Re: [tsvwg] [Technical Errata Reported] RFC7141 (7237)

Sebastian Moeller <moeller0@gmx.de> Fri, 04 November 2022 15:02 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E3189C1526EB for <tsvwg@ietfa.amsl.com>; Fri, 4 Nov 2022 08:02:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.444
X-Spam-Level: **
X-Spam-Status: No, score=2.444 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, GB_SUMOF=5, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmx.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bs5qjsyFqj88 for <tsvwg@ietfa.amsl.com>; Fri, 4 Nov 2022 08:02:53 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0BA1BC15258E for <tsvwg@ietf.org>; Fri, 4 Nov 2022 08:02:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.de; s=s31663417; t=1667574105; bh=dqwt7Cst+OVF7xGHcOxk6ygfhyhAUChTlK1phOPlepk=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References:To; b=i/uHVcnkaDXexC1PWLK8x1NB8jKRoKEwSV9PbZFjsso+3cg6RgdjZCxSdF/wE6oI5 +ZpymQbzOKVZTT0yPjny3Zm8vpbRVJZ79HIAIxXQYKwzypSoNBRpjEaTBrnj2wSZEL g0WOAnCfy8rl3gwvhRYGYN4RKA03CVy/8+4vE0Tm3DbHrs4+uslroEDGHm0OdAfMbH gQQ7yQmdLAPTB1tLV23fJtltVCMhNXt6s2/mW83sCPEclQon4kBVf0TnhmiokKov/0 g8M9AzOYVXk6apIw87kzPiv6yZFo+8/cgGmRbWjOFKRdajcsr2dgiSGA0v5zghdKgN gQ5z6ftHaZUMA==
X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a
Received: from smtpclient.apple ([77.6.118.159]) by mail.gmx.net (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MI5QF-1oljXq2Bs7-00FCbv; Fri, 04 Nov 2022 16:01:45 +0100
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <b4ef9748-9b5c-ecff-d182-6ece5b73bb6c@erg.abdn.ac.uk>
Date: Fri, 04 Nov 2022 16:01:43 +0100
Cc: jukka.manner@aalto.fi, david.black@dell.com, martenseemann@gmail.com, tsvwg@ietf.org, Bob Briscoe <ietf@bobbriscoe.net>
Content-Transfer-Encoding: quoted-printable
Message-Id: <02B172CC-CAF3-4C28-8C0B-EA927DADACD4@gmx.de>
References: <20221104094005.747A455F68@rfcpa.amsl.com> <4aef3037-fae5-68c9-661f-4ce89b1ce7e7@erg.abdn.ac.uk> <273A82C1-E675-4950-A7E0-E8C564B09834@gmx.de> <6672b32e-19b6-b295-1460-904481de2c83@erg.abdn.ac.uk> <1351054E-7647-40CA-B2FA-7A566DE09E24@gmx.de> <f02cfbb6-9a14-0c70-4986-358b9226033f@erg.abdn.ac.uk> <CC3F2650-2CC7-4EC9-B0BC-2200D482CDEC@gmx.de> <b4ef9748-9b5c-ecff-d182-6ece5b73bb6c@erg.abdn.ac.uk>
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
X-Provags-ID: V03:K1:XfnWGOrH3M0eBucDJXx24PnUK5v7w93NRzRt6BACzn+Md7t07MY qgo0rTHVvrPCctON20g6vaxXAYJjZm9zz0MqxMToD6FRsEY4Rlcf/7xnv9MyIYa79kU1Xcg dANn2p+wV3AKLm7hWy7yMaAaw7Dfl192/LIHe2HoV5pnuoF5fdOBuCqWGhXGwT2cHAuDPQm tq52sPUoH9Inxq2vIS0ZQ==
UI-OutboundReport: notjunk:1;M01:P0:dorcTAXLo4Y=;zA1CoD0U8iS/4RtUYCLg3wI9IAL H1zi+LWo9TqNkN+KTDQ5iIQDxn4LnqqrgkxiQd3+NEjTdBsI0e3YXfksAjy9MG4NqwLq5X+WA iqkA09nfBn3tDJlFd06dK5aYWRL2OY0vPNIVtnt3TqBth0GbU3glRCJ8dB9uwtaoTIgbxfgVb UdFRe7EbOxpUmBJXdpn/kD6eWdybxCuo9QbgDLj9k/P1Ym9ml1U4afF3wINJS+CjUqGGH/9FZ /M090b6u2EqY3XEOHuRlU2rX89qXvE2JRHnk1AfOWtTmkgWMua62LgbX2NfFrLdIhwdgd8ZcL KilOM55VvIuoHsUcvdJNIo5ljGCUwWfWL/4Suz+7n3jBdpB0VjYb3+6JKC2kq7zWD5+wtluqE 02bD9QGzSwKPb22cRD8cMiXyQb1XhBfwEZr91f23ReWk3W2k4WQeHsRg7XpPsZjwSVUnES6Uy Cw0/i6tWJU+Z1CvhQjDz/K6zS69aa84jloSta+PHAuk7jTyTK71Qd84r0pPsmeNdyc2jje5jI GDW8+EFNexjcwCKhavyYJG/ZLC2+DQK6mIRZz/mzBNopdTHA3JsAY4LPHmHI3iEH6TWtZMpIP LbBd8fn/nGfbkavtZt08COkwuyAi+SnZKNTS+HqDgbSA7NF4AS51WV23llzzdtmycPMtBdaJz 0b+/mgeASXx35KVhhg7Y1YlRKzAzRJNeyn5FRwFAqHj2rBregHZifgzpWtb/OvuZH7be0omML U2Vfw+SXFBtuTLZpYBsCC1/qbclsbkDq/PNzPIvwix3pcpa64s8wjHUU/cOah4MAzUjoe00Dv j3PBip5B7Xi0JGPIu9onHxeEh+fOJ/I3xnetsn/dChcP/8zvbih4SmZPWzCIRCoStYFMQGQCZ hIgrvdffDVacDkhplGKlzYeQBY/vVRFomnzM9K9OnsjRwACruQlNdvsaUnydd12j9Jepvd3kt Elf1GqlnQYz+MTo3J6SRwBNKTS8=
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/-NErVJnMgT8RwqvspiFfVJN3MLQ>
Subject: Re: [tsvwg] [Technical Errata Reported] RFC7141 (7237)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Nov 2022 15:02:58 -0000

Hi Gorry,


> On Nov 4, 2022, at 14:51, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
> 
> On 04/11/2022 13:37, Sebastian Moeller wrote:
>> Hi Gorry,
>> 
>> 
>>> On Nov 4, 2022, at 14:03, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>> 
>>> On 04/11/2022 12:42, Sebastian Moeller wrote:
>>>> Hi Gorry,
>>>> 
>>>> 
>>>>> On Nov 4, 2022, at 11:56, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>>>> 
>>>>> On 04/11/2022 10:43, Sebastian Moeller wrote:
>>>>>> Hi Gorry,
>>>>>> 
>>>>>> See [SM] below.
>>>>>> 
>>>>>> On 4 November 2022 11:20:56 CET, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>>>>>> Commenting as an individual on the Errata filing:
>>>>>>> 
>>>>>>> On 04/11/2022 09:40, RFC Errata System wrote:
>>>>>>>> The following errata report has been submitted for RFC7141,
>>>>>>>> "Byte and Packet Congestion Notification".
>>>>>>>> 
>>>>>>>> --------------------------------------
>>>>>>>> You may review the report below and at:
>>>>>>>> https://www.rfc-editor.org/errata/eid7237
>>>>>>>> 
>>>>>>>> --------------------------------------
>>>>>>>> Type: Technical
>>>>>>>> Reported by: Sebastian Moeller <moeller0@gmx.de>
>>>>>>>> 
>>>>>>>> Section: 2
>>>>>>>> 
>>>>>>>> Original Text
>>>>>>>> -------------
>>>>>>>> 2.2.  Recommendation on Encoding Congestion Notification
>>>>>>>> 
>>>>>>>>     When encoding congestion notification (e.g., by drop, ECN, or PCN),
>>>>>>>>     the probability that network equipment drops or marks a particular
>>>>>>>>     packet to notify congestion SHOULD NOT depend on the size of the
>>>>>>>>     packet in question.
>>>>>>>> [...]
>>>>>>>> 2.3.  Recommendation on Responding to Congestion
>>>>>>>> 
>>>>>>>>     When a transport detects that a packet has been lost or congestion
>>>>>>>>     marked, it SHOULD consider the strength of the congestion indication
>>>>>>>>     as proportionate to the size in octets (bytes) of the missing or
>>>>>>>>     marked packet.
>>>>>>>> 
>>>>>>>>     In other words, when a packet indicates congestion (by being lost or
>>>>>>>>     marked), it can be considered conceptually as if there is a
>>>>>>>>     congestion indication on every octet of the packet, not just one
>>>>>>>>     indication per packet.
>>>>>>>> 
>>>>>>>>     To be clear, the above recommendation solely describes how a
>>>>>>>>     transport should interpret the meaning of a congestion indication, as
>>>>>>>>     a long term goal.  It makes no recommendation on whether a transport
>>>>>>>>     should act differently based on this interpretation.  It merely aids
>>>>>>>>     interoperability between transports, if they choose to make their
>>>>>>>>     actions depend on the strength of congestion indications.
>>>>>>>> 
>>>>>>>> Corrected Text
>>>>>>>> --------------
>>>>>>>> I am not sure the text is actually salvageable, as it appears ti be a logic disconnect at the core of the recommendations.
>>>>>>>> 
>>>>>>>> Notes
>>>>>>>> -----
>>>>>>>> The recommendations seem not self consistent:
>>>>>>>> A) Section 2.2.  recommends that CE marking should be made independent of packet size, so a CE-mark carries no information about packet size.
>>>>>>> I did not understood that it needed to. This RFC I think was intended to be independent of the transport.  I see the transport sender as responsible for determining the packetisation of the transport segments, and the (S)ACKs can often identify segments, hence the sender can determine the segments that have been acknoweldged or times when ECN marking was seen.
>>>>>> [SM] This assumes that relevant segment size does not change along the path. Which generally is not true. Just think fragmentation, if the sender sends a packet that gets fragmented along the path and only a single fragment gets CE marked the sender will see this as the whole packet being marked. Or from the other side of the issue, if say a Linux router uses GRO/GSO and queues a larger meta packet and CE marks that, receiver and sender at best see a sequence of CE marked packets. So the recommendation would need to be changed to calculate the consecutive sequence of CE marked octets and take these as correlate for congestion strength. So no, the sender really has no reliable knowledge about the size of the data unit the marking node marked.
>>>>>> 
>>>>> I suggest IETF transports treat all IP fragments as one unit of retransmission/congestion at the transport layer.
>>>> 	[SM2] But what if the re-segmentation does not happen at the receiver, but say a fragmenting and CE-marking path tries to act transparently. According to the rules both in RFC3168 and RFC7141 a re-segmented packet containing even a single CE-marked fragment is to be CE-marked (or dropped). So the AQM might have marked a 576 octet segment but all the endpoint sees is a marked ~1460 octet segment.
>>>> 	This also illustrates how section 2.4 of RFC7141 proposes a method that does not achieve its aim, of giving veridical "number of market octets" information. It simply is impossible to do so generally (often it will work, but the endpoints can not even know when it was correct and when not).
>>>> Section 2.4 has more issues BTW, it tries to give recommendation how to deal with splitting and merging but fails to achieve its goals of giving a veridical account of the marked octets:
>>>> 
>>>> Let's see what happens when applying the proposed counter method in regards to number of marked octets under the conditions this section addresses
>>>> Here let's look at a toy problem with 20 byte headers and a total payload of 1200 octets that is split in or merged out of 3 fragments/segments with 400 octets payload each
>>>> 
>>>> Merging multiple segments pre-marking:
>>>> (20+400) + (20+400)-20 + (20+400)-20 -> 1220 total 1200 payload + CE
>>>> -> AQM marks 1220 or 1200 octets
>>>> (12+1200)+CE
>>>> receiver sees 1200 octets with CE and ACKs these with ECE
>>>> sender can assume 1200 octets where marked
>>>> CORRECT
>>>> 
>>>> Merging multiple segments post-marking ():
>>>> -> AQM marks segment 2 of 420 or 400 octets
>>>> (20+400) + (20+400+CE) + (20+400)
>>>> (20+400)+(20+400+CE)-20+(20+400)-20 = 1220 total 1200 payload + CE
>>>> receiver sees 1200 octets with CE and ACKs these with ECE
>>>> sender must assume 1200 octets where marked
>>>> FALSE
>>>> 
>>>> Fragmenting a segment pre-marking
>>>> 1220 -> (20+400) + (20+400) + (20+400)
>>>> -> AQM marks segment 2 of 420 or 400 octets
>>>> (20+400) + (20+400+CE) + (20+400)
>>>> Resegmentation happens before protocol sees marking
>>>> (20+400) + (20+400+CE)-20 + (20+400)-20 -> 1220 total 1200 payload + CE
>>>> receiver sees 1200 octets with CE and ACKs these with ECE
>>>> sender must assume 1200 octets where marked
>>>> FALSE
>>>> 
>>>> Fragmenting a segment post-marking
>>>> (20+1200)
>>>> -> AQM marks 1220 or 1200 octets
>>>> (12+1200)+CE
>>>> fragmentation happens:
>>>> (20+400+CE) + (20+400+CE) + (20+400+CE)
>>>> Resegmentation happens before protocol sees marking
>>>> (20+400=CE) + (20+400+CE)-20 + (20+400+C)-20 -> 1220 total 1200 payload + CE
>>>> receiver sees 1200 octets with CE and ACKs these with ECE
>>>> sender must assume 1200 octets where marked
>>>> CORRECT
>>>> 
>>>> So only in two out of four conditions does the proposed method actually achieves its goal.
>>>> 
>>>> Now add the complication that the RFC fails to mention what it considers marked octets, just the payload or payload+headers.
>>>> This is important as the sum of payload + headers of X fragments is larger than the sum payload + header of the single packet re-constituted out of these fragments. So the de-fragmenting process arguably needs to only look at payload size, but RFC7141 section 2.4 does not make that explicit.
>>>> If an implementation actually uses the full size instead of the payload size now the last condition also gets it wrong:
>>>> 
>>>> Fragmenting a segment post-marking
>>>> (20+1200)
>>>> -> AQM marks 1220 or 1200 octets
>>>> (12+1200)+CE
>>>> fragmentation happens:
>>>> (20+400+CE) + (20+400+CE) + (20+400+CE)
>>>> Resegmentation happens before protocol sees marking
>>>> (20+400+CE) + (20+400+CE) + (20+400+C) -> 1220 total 1200 payload + CE
>>>> but (20+400)*3 = 1260 marked octets
>>>> receiver sees 1200 octets with CE and ACKs these with ECE
>>>> sender must assume 1200 octets where marked
>>>> CORRECT
>>>> But now the left over 40 bytes in the marked-octet budget will result in CE feedback for the next (re-assembled) packet.
>>>> FALSE
>>>> 
>>>> For rfc3168 that will not matter much as ECE is sustained until CWR is received anyway, but L4S style signaling now acquired an erroneous CE mark.
>>> Network fragmentation be it in tunnels, extension headers or IPv4 fragments is indeed thwarted with all manner of issues. Nothing new - the IETF has long recommended the unit of loss/marking to be the same as the end to end PDU. PMTU is tricky, but does have benfits:-)
>> 	[SM3] Not a fan of fragmentation either, but I assume that fragmentation will stay a fact of life over the internet independent of my opinion. My point here is if the IETF proposes a method that aims to correctly account for CE-marked octets, that method should actually deliver on its premise. Failing in 2-3 out of 4 conditions the method is designed to handle is IMHO a sign that the proposed method is/was not in proper shape for becoming an official recommendation.
>> This is fine in an informational RFC as documenting subjective opinion, but problematic in a standards or BCP type document, if like in this case we feel that BCP methods (even incomplete or impossible to achieve ones) are binding precedence that need to be respected in later RFC drafts.
> 
> The BCP you mention was discussed some time ago and written because a decision had to be made about how best to think about this topic.

	[SM4] According to the shepherd (yours) write-up this was intended as informative and only switched to BCP:
This was discussed at IETF-81 and that the status changed from Informational to BCP, because the draft provides guidance to implementors and people configuring routers and hosts.

(Again, I have no issues this being an informative RFC, its BCP status causes problems as it apparently turns an incomplete method into precedence that can not be ignored, resulting in more incomplete and untested methods added to other drafts).

> So, if you now have a different proposal, you can write an ID and see what people think.

	[SM] I do, but I am sure my approach "not think about this in impossible terms" will not go down well, but I guess I should try.

>>>>> GSO/GRO and variants would/could change the fragmentation, that is true and need to be considered.
>>>> 	[SM2] I am confused? How do GRO/GSO affect fragmentation, IMHO these two will cause larger aggregates that exist only locally (Linux will segment meta-packets in the sending process and will not sent out say a large 64K TCP packet in fragments, but will re-segment the meta-packet into a neat sequence of complete self-sustained TCP packets)? IMHO they affect primarily the unit size the AQM might CE-mark on, in a way that is in-transparent to the end points. My point is the unit size an AQM acts on is generally unknowable precisely be the end-points. At which point making the end-points pretend that congestion strength somehow correlates with size of marked packets really stops making sense.
>>>> 
>>> The segment delivered can be a different size to the unit of transmission. This is an implementation optimisation - if this done without regard to the marking, then the results will be different and likely do not deliver what is expected - optimisations need to understand what they optimise.
>> 	[SM3] Yes, we seem to agree that it is impossible for endpoints to veridically measure the amount of octets actually CE-marked for a number of reasons. IMHO from this observation it follows directly that basing end-point decisions on number of marked octets is not going to generally work, as that number is not robustly and reliably available at the end-point. That is end-points do see a number but that number is not guaranteed to actually match what happened at the marking entity, and hence this number can not be a correlate of congestion strength. Interpreting that number never the less as indicator of congestion strength seems hence sub-optimal and not something to unconditionally recommend.
> I don't agree they can't measure. I said optimisations need to understand what they optimise.

	Here are two network paths, please explain how the endpoint can measure the size of the packet the AQM marked CE:


Sender(MSS 1460, 10 full packets) -> nodes(...) -> AQM (with GRO/GSO, using say a 14600 meta-packet and marks CE) -> nodes (...) -> receiver (10 packets with CE marks)

How can the receiver, let alone the sender measure that the AQM marked a single 14600 meta-packet and not 10 1460 sized packets?


Sender(MSS 1460, 1 full packets) -> nodes(smaller MTU 1000 -> fragmentation into 1 packet of size 1000 and one of size 460) -> AQM (CE marks 460 fragment) -> nodes (with re-assembly into 1 size 1460 packet with CE mark) -> receiver (1 packet size 1460 with CE mark)

How can the receiver, let alone the sender measure that the AQM marked a single size 460 packet and not a full 1460 sized packet?

(I only use payload sizes here, let's ignore the overhead). Again rfc3168 type ECN response it whole immune to this, because it actually does not seem to take number of marked octets into account.

So I would agree the end-points can "measure" but they are not guaranteed to get robust and reliable results that actually veridically describe what happened at the marking node that experienced the congestion. Note that any "optimization" here happens outside of the sphere of control of the end-points, so arguing that optimization comes with side-effects, while true does not help the end-points as they can not affect the optimization the rest of the network path might employ.


But I might well be wrong and would be happy to learn how the end points in my two scenarios could actually deduce what really happened at the marking node (preferably within the normal transport protocol functionality not employing out of band measurement traffic).


>> 
>>>>>>>> B) Section 2.3 then recommends to use the size of marked packets as direct indicators of congestion strength.
>>>>>>>> 
>>>>>>>> C) Section 2.3 then later clarifies that transports should interpret the size of CE-marked packets as correlate for congestion strength but are in no way required to take this interpretation into account when acting based on the congestion signal.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> This has several problems:
>>>>>>>> 1) A) and B) are in direct contradiction to each other. If we ask marking nodes to ignore packet size while marking, but end nodes to take it into account we basically create random congestion strength "information" by the pure chance of a specific packet of a specific size "catching" a CE mark. At which point we might as well simply draw a random number at the end-point to interpret congestion strength (except that packet sizes are not distributed randomly).
>>>>>>>> 
>>>>>>>> 2) Asking endpoints to interpret CE_marks in this way but not act on it, is hardly actionable advice for potential implementers. If we can not recommend a specific way, we should refrain from offering recommendations at all to keep things as simple as reasonably possible.
>>>>>>> This doesn't appear to be textual errata, it seems more like the request is for more clarification or motivating an alternative?
>>>>>> [SM] What alternatives to changing incorrect text do exist? I do not think changing the status to historic is a realistic option in spite of the text recommending the impossible.
>>>>>> 
>>>>> Put simply:
>>>>> 
>>>>> An Erratum would normally specify either:
>>>>> 
>>>>>     a direct change of text to fix a mistake in production, but a change of the spec from the original intended method;
>>>>> 
>>>>>     or specify something to inform a future revision.
>>>>> 
>>>>> An update in a new RFC is needed to change the method, or a process request to mark an RFC as historic.
>>>> 	[SM2] Would it also be possible to request to re-classify as informative? This RFC with its impossible recommendations is causing issues with other RFCs and I think it would help if this could be ameliorated by moving away from BCP status.
>>>> 
>>> If there is consensus an RFC shouldn't be associated with a BCP, we can examine what to do. The first thing is to write a (short) ID and see if you can gain sufficient attention from the WG to enable this to be discussed.
>> 	[SM3] Thank you very much. Is there an example for a similar process I could look at and take inspiration from?
> 
> I guess one can make a short ID that describes the problem, and see if other people understand the same problem.
> 
> As a chair, my first step would normally be to see whether there was a good common understanding by the WG of what was proposed and then to look to the WG to tell me if individuals see an issue that they would allocate time to fix/review/etc.

	[SM3] Great, the ball is my court now, and I need to see whether I can come up with a convincing write-up. Or I might just do what apparently every implementer under the sun did and simply ignore RFC7141.


> 
> Best wishes,
> 
> Gorry
> 
> P.S. Dropping the ADs and Errata system, and fixing Bob's email.

	Thanks!


Regards
	Sebastian


>> 
>> Regards
>> 	Sebastian
>> 
>> 
>>> Gorry
>>> 
>>>>> Gorry
>>>>> 
>>>>>>>> Instructions:
>>>>>>>> -------------
>>>>>>>> This erratum is currently posted as "Reported". If necessary, please
>>>>>>>> use "Reply All" to discuss whether it should be verified or
>>>>>>>> rejected. When a decision is reached, the verifying party
>>>>>>>> can log in to change the status and edit the report, if necessary.
>>>>>>>> 
>>>>>>>> --------------------------------------
>>>>>>>> RFC7141 (draft-ietf-tsvwg-byte-pkt-congest-12)
>>>>>>>> --------------------------------------
>>>>>>>> Title               : Byte and Packet Congestion Notification
>>>>>>>> Publication Date    : February 2014
>>>>>>>> Author(s)           : B. Briscoe, J. Manner
>>>>>>>> Category            : BEST CURRENT PRACTICE
>>>>>>>> Source              : Transport Area Working Group
>>>>>>>> Area                : Transport
>>>>>>>> Stream              : IETF
>>>>>>>> Verifying Party     : IESG