Re: [tsvwg] TCP Prague's RFC 5033 guidelines status?
"Holland, Jake" <jholland@akamai.com> Tue, 12 November 2019 04:34 UTC
Return-Path: <jholland@akamai.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE5AF120104 for <tsvwg@ietfa.amsl.com>; Mon, 11 Nov 2019 20:34:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id piqb7d_GsiAU for <tsvwg@ietfa.amsl.com>; Mon, 11 Nov 2019 20:34:05 -0800 (PST)
Received: from mx0b-00190b01.pphosted.com (mx0b-00190b01.pphosted.com [IPv6:2620:100:9005:57f::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C226912002F for <tsvwg@ietf.org>; Mon, 11 Nov 2019 20:33:47 -0800 (PST)
Received: from pps.filterd (m0050102.ppops.net [127.0.0.1]) by m0050102.ppops.net-00190b01. (8.16.0.42/8.16.0.42) with SMTP id xAC4X0KO031222; Tue, 12 Nov 2019 04:33:45 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=jan2016.eng; bh=rAf5gO/KSn4g/O1kooMNO5vAS7wNkvPGQIwk94Wg0ck=; b=EJfsmyiy3MHSqvzLzHrDKCaz0BujcK2YQ4ZI+3xgNcliaU3or3RZA7j9g6maPIZRg1zt /sdMdf3u2Xp67QdHh93dD/ial8BoJVXxmCvgi6O/QYzn/5y112xe/b+U8Hyvw3xsIoI3 /cDOqKtUwn/6yqBRWiEf10TIPw2SkjGIEpqaLHpGwqkCgYvgTlAB/qE2hsXWbFqPt3KM Ks4IWXrudXP104DlH+bLYLbJaBugZy0Pz2z3ihROh9vD1KiZtXB6AQKgfX26udg7N+Q0 NQLtUsDYpVk0r5MASqu54pSC3RO4mDN2bPE8tClxG8dL3XTDryVnYyQefbTNiDmJIwaD dg==
Received: from prod-mail-ppoint4 (prod-mail-ppoint4.akamai.com [96.6.114.87] (may be forged)) by m0050102.ppops.net-00190b01. with ESMTP id 2w5p794v21-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 12 Nov 2019 04:33:44 +0000
Received: from pps.filterd (prod-mail-ppoint4.akamai.com [127.0.0.1]) by prod-mail-ppoint4.akamai.com (8.16.0.27/8.16.0.27) with SMTP id xAC4Vrdn025582; Mon, 11 Nov 2019 23:33:43 -0500
Received: from email.msg.corp.akamai.com ([172.27.165.116]) by prod-mail-ppoint4.akamai.com with ESMTP id 2w5sp3ugnm-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Mon, 11 Nov 2019 23:33:43 -0500
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com (172.27.165.122) by ustx2ex-dag1mb3.msg.corp.akamai.com (172.27.165.121) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 11 Nov 2019 22:33:42 -0600
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com ([172.27.165.122]) by ustx2ex-dag1mb4.msg.corp.akamai.com ([172.27.165.122]) with mapi id 15.00.1473.005; Mon, 11 Nov 2019 22:33:42 -0600
From: "Holland, Jake" <jholland@akamai.com>
To: Wesley Eddy <wes@mti-systems.com>, "Black, David" <David.Black@dell.com>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] TCP Prague's RFC 5033 guidelines status?
Thread-Index: AQHVmAmmMIm2SSJvw06YTZ/1Ay/LjKeGbBOAgAAcfgCAAGXwgP//5JsA
Date: Tue, 12 Nov 2019 04:33:41 +0000
Message-ID: <5642DBCC-B592-46E7-851A-1404A202809C@akamai.com>
References: <BB91598E-C319-4F78-B660-A77ACD0F19DE@akamai.com> <3bc4f68d-3270-7336-3616-4e0ce7efe336@mti-systems.com> <MN2PR19MB40454B7A34896A8FDE2D7DD283740@MN2PR19MB4045.namprd19.prod.outlook.com> <cff2a492-000d-dd93-74b4-997456064c16@mti-systems.com>
In-Reply-To: <cff2a492-000d-dd93-74b4-997456064c16@mti-systems.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1e.0.191013
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.19.80.114]
Content-Type: text/plain; charset="utf-8"
Content-ID: <6A35349B51F40F469562D05D4F77BA0A@akamai.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-11-11_07:, , signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1910280000 definitions=main-1911120038
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,18.0.572 definitions=2019-11-11_07:2019-11-11,2019-11-11 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 priorityscore=1501 spamscore=0 mlxscore=0 lowpriorityscore=0 adultscore=0 impostorscore=0 phishscore=0 clxscore=1011 mlxlogscore=999 suspectscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1910280000 definitions=main-1911120038
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/-x1LeOYE3TWZ_sG-yj1GQoa0-E4>
Subject: Re: [tsvwg] TCP Prague's RFC 5033 guidelines status?
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Nov 2019 04:34:07 -0000
On 2019-11-11, 14:12, "Wesley Eddy" <wes@mti-systems.com> wrote: > I believe you're referring to the congestion response requirements in > the L4S ID draft. I think those are a start to requiring an end-host > algorithm to have good properties with regard to 5033 guidelines, rather > than requiring some bad behavior (e.g. the first one is "MUST coexist > safely with Reno" which speaks right to 5033 guideline 1 "Impact on > Standard TCP, SCTP, and DCCP"). So, I'm not sure why those are a > concern (i.e. which L4S ID congestion response requirements do we have > 5033 concerns with?). I don't want to get too bogged down on venue issues, and the point that TCP Prague is out of scope for tsvwg is fair. Maybe the issue that's appropriate in the tsv tracker would be something more like "a reasonably complete candidate definition of at least one proposed congestion control suitable for deployment on the internet that makes use of the proposal", and details like asking for an RFC 5033-related section could be handled separately in reviewing those docs? After all, I'm not sure there's much urgency on starting the experiment if there's not a candidate endpoint system defined... (This is exacerbated by the fact that DCTCP didn't do this, since it had disclaimers like "only in controlled environments" and "documents what's currently deployed", but now that it's proposed for the internet, it seems to me the evaluation should be written somewhere in order to run this experiment.) Anyway, the motivation for the request was because it's hard to go through the 5033 requirements and check them to decide how well they've been covered. For example: the difficult environments considered (2) and the range of environments investigated (3), performance with misbehaving nodes and outside attackers (6), and responses to sudden or transient events (7). I was thinking there have been a number of tests along these lines done as sort of random spot checks, but it's hard to go through the list of tests looking at responses to sudden or transient events to figure out whether a case you're worried about is covered, and likewise with the others. So I was asking for the authors to apply their uniquely wide knowledge of the tests conducted toward categorizing the references in the way suggested by RFC 5033, maybe in an appendix or a side doc, so they could be more readily evaluated. I agree some of the 5033 requirements are likely covered to some extent already (#1 I agree seems reasonably well examined, as it's a consistent theme in many of the reports, though it would still be useful to have a list of references to areas where it's directly addressed), but I'm less sure of several of the others. Even a list of what 5033 requirements are covered and not covered by the L4S requirements to set expectations on the ones that TCP Prague or other L4S-compatible congestion controls will have to explicitly address would be worthwhile, IMO. Thanks and regards, Jake
- [tsvwg] TCP Prague's RFC 5033 guidelines status? Holland, Jake
- Re: [tsvwg] TCP Prague's RFC 5033 guidelines stat… Wesley Eddy
- Re: [tsvwg] TCP Prague's RFC 5033 guidelines stat… Black, David
- Re: [tsvwg] TCP Prague's RFC 5033 guidelines stat… Wesley Eddy
- Re: [tsvwg] TCP Prague's RFC 5033 guidelines stat… Black, David
- Re: [tsvwg] TCP Prague's RFC 5033 guidelines stat… Rodney W. Grimes
- Re: [tsvwg] TCP Prague's RFC 5033 guidelines stat… Holland, Jake
- Re: [tsvwg] TCP Prague's RFC 5033 guidelines stat… Wesley Eddy
- Re: [tsvwg] TCP Prague's RFC 5033 guidelines stat… Holland, Jake
- Re: [tsvwg] TCP Prague's RFC 5033 guidelines stat… Pete Heist
- Re: [tsvwg] TCP Prague's RFC 5033 guidelines stat… Bob Briscoe