Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt

Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com> Mon, 07 August 2017 18:36 UTC

Return-Path: <spencerdawkins.ietf@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6EFE31323BE for <tsvwg@ietfa.amsl.com>; Mon, 7 Aug 2017 11:36:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6bdIcB5Gj3eG for <tsvwg@ietfa.amsl.com>; Mon, 7 Aug 2017 11:36:47 -0700 (PDT)
Received: from mail-yw0-x229.google.com (mail-yw0-x229.google.com [IPv6:2607:f8b0:4002:c05::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6A401132034 for <tsvwg@ietf.org>; Mon, 7 Aug 2017 11:36:47 -0700 (PDT)
Received: by mail-yw0-x229.google.com with SMTP id l82so7957968ywc.2 for <tsvwg@ietf.org>; Mon, 07 Aug 2017 11:36:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=r7SACaAGVo5/jmUk+SsJ/nFaZStoyhHYC9crD2Nc/nI=; b=k9C91eAcCdwVxGic4D4mLFK40s7xSASYj13vl1/gABtoEZ+9TUk+A5FBZkbxZ8a9V+ 9B3+yEV6nOVAVh3TbN6PiKUcUny5RN1yn6xCdQfM/9JxHaYO966IUIfhCHAY/GsXeX6P okHI9BrQgaX5SOid1DPpxHGYxPoZUFnFoEXcIhQD1EmSOkhUKHI2BPK9EvzT9eLgnd8J FSna5B10l4tXUDbPBazW2QF5CDiItXJxWEqhaB8VNcZ9pJYL1kgsxKlKdQzpr+QoUv3A NJA/8JT/RU4uPVV6Dm8bBtkNbkFb/hnXcEGKrAJ4y2AxooENBjGGwJNUEngTJBrxmYQV WIhg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=r7SACaAGVo5/jmUk+SsJ/nFaZStoyhHYC9crD2Nc/nI=; b=F6WsWlUg90r5Yz4wSmVHB2ETSU9OPLw3M7rfeuJnPG0HoP44YBVEvyPzFGpM4MUoEw LA6u616QWAYFYZMRSnlfnx558fth2nchlpfq70JO5r8YkTxfpcsda9L9zQsVqK2rcu+T pgZbYJyC3nsdsIDkN6V2vXfg/ZsFNzb3z+8Y95DDzwAZqMAg0VDi4I9SfuMb2lEUu6zL oTOKdawB7R4Ore37U3I/SC6Ilx/YifzWqsCL9/CUvSPm12451x2mioW0dM2E5XfYD5kr Ms+P9VpY0lmHcDFQzh5/9KiK2XUd8Vr186/B1deXr+kc2t9ArJtvvRBMR1X7WPhGWBez TUaA==
X-Gm-Message-State: AHYfb5jvso2TZx6BafSnF8xFbGYSaPH9h2FKIaL/7cyV0h+/08bigqhv h5LaqgRlUBvL0ufRts6bT4cDQXaC5g==
X-Received: by 10.129.229.4 with SMTP id s4mr1264432ywl.130.1502131006350; Mon, 07 Aug 2017 11:36:46 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.37.52.79 with HTTP; Mon, 7 Aug 2017 11:36:45 -0700 (PDT)
In-Reply-To: <CE03DB3D7B45C245BCA0D243277949362FBB63C1@MX307CL04.corp.emc.com>
References: <150188933148.18701.4807220216565950086@ietfa.amsl.com> <CE03DB3D7B45C245BCA0D243277949362FBB63C1@MX307CL04.corp.emc.com>
From: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Date: Mon, 07 Aug 2017 13:36:45 -0500
Message-ID: <CAKKJt-dERRFq-3-URPM_CjBrns1XH94-w1OHtx-sq8S2EHAkuw@mail.gmail.com>
To: "Black, David" <David.Black@dell.com>
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
Content-Type: multipart/alternative; boundary="089e08222cb40a33a805562e2192"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Bp4Z5hu0rCljJF65lqO6-vWZu-o>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Aug 2017 18:36:51 -0000

Hi, David,

On Fri, Aug 4, 2017 at 6:31 PM, Black, David <David.Black@dell.com> wrote:

> As discussed in Prague, this is a small update to request that IANA remove
> the registration of the TCP header flag used by RFC 3540 (ECN Nonce).   Any
> reassignment of that flag will be handled by the TCPM WG.  This update also
> changes the name of one of the areas of ECN experimentation to be different
> from the name of the experiment proposed in that area.
>
> Thanks, --David
>

Hi, David,

I really like this draft. Thanks to you and your ACK list for your efforts
- the result is very clear and complete.

I have a few questions before I push the button on Last Call. They're minor
enough that I don't think we need to wait for Gorry to be present for the
discussion (of course, if people disagree, just let me know).

I tried to offer text for most of them, but you might also answer them by
saying that TSVWG needs a much smarter responsible AD ;-) ...

In this text,

   An Experimental RFC MUST be published for any protocol
   or mechanism that takes advantage of any of these enabling updates.

I think I know what you're saying, but this formulation confuses me because
it's placing a commitment on what a future working group must do (like,
what if the draft describing the experimental protocol is incoherent - can
the working group Just Say No, or can the authors say "but you have to
request publication, because "An Experimental RFC MUST be published ...").

Is your point that any protocol or mechanism that takes advantage of these
enabling updates can't be Standards-Track?

In this text,

   There is no need to make changes for protocols and mechanisms that
   are documented in Standards Track RFCs, as any Standards Track RFC
   can update RFC 3168 without needing a standards process exception.

we've been talking using this terminology for at least a year that I can
remember, but I'm not totally sure that an average IESG would even approve
an Experimental draft that updated a standards-track RFC. How badly do you
need to say this at all, since you're just confirming a well-understood
fact that I think we all agree on?

In this text,

   A study of the ECN behaviour of the Alexa top 1M web
   servers using 2014 data [Trammell15]

I'm wondering whether it's useful to say "Alexa top 1M web servers" in an
RFC that will probably last longer than Alexa lasts ...

In this text,

   Significantly more aggressive sender responses to ECN
   are required to make effective use of such shallow queues; Datacenter
       ^^^^^^^^
   TCP (DCTCP) [I-D.ietf-tcpm-dctcp] provides an example.

I'm tangled up in passive tense ("who is required to do what?"). Is it
correct to say

   Significantly more aggressive sender responses to ECN
   are needed in order to make effective use of such shallow queues;
   Datacenter TCP (DCTCP) [I-D.ietf-tcpm-dctcp] provides an example.

?

I see that the draft uses both the terms "shallow queues" and "nearly empty
queues". Do these terms mean the same thing? If so, perhaps it's worth
either picking one term, or saying that they mean the same thing. Right
now, I'm trying to imagine what the difference might be, since both phrases
are used.

You folks are the experts on this stuff, but I'm looking at this quoted
text from RFC 3168

 RFC 3168 prohibits use of ECN for TCP control packets and
   retransmitted packets in a number of places:

   o  "To ensure the reliable delivery of the congestion indication of
      the CE codepoint, an ECT codepoint MUST NOT be set in a packet
      unless the loss of that packet in the network would be detected by
      the end nodes and interpreted as an indication of congestion."
      (Section 5.2)

   o  "A host MUST NOT set ECT on SYN or SYN-ACK packets."
      (Section 6.1.1)

   o  "pure acknowledgement packets (e.g., packets that do not contain
      any accompanying data) MUST be sent with the not-ECT codepoint."
      (Section 6.1.4)

   o  "This document specifies ECN-capable TCP implementations MUST NOT
      set either ECT codepoint (ECT(0) or ECT(1)) in the IP header for
      retransmitted data packets, and that the TCP data receiver SHOULD
      ignore the ECN field on arriving data packets that are outside of
      the receiver's current window."  (Section 6.1.5)

   o  "the TCP data sender MUST NOT set either an ECT codepoint or the
      CWR bit on window probe packets."  (Section 6.1.6)

and noticing that only the text in 6.1.5 explicitly mentions the TCP data
receiver ignoring the "MUST NOT set" ECN field. I took a quick spin through
RFC 3168 searching for "ignore", but didn't see something that explicitly
covered the other cases.

Because these are "MUST NOT set" constraints, I could imagine implementers
who never anticipated that an ECN(0) or ECN(1) would be set, and don't look
at the field (probably good), but I can also imagine implementers
validating that ECN(0) and ECN(1) are not set (probably bad). Do people
have any concerns about encountering "ECT values MUST be cleared"
implementations during this experiment?

I suppose if some implementation that does this is deployed and you folks
run the experiment, then we'll know :D ...

But I wonder if it's worth making that clear for receivers, since you're
updating RFC 3168 anyway?

In this text,

      Random ECT values MUST NOT be used, as that may expose RTP to
      differences in network treatment of traffic marked with ECT(1) and
      ECT(0) and differences in associated endpoint congestion
      responses,

is "Random ECT values" the right word? I could imagine this prohibiting
using ECT(0) and ECT(1) interchangeably, but if that's what's intended, I
could also imagine this prohibiting simply not explicitly setting the ECT
values at all, so missing your point.

I'm looking at this text

   As a process memo that makes no changes to existing protocols, there
   are no protocol security considerations.

and wondering if it's current with the rest of the document. Is "no changes
to existing protocols" still the right way to characterize this draft? If
you wanted to say

   As a process memo that only adds limitations to existing protocols, there
   are no protocol security considerations.

I'd be happy to believe you ...

Thanks,

Spencer


> > -----Original Message-----
> > From: tsvwg [mailto:tsvwg-bounces@ietf.org] On Behalf Of internet-
> > drafts@ietf.org
> > Sent: Friday, August 4, 2017 7:29 PM
> > To: i-d-announce@ietf.org
> > Cc: tsvwg@ietf.org
> > Subject: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt
> >
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Transport Area Working Group WG of the
> > IETF.
> >
> >         Title           : Explicit Congestion Notification (ECN)
> Experimentation
> >         Author          : David Black
> >       Filename        : draft-ietf-tsvwg-ecn-experimentation-04.txt
> >       Pages           : 17
> >       Date            : 2017-08-04
> >
> > Abstract:
> >    This memo updates RFC 3168, which specifies Explicit Congestion
> >    Notification (ECN) as a replacement for packet drops as indicators of
> >    network congestion.  It relaxes restrictions in RFC 3168 that would
> >    otherwise hinder experimentation towards benefits beyond just removal
> >    of loss.  This memo summarizes the anticipated areas of
> >    experimentation and updates RFC 3168 to enable experimentation in
> >    these areas.  An Experimental RFC is required to take advantage of
> >    any of these enabling updates.  In addition, this memo makes related
> >    updates to the ECN specifications for RTP in RFC 6679 and for DCCP in
> >    RFC 4341, RFC 4342 and RFC 5622.  This memo also records the
> >    conclusion of the ECN Nonce experiment in RFC 3540, and provides the
> >    rationale for reclassification of RFC 3540 as Historic; this
> >    reclassification enables new experimental use of the ECT(1)
> >    codepoint.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-experimentation/
> >
> > There are also htmlized versions available at:
> > https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-04
> > https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-ecn-
> > experimentation-04
> >
> > A diff from the previous version is available at:
> > https://www.ietf.org/rfcdiff?url2=draft-ietf-tsvwg-ecn-
> experimentation-04
> >
> >
> > Please note that it may take a couple of minutes from the time of
> submission
> > until the htmlized version and diff are available at tools.ietf.org.
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
>
>