Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt

"Black, David" <David.Black@dell.com> Wed, 30 August 2017 16:10 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48DB513213D for <tsvwg@ietfa.amsl.com>; Wed, 30 Aug 2017 09:10:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.72
X-Spam-Level:
X-Spam-Status: No, score=-2.72 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=dell.com header.b=lFLtx9xY; dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=emc.com header.b=jBBan24e
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2MhlQ_1hsQXZ for <tsvwg@ietfa.amsl.com>; Wed, 30 Aug 2017 09:10:07 -0700 (PDT)
Received: from esa3.dell-outbound.iphmx.com (esa3.dell-outbound.iphmx.com [68.232.153.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A214132055 for <tsvwg@ietf.org>; Wed, 30 Aug 2017 09:10:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=dell.com; i=@dell.com; q=dns/txt; s=smtpout; t=1504109269; x=1535645269; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=s+l76YTMfr3piTomBSTb/EnL7UpNc1uvn32HIYpSirc=; b=lFLtx9xY7ydIYfi/WXztqBHvpqV3yahWh3hLcF7/sNmvewnFUtBlegld wRNEIh5qd7MQPFqQZVcbEmATsv0NZKTpRlZqchyEbmSMeOVctc9O5cZ78 HKrxuGCf91KftQ7GLIW6dVxhDboXtKjqhu47Qs02lcOhE3V+3xBqGCXW6 w=;
Received: from esa5.dell-outbound2.iphmx.com ([68.232.153.203]) by esa3.dell-outbound.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 30 Aug 2017 11:07:49 -0500
From: "Black, David" <David.Black@dell.com>
Received: from mailuogwhop.emc.com ([168.159.213.141]) by esa5.dell-outbound2.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 30 Aug 2017 22:01:18 +0600
Received: from maildlpprd06.lss.emc.com (maildlpprd06.lss.emc.com [10.253.24.38]) by mailuogwprd03.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id v7UG9s7s030856 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 30 Aug 2017 12:10:04 -0400
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd03.lss.emc.com v7UG9s7s030856
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1504109404; bh=TbTSOEpL9Rk6p69oJuMQX0tEnmA=; h=From:To:CC:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:MIME-Version; b=jBBan24eGEuCaNZ+952ago7oARRCG/IXEZJqUxMKW/vNpBT+PS58+Lg420j3CKW/W oqed+LqCA+8F3lvvZ5cPvq2/5ZACe9JDnw8ot1dnISHZioQdUqAEhHE1vdJLyGXhNz uqUjxJzc1iTlX0zMPHahr0m7dNoTzSTuo2RfBSiM=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd03.lss.emc.com v7UG9s7s030856
Received: from mailusrhubprd03.lss.emc.com (mailusrhubprd03.lss.emc.com [10.253.24.21]) by maildlpprd06.lss.emc.com (RSA Interceptor); Wed, 30 Aug 2017 12:09:01 -0400
Received: from MXHUB317.corp.emc.com (MXHUB317.corp.emc.com [10.146.3.95]) by mailusrhubprd03.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id v7UG9jrG005385 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=FAIL); Wed, 30 Aug 2017 12:09:45 -0400
Received: from MX307CL04.corp.emc.com ([fe80::849f:5da2:11b:4385]) by MXHUB317.corp.emc.com ([10.146.3.95]) with mapi id 14.03.0352.000; Wed, 30 Aug 2017 12:09:45 -0400
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt
Thread-Index: AQHTD6wilfNp2RGXa0qgnZaxsTfJo6KdHsewgABWRID//8BR0A==
Date: Wed, 30 Aug 2017 16:09:44 +0000
Message-ID: <CE03DB3D7B45C245BCA0D243277949362FC2AB02@MX307CL04.corp.emc.com>
References: <150188933148.18701.4807220216565950086@ietfa.amsl.com> <CE03DB3D7B45C245BCA0D243277949362FBB63C1@MX307CL04.corp.emc.com> <CAKKJt-dERRFq-3-URPM_CjBrns1XH94-w1OHtx-sq8S2EHAkuw@mail.gmail.com> <CE03DB3D7B45C245BCA0D243277949362FC2A962@MX307CL04.corp.emc.com> <CAKKJt-fGMOZhyb6NLQkqMs26T+y3jB08j-he=+AYNb27G=aQzQ@mail.gmail.com>
In-Reply-To: <CAKKJt-fGMOZhyb6NLQkqMs26T+y3jB08j-he=+AYNb27G=aQzQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.168.2.174]
Content-Type: multipart/alternative; boundary="_000_CE03DB3D7B45C245BCA0D243277949362FC2AB02MX307CL04corpem_"
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd03.lss.emc.com
X-RSA-Classifications: public, GIS Solicitation
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/6X5qhp9kfCcY_IYKtPlt8ApvyHQ>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Aug 2017 16:10:11 -0000

Ok, I’ll drop “Alexa” and upload the result.

Thanks, --David

From: Spencer Dawkins at IETF [mailto:spencerdawkins.ietf@gmail.com]
Sent: Wednesday, August 30, 2017 11:57 AM
To: Black, David <david.black@emc.com>
Cc: tsvwg@ietf.org
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt

Hi, David,

Thanks, and welcome back :-)

This mostly looks uber-reasonable, but I have one reply on Alexa below.

On Wed, Aug 30, 2017 at 10:30 AM, Black, David <David.Black@dell.com<mailto:David.Black@dell.com>> wrote:
Hi Spencer,

Resurfacing from trying to take vacation in August – many thanks for this detailed review.  Comments inline.

I have a -05 ready to go if these changes are ok with you.

Thanks, --David

From: Spencer Dawkins at IETF [mailto:spencerdawkins.ietf@gmail.com<mailto:spencerdawkins.ietf@gmail.com>]
Sent: Monday, August 7, 2017 2:37 PM
To: Black, David <david.black@emc.com<mailto:david.black@emc.com>>
Cc: tsvwg@ietf.org<mailto:tsvwg@ietf.org>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt

Hi, David,

On Fri, Aug 4, 2017 at 6:31 PM, Black, David <David.Black@dell.com<mailto:David.Black@dell.com>> wrote:
As discussed in Prague, this is a small update to request that IANA remove the registration of the TCP header flag used by RFC 3540 (ECN Nonce).   Any reassignment of that flag will be handled by the TCPM WG.  This update also changes the name of one of the areas of ECN experimentation to be different from the name of the experiment proposed in that area.

Thanks, --David

Hi, David,

I really like this draft. Thanks to you and your ACK list for your efforts - the result is very clear and complete.

I have a few questions before I push the button on Last Call. They're minor enough that I don't think we need to wait for Gorry to be present for the discussion (of course, if people disagree, just let me know).

I tried to offer text for most of them, but you might also answer them by saying that TSVWG needs a much smarter responsible AD ;-) ...

In this text,

   An Experimental RFC MUST be published for any protocol
   or mechanism that takes advantage of any of these enabling updates.

I think I know what you're saying, but this formulation confuses me because it's placing a commitment on what a future working group must do (like, what if the draft describing the experimental protocol is incoherent - can the working group Just Say No, or can the authors say "but you have to request publication, because "An Experimental RFC MUST be published ...").
[David>] The working group can Just Say No, and that outcome would be a “feature” – if the experimental protocol is problematic, then the experiment shouldn’t be run at scale in the Internet, and the WG will have done the right thing by saying so.

Is your point that any protocol or mechanism that takes advantage of these enabling updates can't be Standards-Track?
[David>] No – a Standards-Track protocol RFC can simply update RFC 3168 (and any other RFCs that it needs to) directly, and doesn’t need this draft’s permission to do so, as the next sentence states …

In this text,

   There is no need to make changes for protocols and mechanisms that
   are documented in Standards Track RFCs, as any Standards Track RFC
   can update RFC 3168 without needing a standards process exception.

we've been talking using this terminology for at least a year that I can remember, but I'm not totally sure that an average IESG would even approve an Experimental draft that updated a standards-track RFC. How badly do you need to say this at all, since you're just confirming a well-understood fact that I think we all agree on?
[David>] This has been brought up too many times in WG discussion of this draft to leave out, IMHO.

In this text,

   A study of the ECN behaviour of the Alexa top 1M web
   servers using 2014 data [Trammell15]

I'm wondering whether it's useful to say "Alexa top 1M web servers" in an RFC that will probably last longer than Alexa lasts ...
[David>] I view this as a “show your work” item … this is the data that was used at the time.

I'm sorry that my comment wasn't clear. What I was asking was if there was any more description of Alexa (or for extra credit, a URL) so that a reader in ten years can do more than google "Alexa top 1M web server" to figure out what this is.

So I'm wondering if you need to qualify "top 1M web servers" as "Alexa top 1M web servers", because I'm thinking adding the adjective doesn't add as much as it takes away.

It may be that the answer is "not really", and that would be A Fine Answer, but I wanted to make sure you understood what I was thinking, because it apparently wasn't what I was typing :-)

Either way, I'm ready for you to send the updated version and have me initiate Last Call, and thanks for horsing this through.

Spencer

In this text,

   Significantly more aggressive sender responses to ECN
   are required to make effective use of such shallow queues; Datacenter
       ^^^^^^^^
   TCP (DCTCP) [I-D.ietf-tcpm-dctcp] provides an example.

I'm tangled up in passive tense ("who is required to do what?"). Is it correct to say

   Significantly more aggressive sender responses to ECN
   are needed in order to make effective use of such shallow queues;
   Datacenter TCP (DCTCP) [I-D.ietf-tcpm-dctcp] provides an example.

?
   [David>] Yes, change made.

I see that the draft uses both the terms "shallow queues" and "nearly empty queues". Do these terms mean the same thing? If so, perhaps it's worth either picking one term, or saying that they mean the same thing. Right now, I'm trying to imagine what the difference might be, since both phrases are used.
[David>] Good point, changed to consistently use “very shallow” everywhere.

You folks are the experts on this stuff, but I'm looking at this quoted text from RFC 3168

 RFC 3168 prohibits use of ECN for TCP control packets and
   retransmitted packets in a number of places:

   o  "To ensure the reliable delivery of the congestion indication of
      the CE codepoint, an ECT codepoint MUST NOT be set in a packet
      unless the loss of that packet in the network would be detected by
      the end nodes and interpreted as an indication of congestion."
      (Section 5.2)

   o  "A host MUST NOT set ECT on SYN or SYN-ACK packets."
      (Section 6.1.1)

   o  "pure acknowledgement packets (e.g., packets that do not contain
      any accompanying data) MUST be sent with the not-ECT codepoint."
      (Section 6.1.4)

   o  "This document specifies ECN-capable TCP implementations MUST NOT
      set either ECT codepoint (ECT(0) or ECT(1)) in the IP header for
      retransmitted data packets, and that the TCP data receiver SHOULD
      ignore the ECN field on arriving data packets that are outside of
      the receiver's current window."  (Section 6.1.5)

   o  "the TCP data sender MUST NOT set either an ECT codepoint or the
      CWR bit on window probe packets."  (Section 6.1.6)

and noticing that only the text in 6.1.5 explicitly mentions the TCP data receiver ignoring the "MUST NOT set" ECN field. I took a quick spin through RFC 3168 searching for "ignore", but didn't see something that explicitly covered the other cases.

Because these are "MUST NOT set" constraints, I could imagine implementers who never anticipated that an ECN(0) or ECN(1) would be set, and don't look at the field (probably good), but I can also imagine implementers validating that ECN(0) and ECN(1) are not set (probably bad). Do people have any concerns about encountering "ECT values MUST be cleared" implementations during this experiment?

I suppose if some implementation that does this is deployed and you folks run the experiment, then we'll know :D ...
[David>] I would leave this to the drafts/RFCS that describe the experiments, as I expect implementers of the experiments to look there, and not at this process RFC (to be).

But I wonder if it's worth making that clear for receivers, since you're updating RFC 3168 anyway?

In this text,

      Random ECT values MUST NOT be used, as that may expose RTP to
      differences in network treatment of traffic marked with ECT(1) and
      ECT(0) and differences in associated endpoint congestion
      responses,

is "Random ECT values" the right word? I could imagine this prohibiting using ECT(0) and ECT(1) interchangeably, but if that's what's intended, I could also imagine this prohibiting simply not explicitly setting the ECT values at all, so missing your point.
[David>] Yes, “Random” is the right word, as the text quoted from RFC 6679 uses the word “random” so that is the correct word to use here, and further explanation can be found in RFC 6679.

I'm looking at this text

   As a process memo that makes no changes to existing protocols, there
   are no protocol security considerations.

and wondering if it's current with the rest of the document. Is "no changes to existing protocols" still the right way to characterize this draft? If you wanted to say

   As a process memo that only adds limitations to existing protocols, there
   are no protocol security considerations.

I'd be happy to believe you ...
[David>] I see the concern, and edited the text roughly as suggested, plus moved a supporting sentence about security considerations for the experiments up to join this sentence, so the new paragraph now reads:

As a process memo that only removes limitations on proposed experiments,
there are no protocol security considerations.  Security considerations for the
proposed experiments are discussed in the Internet-Drafts that propose them.

Thanks,

Spencer


> -----Original Message-----
> From: tsvwg [mailto:tsvwg-bounces@ietf.org<mailto:tsvwg-bounces@ietf.org>] On Behalf Of internet-
> drafts@ietf.org<mailto:drafts@ietf.org>
> Sent: Friday, August 4, 2017 7:29 PM
> To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>
> Cc: tsvwg@ietf.org<mailto:tsvwg@ietf.org>
> Subject: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt
>
>
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Transport Area Working Group WG of the
> IETF.
>
>         Title           : Explicit Congestion Notification (ECN) Experimentation
>         Author          : David Black
>       Filename        : draft-ietf-tsvwg-ecn-experimentation-04.txt
>       Pages           : 17
>       Date            : 2017-08-04
>
> Abstract:
>    This memo updates RFC 3168, which specifies Explicit Congestion
>    Notification (ECN) as a replacement for packet drops as indicators of
>    network congestion.  It relaxes restrictions in RFC 3168 that would
>    otherwise hinder experimentation towards benefits beyond just removal
>    of loss.  This memo summarizes the anticipated areas of
>    experimentation and updates RFC 3168 to enable experimentation in
>    these areas.  An Experimental RFC is required to take advantage of
>    any of these enabling updates.  In addition, this memo makes related
>    updates to the ECN specifications for RTP in RFC 6679 and for DCCP in
>    RFC 4341, RFC 4342 and RFC 5622.  This memo also records the
>    conclusion of the ECN Nonce experiment in RFC 3540, and provides the
>    rationale for reclassification of RFC 3540 as Historic; this
>    reclassification enables new experimental use of the ECT(1)
>    codepoint.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-experimentation/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-04
> https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-ecn-
> experimentation-04
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-tsvwg-ecn-experimentation-04
>
>
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org<http://tools.ietf.org>.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/