {1, 3}" means "retransmit {2, (3, end]}": Upon receipt of an ACK for only some messages from a flight, an implementation SHOULD retransmit the remaining messages or fragments. This works as expected only if the sender can assume that the receiver has let enough time pass before generating ACK {1, 3}, but this is not strongly stated in the description of receiver behaviour. We should keep in mind that DTLS implementers are not necessarily transport experts, and that warrants a bit more care in what we say as well as what we don't say. In particular, we should try hard to avoid expert bias. One example where we can improve: we have a nice sentence about bunching ACKs at 25% of current RTO halfway through bullet 2 of Section 7.1. In fact, avoiding knee-jerk ACKing is one of the basic things to understand here. Incidentally, this is how one's solves Hanno's conundrum above (at least in non-pathological cases) because "retransmit {2, (3, end]}" would be generated when the receiver has got some confidence about 4 & co. being actually lost. Unfortunately, the sentence is oddly placed and one tends to overlook it and not giving it the high and general relevance it actually has. > The sender can also make some adjustments, without necessarily > adhering to a strict interpretation of the recommendations in the > spec. Agree again, but deciding to violate a SHOULD should be an exception, not the rule. If I have to implement this, especially on very low-bandwidth paths that fragment a lot, I probably would never follow the recommendation: I'd first re-send 3 and sit back for a while waiting for further ACKs before resending (3, end]. > The draft is imprecise about this logic intentionally. It recommends > that the sender send missing data, which will likely work, and be > fast. For large flights, yes, this will be suboptimal, but we are > also assuming that this data is not subject to congestion control > limits. Just a note: "large flights" is relative to the available bandwidth so (very) low-bandwidth would always have suboptimal recovery even if HS data is not congestion controlled. And that's the environment where you absolutely want to have a reliability scheme that is bandwidth efficient. > If we go to PQ schemes with large amounts of data, then that requires > a different set of assumptions. It might also require that > implementations take extra steps to avoid the resulting > inefficiencies. True that. Cheers! IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
- [TLS] Efficiency of ACKing scheme Hanno Becker
- Re: [TLS] Efficiency of ACKing scheme Hanno Becker
- Re: [TLS] Efficiency of ACKing scheme Martin Thomson
- Re: [TLS] Efficiency of ACKing scheme Thomas Fossati
- Re: [TLS] Efficiency of ACKing scheme Rob Sayre
- Re: [TLS] Efficiency of ACKing scheme Hanno Becker
- Re: [TLS] Efficiency of ACKing scheme Thomas Fossati
- Re: [TLS] Efficiency of ACKing scheme Thomas Fossati
- Re: [TLS] Efficiency of ACKing scheme Hanno Becker
- Re: [TLS] Efficiency of ACKing scheme Eric Rescorla
- Re: [TLS] Efficiency of ACKing scheme Thomas Fossati
- Re: [TLS] Efficiency of ACKing scheme Thomas Fossati
- Re: [TLS] Efficiency of ACKing scheme Hanno Becker
- Re: [TLS] Efficiency of ACKing scheme Thomas Fossati
- Re: [TLS] Efficiency of ACKing scheme Eric Rescorla
- Re: [TLS] Efficiency of ACKing scheme Thomas Fossati
- Re: [TLS] Efficiency of ACKing scheme Eric Rescorla
- Re: [TLS] Efficiency of ACKing scheme Thomas Fossati
- Re: [TLS] Efficiency of ACKing scheme Eric Rescorla
- Re: [TLS] Efficiency of ACKing scheme Hannes Tschofenig
- Re: [TLS] Efficiency of ACKing scheme Thomas Fossati
- Re: [TLS] Efficiency of ACKing scheme Hanno Becker