Re: [Tsv-art] [Lwip] Tsvart telechat review of draft-ietf-lwig-tcp-constrained-node-networks-11

Carles Gomez Montenegro <carlesgo@entel.upc.edu> Fri, 30 October 2020 07:26 UTC

Return-Path: <carlesgo@entel.upc.edu>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8EA13A0C84; Fri, 30 Oct 2020 00:26:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.033
X-Spam-Level:
X-Spam-Status: No, score=0.033 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_SORBS_HTTP=0.001, RCVD_IN_SORBS_SOCKS=1.927, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T0Bs1XgF8B8n; Fri, 30 Oct 2020 00:26:25 -0700 (PDT)
Received: from dash.upc.es (dash.upc.es [147.83.2.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 735013A0C70; Fri, 30 Oct 2020 00:26:23 -0700 (PDT)
Received: from entelserver.upc.edu (entelserver.upc.es [147.83.40.4]) by dash.upc.es (8.14.4/8.14.4/Debian-4.1ubuntu1) with ESMTP id 09U7QMjk057341; Fri, 30 Oct 2020 08:26:22 +0100
Received: from webmail.entel.upc.edu (webmail.entel.upc.edu [147.83.39.6]) by entelserver.upc.edu (Postfix) with ESMTP id 069891D53C1; Fri, 30 Oct 2020 08:26:21 +0100 (CET)
Received: from 83.38.106.121 by webmail.entel.upc.edu with HTTP; Fri, 30 Oct 2020 08:26:22 +0100
Message-ID: <ef049fb184c9a829f01e60714ffc8129.squirrel@webmail.entel.upc.edu>
In-Reply-To: <160311139782.3413.8999722853087687791@ietfa.amsl.com>
References: <160311139782.3413.8999722853087687791@ietfa.amsl.com>
Date: Fri, 30 Oct 2020 08:26:22 +0100
From: Carles Gomez Montenegro <carlesgo@entel.upc.edu>
To: Mirja Kuehlewind <ietf@kuehlewind.net>
Cc: tsv-art@ietf.org, last-call@ietf.org, draft-ietf-lwig-tcp-constrained-node-networks.all@ietf.org, lwip@ietf.org
User-Agent: SquirrelMail/1.4.21-1.fc14
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
X-Virus-Scanned: clamav-milter 0.100.3 at dash
X-Virus-Status: Clean
X-Greylist: ACL matched, not delayed by milter-greylist-4.3.9 (dash.upc.es [147.83.2.50]); Fri, 30 Oct 2020 08:26:22 +0100 (CET)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/9clX3Fo73ajzOz2jYpPk-q_gfXw>
Subject: Re: [Tsv-art] [Lwip] Tsvart telechat review of draft-ietf-lwig-tcp-constrained-node-networks-11
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Oct 2020 07:26:27 -0000

Hi Mirja,

Thank you very much for your review!

We just submitted revision -12, which aims at addressing the comments
received from the IESG and related reviewers, including yours:
https://tools.ietf.org/html/draft-ietf-lwig-tcp-constrained-node-networks-12

Please find below our inline responses:

> Reviewer: Mirja Kühlewind
> Review result: Ready
>
> This document has been reviewed as part of the transport area review
> team's
> ongoing effort to review key IETF documents. These comments were written
> primarily for the transport area directors, but are copied to the
> document's
> authors and WG to allow them to address any issues raised and also to the
> IETF
> discussion list for information.
>
> When done at the time of IETF Last Call, the authors should consider this
> review as part of the last-call comments they receive. Please always CC
> tsv-art@ietf.org if you reply to or forward this review.
>
> Thanks for the well-written document! This is good to go, I only have some
> optional suggestions below:

Thanks for your kind words and for your constructive review.

> In section 4.1.2. you could potentially also mention
> draft-ietf-tcpm-generalized-ecn as connections with small windows might
> especially benefit when the ACK is also ECN-capable.

Agreed. We added the following before the last sentence of former 4.1.2
(now 3.1.2):

NEW:
   As of the writing, there is on-going work to extend the types of TCP
   packets that are ECN-capable, including pure ACKs [draft-ietf-tcpm-
   generalized-ecn]. Such a feature may further increase the benefits of
   ECN in CNN environments.

> In section 4.2.1: "In that case, both congestion and flow control
> implementation are quite simple." I guess this is even an understatement.
> Basically this would be a static configuration and there is nothing left
> to
> "control".

We see your point, but we understand that at least some sort of flow
control is still possible for a very simple TCP/IP stack. For instance, a
TCP receiver can still send segments with zero receive window (RWND=0).
Regarding congestion control, the RTO backoff applies, which is some basic
form of congestion control. The wording "quite simple" in the document
aims to capture that. However, please let us know if you have a different
opinion.

> In section 4.2.3: "Disabling Delayed ACKs at the sender allows an
> immediate ACK
> for the data segment carrying the response." I guess you can in addition,
> however, explain that keeping the delayed ACK could help to piggy-back the
> ACK
> with maybe some additional data to send instead of sending the ACK in a
> separate TCP packet (of course depending on the traffic pattern of the
> application). I think this is roughly mentioned later again but seems to
> belong
> her as well.

If we understand it correctly, your suggested addition is already present
in the sentence right before the one that you focused on in this comment.
If we misunderstood your comment, please let us know.

> Section 4.3.1.1: is this sentence correct? It least it did confuse me a
> bit
> when reading first: “A receiver supporting SACK will need to keep track
> of the
> SACK blocks that need to be received.” Maybe “A receiver supporting
> SACK will
> need to keep track of the data blocks that need to be received.” ?

Agreed.

> Section 4.3.2: Maybe s/it may make sense to use a small timeout/it may
> make
> sense to use a smaller timeout/ or s/it may make sense to use a small
> timeout/it may make sense to use a very small timeout/ ?

Agreed (we used the first proposal).

> Section 4.3.3: “with an IW setting of 10 MSS, there is significant
> buffer
> overflow risk” I think it would be good to explain slightly better which
> buffer
> you mean. Is there an assumption that network buffer sizes are known in
> CNNs as
> managed by the same entity than the constraint devices? Maybe the
> recommendation should be to make this parameter configurable? I guess most
> stacks provide an option for this but not sure if all do…

In the highlighted text, “buffer” may actually refer to a buffer at any
layer (e.g. a “radio buffer”, or an upper layer buffer), depending on the
specific context. For example, some constrained device hardware platforms
support a send buffer of at most one MSS of data.  We hope that the
following update can help clarify the intent:

OLD:
    with an IW setting of 10 MSS, there is significant buffer overflow risk,

NEW:
    with an IW setting of 10 MSS, there is significant buffer overflow risk,
    since many CNN devices support network or radio buffers of a size
    smaller than 10 MSS.

> Section 6: maybe provide a reference to RFC8446 TLS1.3..?

Agreed.

> Also section 6: You mention TCP-OA but you don’t give a really
> recommendation
> if or when it should be used or not.

We now aim at highlighting the benefits of TCP-AO, along with the
trade-off that needs to be assessed by the implementer. We updated the
first two paragraphs in Section 5 (formerly, Section 6), as follows:

NEW:
   Best current practice for securing TCP and TCP-based communication
   also applies to CNN.  As example, use of Transport Layer Security
   (TLS) [RFC 8446] is strongly recommended if it is applicable. However,
   note that TLS protects only the contents of the data segments.

   There are TCP options which can actually protect the transport layer.
   One example is the TCP Authentication Option (TCP-AO) [RFC5925]. However,
   this option adds overhead and complexity.  TCP-AO typically has a size of
   16-20 bytes. An implementer needs to asses the trade-off between security
   and performance when using TCP-AO, considering the characteristics (in
   terms of energy, bandwidth and computational power) of the environment
   where TCP will be used.

> I assume section 8 is intended to be kept for publication. I support that
> as
> it’s interesting information.

Thanks for your support!

Yes, we (the authors) would like to keep that former section 8 (now,
section 7) for publication.

Greetings,

Carles (on behalf of the authors)