Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt
gorry@erg.abdn.ac.uk Thu, 11 December 2014 11:10 UTC
Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42B291A6F97; Thu, 11 Dec 2014 03:10:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r-PYoMJRz24g; Thu, 11 Dec 2014 03:10:33 -0800 (PST)
Received: from spey.erg.abdn.ac.uk (spey.erg.abdn.ac.uk [139.133.204.173]) by ietfa.amsl.com (Postfix) with ESMTP id C343D1A88AC; Thu, 11 Dec 2014 03:10:30 -0800 (PST)
Received: by spey.erg.abdn.ac.uk (Postfix, from userid 33) id 88C462FE091; Thu, 11 Dec 2014 11:10:29 +0000 (GMT)
Received: from 2001:630:241:207:21f:5bff:fe38:7354 (SquirrelMail authenticated user gorry) by spey.erg.abdn.ac.uk with HTTP; Thu, 11 Dec 2014 11:10:29 -0000
Message-ID: <7d7fcc0039f4fe019b8981541c9bdcd2.squirrel@spey.erg.abdn.ac.uk>
In-Reply-To: <9904FB1B0159DA42B0B887B7FA8119CA5C92B8EF@AZ-FFEXMB04.global.avaya.com>
References: <9904FB1B0159DA42B0B887B7FA8119CA5C912939@AZ-FFEXMB04.global.avaya.com> <AA1F20D3-B5EA-43F6-84D8-999E359FDFF5@fh-muenster.de> <9904FB1B0159DA42B0B887B7FA8119CA5C92A523@AZ-FFEXMB04.global.avaya.com> <34E7FE23-64C6-4F9D-B10D-C946168C2766@fh-muenster.de> <CAKKJt-cdzypHk+sEYsVU8Bu7Oi3bwygCoa9ZPHnSv3BqhyZAsA@mail.gmail.com> <9904FB1B0159DA42B0B887B7FA8119CA5C92B8EF@AZ-FFEXMB04.global.avaya.com>
Date: Thu, 11 Dec 2014 11:10:29 -0000
From: gorry@erg.abdn.ac.uk
To: "Romascanu, Dan (Dan)" <dromasca@avaya.com>
User-Agent: SquirrelMail/1.4.23 [SVN]
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Archived-At: http://mailarchive.ietf.org/arch/msg/tsvwg/8AjemyjflC5nCyIRqaaO7iqNXdc
Cc: "ops-dir@ietf.org" <ops-dir@ietf.org>, Michael Tuexen <tuexen@fh-muenster.de>, "draft-ietf-tsvwg-sctp-prpolicies.all@tools.ietf.org" <draft-ietf-tsvwg-sctp-prpolicies.all@tools.ietf.org>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Subject: Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 11:10:36 -0000
So, it seems most of this is covered by clear statements that describe this as a sender-side only change to the transport protocol of the endpoint stack. ... and description and references to examples where deployment is expected, etc - I suggest to expand the introduction? Michael can you run the changes by me as the document shepherd, so I can check that I see the logic and it doesn't potentially create new issues? Gorry > Ã I'm good with Michael submitting an update addressing the comments as > discussed in this thread. > > Ã > > Ã Thanks, > > Ã > > Ã Spencer > > Me too. Can you please send me a note when this happens, so that I do not > miss the update? > > Thanks for considering my comments. > > Regards, > > Dan > > > From: Spencer Dawkins at IETF [mailto:spencerdawkins.ietf@gmail.com] > Sent: Thursday, December 11, 2014 12:10 AM > To: Michael Tuexen > Cc: Romascanu, Dan (Dan); ops-dir@ietf.org; tsvwg@ietf.org; > draft-ietf-tsvwg-sctp-prpolicies.all@tools.ietf.org > Subject: Re: OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt > > From at least one AD :-) > > On Wed, Dec 10, 2014 at 2:52 PM, Michael Tuexen > <tuexen@fh-muenster.de<mailto:tuexen@fh-muenster.de>> wrote: > On 10 Dec 2014, at 13:23, Romascanu, Dan (Dan) > <dromasca@avaya.com<mailto:dromasca@avaya.com>> wrote: > >> Hi Michael, >> >> Thank you for addressing the issues raised in the OPS-DIR review. >> >> First, please see the disclaimer that I put in my review: >> >>>> Although this document defines an extension of an existing protocol, >>>> there >>> are no explicit considerations about operations and management. The >>> OPS >>> and Transport ADs should decide whether this is an issue to be >>> addressed >>> before the document is approved. >> >> The OPS-DIR reviews are written to help the OPS ADs with a reading of >> the I-Ds in review from the perspective of the operators using the and >> deploying the new protocols or extensions defined by the document. We - >> the reviewers - believe that the operational and manageability issues >> are important, but it's up to the ADs to decide whether they are >> important enough to require changes in the document, and what these >> changes should be. > Hi Dan, > > understood. But I want to understand your points and possibly address > them... >> >> More in-line. >> >> Regards, >> >> Dan >> >> >>> -----Original Message----- >>> From: Michael Tuexen >>> [mailto:tuexen@fh-muenster.de<mailto:tuexen@fh-muenster.de>] >>> Sent: Wednesday, December 10, 2014 1:02 AM >>> To: Romascanu, Dan (Dan) >>> Cc: ops-dir@ietf.org<mailto:ops-dir@ietf.org>; >>> tsvwg@ietf.org<mailto:tsvwg@ietf.org>; draft-ietf-tsvwg-sctp- >>> prpolicies.all@tools.ietf.org<mailto:prpolicies.all@tools.ietf.org> >>> Subject: Re: OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt >>> >>> On 26 Nov 2014, at 13:33, Romascanu, Dan (Dan) >>> <dromasca@avaya.com<mailto:dromasca@avaya.com>> >>> wrote: >>> >>>> I have reviewed this document as part of the Operational >>>> directorate's >>> ongoing effort to review all IETF documents being processed by the >>> IESG. >>> These comments were written primarily for the benefit of the >>> operational >>> area directors. Document editors and WG chairs should treat these >>> comments just like any other last call comments. >>> Hi Dan, >>> >>> thank you very much for your review. Please see my questions and >>> comments in-line. >>> >>> Best regards >>> Michael >>>> >>>> >>>> Summary: Ready with issues >>>> >>>> Document Ready, but Operational and Management considerations >>> missing. >>>> >>>> As the Abstract says: >>>> >>>> This document defines two additional policies for the Partial >>>> Reliability Extension of the Stream Control Transmission Protocol >>>> (PR-SCTP) allowing to limit the number of retransmissions or to >>>> prioritize user messages for more efficient send buffer usage. >>>> Although this document defines an extension of an existing protocol, >>>> there >>> are no explicit considerations about operations and management. The >>> OPS >>> and Transport ADs should decide whether this is an issue to be >>> addressed >>> before the document is approved. >>>> >>>> Specifically, following the checklists in RFC 5707, Appendix A: >>>> >>>> - Deployment is not discussed, although there is text that says >>>> that the >>> Limited Retransmissions Policy can be used with data channels in the >>> WebRTC protocol stack, and that the Priority Policy can be used in the >>> IPFIX >>> protocol stack >>> The introduction says, that "The decision to abandon a user message is >>> sender side only". So for deploying the additional policies you need >>> to >>> implement it at the sender side. >> >> This is not exactly what I meant by deployment. My understanding is that >> the policies defined in this document come to answer some specific needs >> of protocols like IPFIX and WebRTC. Am I correct? If I am, I would >> expect the policies to be deployed where these protocols run. > For IPFIX some of this is discussed in > https://tools.ietf.org/html/rfc7011#section-10.2<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc7011-23section-2D10.2&d=AAMFaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=I4dzGxR31OcNXCJfQzvlsiLQfucBXRucPvdrphpBsFA&m=6cUQU7WzGxVzLIHAs0xxQPmF6uxX5BY1uBQciZGTCcc&s=LqjSQkjNGebAvCFgTSNxXQ_e427vOGThVYUIAPMJDgw&e=> > For RTCWeb is is discussed in > https://tools.ietf.org/html/draft-ietf-rtcweb-data-channel-12#section-6.1<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Drtcweb-2Ddata-2Dchannel-2D12-23section-2D6.1&d=AAMFaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=I4dzGxR31OcNXCJfQzvlsiLQfucBXRucPvdrphpBsFA&m=6cUQU7WzGxVzLIHAs0xxQPmF6uxX5BY1uBQciZGTCcc&s=nVL3E_6PggjIKyLIIspGt7ZzjVOoGU0fIot986j6yTs&e=> > Please note that the policies defined here are of general use. So the > description > how to use it will be in the documents describing the use cases. >> >>>> - Installation and initial setup is not discussed >>> We normally don't discuss the installation of the OS (assuming that the >>> SCTP >>> stack is part of the kernel, which is the case for Linux, FreeBSD and >>> Solaris) or >>> how to install applications (assuming that the transport stack is part >>> of the >>> application, which is the case for browsers like Firefox, Chrome and >>> Opera). >> >> Thank you for the clarification. Maybe it would help writing just this - >> the installation of the new capabilities will be part of OS upgrades. > ... if you use a stack provided by the kernel. If the stack is provided > by > an application, you need to install the application. > So it comes down to: You need to install the software which contains the > SCTP stack you are using. > For me, this is obvious. So I'm hesitating to add this. It would be a > sentence which > you can copy to almost every SCTP (or TCP) specification. >> >>>> - Migration Path does not seem to apply >>> Migrating from what? You can just use an implementation at the sender >>> side >>> and you can operate with every receiver implemening RFC 3758. >> >> This is OK - that's what I had in mind when I said 'does not apply' - so >> no need to do anything. >> >>>> - There is information about RFC 3758 being mandatory to >>>> implement in >>> order to implement these extensions >>>> - The impact on the network operation is not discussed >>>> explicitly >>> In the security considerations section we say that the SCTP association >>> using >>> this extension is not more aggressive than one not using the >>> extension. >> >> OK. >> >>>> - There are no explicit suggestions about verifying correct >>>> operations, >>> although one can understand that the socket options described in >>> sections >>> 4.3, 4.4, 4.5 are useful to determine stream specific status, >>> association >>> specific status, and to get and set the PR-SCTP support >>> Are you suggesting to specify test cases? At least this is not common >>> right >>> now in transport area although it would make sense in my opinion... >> >> OK >> >>>> - Interoperability does not seem to apply excepting the >>>> requirement to >>> implement RFC 3758 >>> And that is all what is needed... >> >> OK >> >>>> - There is no information about faults or threshold conditions >>>> to be >>> reported >>> Not sure what you are expecting here. >> >> Nothing - this is a point in the 5707 list which does not seem to >> apply. >> >>>> - Configuration is not discussed, it may not apply, but it would >>>> be good >>> to state this >>> Well, configuration is described in detail in the socket API section. >>> This is how >>> you configure the transport stack. >> >> OK >> >>>> - There are no manageability considerations of any kind >>> Isn't the socket API what you use to manage the transport stack? Or are >>> you >>> referring to MIB stuff? >> >> Whatever is used by operators to perform and verify installation, check >> behavior, and troubleshoot problems. > Ahh, OK. I don't think an operator would use the socket API for that. > If you want to test you transport stack you need to have tests and a test > tool > for running these tests. Up to now, the IETF (at least the transport > area) > hasn't specified tests. Personally, I would really love to do it and > think > that it is very important. But I think this is a decision not limited to > this particular > document, but to (transport) protocols in general. So I leave it up to the > ADs... > > I'd say the question of test cases has been raised to the attention of > TSVWG (cc on this thread), and I'd be happy to consider that if they think > working on that would be a good plan, but I don't think this document > needs to wait for them to figure that out. > > I'm good with Michael submitting an update addressing the comments as > discussed in this thread. > > Thanks, > > Spencer > >
- [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sctp-p… Romascanu, Dan (Dan)
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Michael Tuexen
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Romascanu, Dan (Dan)
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Spencer Dawkins at IETF
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Black, David
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Michael Tuexen
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Spencer Dawkins at IETF
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Romascanu, Dan (Dan)
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… gorry
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Michael Tuexen
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Michael Tuexen