Re: [tsvwg] TCP Prague's RFC 5033 guidelines status?

"Holland, Jake" <jholland@akamai.com> Tue, 12 November 2019 04:34 UTC

Return-Path: <jholland@akamai.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE5AF120104 for <tsvwg@ietfa.amsl.com>; Mon, 11 Nov 2019 20:34:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id piqb7d_GsiAU for <tsvwg@ietfa.amsl.com>; Mon, 11 Nov 2019 20:34:05 -0800 (PST)
Received: from mx0b-00190b01.pphosted.com (mx0b-00190b01.pphosted.com [IPv6:2620:100:9005:57f::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C226912002F for <tsvwg@ietf.org>; Mon, 11 Nov 2019 20:33:47 -0800 (PST)
Received: from pps.filterd (m0050102.ppops.net [127.0.0.1]) by m0050102.ppops.net-00190b01. (8.16.0.42/8.16.0.42) with SMTP id xAC4X0KO031222; Tue, 12 Nov 2019 04:33:45 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=jan2016.eng; bh=rAf5gO/KSn4g/O1kooMNO5vAS7wNkvPGQIwk94Wg0ck=; b=EJfsmyiy3MHSqvzLzHrDKCaz0BujcK2YQ4ZI+3xgNcliaU3or3RZA7j9g6maPIZRg1zt /sdMdf3u2Xp67QdHh93dD/ial8BoJVXxmCvgi6O/QYzn/5y112xe/b+U8Hyvw3xsIoI3 /cDOqKtUwn/6yqBRWiEf10TIPw2SkjGIEpqaLHpGwqkCgYvgTlAB/qE2hsXWbFqPt3KM Ks4IWXrudXP104DlH+bLYLbJaBugZy0Pz2z3ihROh9vD1KiZtXB6AQKgfX26udg7N+Q0 NQLtUsDYpVk0r5MASqu54pSC3RO4mDN2bPE8tClxG8dL3XTDryVnYyQefbTNiDmJIwaD dg==
Received: from prod-mail-ppoint4 (prod-mail-ppoint4.akamai.com [96.6.114.87] (may be forged)) by m0050102.ppops.net-00190b01. with ESMTP id 2w5p794v21-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 12 Nov 2019 04:33:44 +0000
Received: from pps.filterd (prod-mail-ppoint4.akamai.com [127.0.0.1]) by prod-mail-ppoint4.akamai.com (8.16.0.27/8.16.0.27) with SMTP id xAC4Vrdn025582; Mon, 11 Nov 2019 23:33:43 -0500
Received: from email.msg.corp.akamai.com ([172.27.165.116]) by prod-mail-ppoint4.akamai.com with ESMTP id 2w5sp3ugnm-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Mon, 11 Nov 2019 23:33:43 -0500
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com (172.27.165.122) by ustx2ex-dag1mb3.msg.corp.akamai.com (172.27.165.121) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 11 Nov 2019 22:33:42 -0600
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com ([172.27.165.122]) by ustx2ex-dag1mb4.msg.corp.akamai.com ([172.27.165.122]) with mapi id 15.00.1473.005; Mon, 11 Nov 2019 22:33:42 -0600
From: "Holland, Jake" <jholland@akamai.com>
To: Wesley Eddy <wes@mti-systems.com>, "Black, David" <David.Black@dell.com>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] TCP Prague's RFC 5033 guidelines status?
Thread-Index: AQHVmAmmMIm2SSJvw06YTZ/1Ay/LjKeGbBOAgAAcfgCAAGXwgP//5JsA
Date: Tue, 12 Nov 2019 04:33:41 +0000
Message-ID: <5642DBCC-B592-46E7-851A-1404A202809C@akamai.com>
References: <BB91598E-C319-4F78-B660-A77ACD0F19DE@akamai.com> <3bc4f68d-3270-7336-3616-4e0ce7efe336@mti-systems.com> <MN2PR19MB40454B7A34896A8FDE2D7DD283740@MN2PR19MB4045.namprd19.prod.outlook.com> <cff2a492-000d-dd93-74b4-997456064c16@mti-systems.com>
In-Reply-To: <cff2a492-000d-dd93-74b4-997456064c16@mti-systems.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1e.0.191013
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.19.80.114]
Content-Type: text/plain; charset="utf-8"
Content-ID: <6A35349B51F40F469562D05D4F77BA0A@akamai.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-11-11_07:, , signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1910280000 definitions=main-1911120038
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,18.0.572 definitions=2019-11-11_07:2019-11-11,2019-11-11 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 priorityscore=1501 spamscore=0 mlxscore=0 lowpriorityscore=0 adultscore=0 impostorscore=0 phishscore=0 clxscore=1011 mlxlogscore=999 suspectscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1910280000 definitions=main-1911120038
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/-x1LeOYE3TWZ_sG-yj1GQoa0-E4>
Subject: Re: [tsvwg] TCP Prague's RFC 5033 guidelines status?
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Nov 2019 04:34:07 -0000

On 2019-11-11, 14:12, "Wesley Eddy" <wes@mti-systems.com> wrote:
> I believe you're referring to the congestion response requirements in 
> the L4S ID draft.  I think those are a start to requiring an end-host 
> algorithm to have good properties with regard to 5033 guidelines, rather 
> than requiring some bad behavior (e.g. the first one is "MUST coexist 
> safely with Reno" which speaks right to 5033 guideline 1 "Impact on 
> Standard TCP, SCTP, and DCCP").  So, I'm not sure why those are a 
> concern (i.e. which L4S ID congestion response requirements do we have 
> 5033 concerns with?).

I don't want to get too bogged down on venue issues, and the point that
TCP Prague is out of scope for tsvwg is fair.

Maybe the issue that's appropriate in the tsv tracker would be something
more like "a reasonably complete candidate definition of at least one
proposed congestion control suitable for deployment on the internet that
makes use of the proposal", and details like asking for an RFC 5033-related
section could be handled separately in reviewing those docs?  After all,
I'm not sure there's much urgency on starting the experiment if there's not
a candidate endpoint system defined...

(This is exacerbated by the fact that DCTCP didn't do this, since it had
disclaimers like "only in controlled environments" and "documents what's
currently deployed", but now that it's proposed for the internet, it seems
to me the evaluation should be written somewhere in order to run this
experiment.)

Anyway, the motivation for the request was because it's hard to go through
the 5033 requirements and check them to decide how well they've been covered.
For example: the difficult environments considered (2) and the range of
environments investigated (3), performance with misbehaving nodes and
outside attackers (6), and responses to sudden or transient events (7).

I was thinking there have been a number of tests along these lines done as
sort of random spot checks, but it's hard to go through the list of tests
looking at responses to sudden or transient events to figure out whether a
case you're worried about is covered, and likewise with the others.

So I was asking for the authors to apply their uniquely wide knowledge of
the tests conducted toward categorizing the references in the way suggested
by RFC 5033, maybe in an appendix or a side doc, so they could be more
readily evaluated.

I agree some of the 5033 requirements are likely covered to some extent
already (#1 I agree seems reasonably well examined, as it's a consistent
theme in many of the reports, though it would still be useful to have a
list of references to areas where it's directly addressed), but I'm less
sure of several of the others.

Even a list of what 5033 requirements are covered and not covered by the
L4S requirements to set expectations on the ones that TCP Prague or other
L4S-compatible congestion controls will have to explicitly address would
be worthwhile, IMO.

Thanks and regards,
Jake