Re: [tsvwg] Process for re-assignment of NS TCP header flag to AccECN

"C. M. Heard" <heard@pobox.com> Mon, 03 July 2017 18:18 UTC

Return-Path: <heard@pobox.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B13D2128B93; Mon, 3 Jul 2017 11:18:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.2
X-Spam-Level:
X-Spam-Status: No, score=-2.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_SORBS_SPAM=0.5, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pobox.com; domainkeys=pass (1024-bit key) header.from=heard@pobox.com header.d=pobox.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J1V4c1CN_g49; Mon, 3 Jul 2017 11:17:58 -0700 (PDT)
Received: from sasl.smtp.pobox.com (pb-smtp2.pobox.com [64.147.108.71]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4CE9128CDC; Mon, 3 Jul 2017 11:17:57 -0700 (PDT)
Received: from sasl.smtp.pobox.com (unknown [127.0.0.1]) by pb-smtp2.pobox.com (Postfix) with ESMTP id 2A68B98D95; Mon, 3 Jul 2017 14:17:57 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=pobox.com; h=mime-version :in-reply-to:references:from:date:message-id:subject:to:cc :content-type; s=sasl; bh=CNJrsS1l2WfYOkOoaFZ4BeqjffI=; b=cbJIda 90c6AxSTODBE/qguzikq9eTZBs6W/jFpMomlGEo7xnm6D4THswzz5NffDXYfIe2l haV2lIDSk3FXv3rQYOslzu4eHZvO4zvau4FlyPgj/ms+0Q2isW/808cQa/fM3RbO GkT25fIGCqvRxobUkCAp5FP3e1r/ftj6KLXYw=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=pobox.com; h=mime-version :in-reply-to:references:from:date:message-id:subject:to:cc :content-type; q=dns; s=sasl; b=IXm9BTUpL4zfku/UOccdihTAUM1pYQ6G x+jAQq54raI6Y0A9lnAcWTd0sk3Z54zcC5HjouUCz01nJmxKpTGEmA+74dIgGDR2 4EFttqq19GeXnysSJ9X1YXCpDoqsEqmjPFZfr/NyHD2FlQqVbrTFLSGsZGSB9HNb rBvQaKy6edk=
Received: from pb-smtp2.nyi.icgroup.com (unknown [127.0.0.1]) by pb-smtp2.pobox.com (Postfix) with ESMTP id 234F398D94; Mon, 3 Jul 2017 14:17:57 -0400 (EDT)
Received: from mail-qk0-f178.google.com (unknown [209.85.220.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp2.pobox.com (Postfix) with ESMTPSA id 959B398D93; Mon, 3 Jul 2017 14:17:56 -0400 (EDT)
Received: by mail-qk0-f178.google.com with SMTP id d78so151641462qkb.1; Mon, 03 Jul 2017 11:17:56 -0700 (PDT)
X-Gm-Message-State: AIVw113HRDqqb76D0+/iOL8OVOU248f10BtNgFO0oooTH/SM/pmXEIjh EphztJ00ArI9wQgC00bSsHlLAJYsSg==
X-Received: by 10.55.96.6 with SMTP id u6mr18191651qkb.104.1499105876170; Mon, 03 Jul 2017 11:17:56 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.140.106.182 with HTTP; Mon, 3 Jul 2017 11:17:35 -0700 (PDT)
In-Reply-To: <6c0e7bc8-7e25-99b0-cf7d-7542871060ad@bobbriscoe.net>
References: <CACL_3VG9NNPCSkReLA7jGLoRWpo09+YvVKMCzddEcdWKNtdgDw@mail.gmail.com> <6c0e7bc8-7e25-99b0-cf7d-7542871060ad@bobbriscoe.net>
From: "C. M. Heard" <heard@pobox.com>
Date: Mon, 03 Jul 2017 11:17:35 -0700
X-Gmail-Original-Message-ID: <CACL_3VGQFhOpjwAMO7Ajh-5=pA7wz6witU6ZmiKNsnm0MYQCSA@mail.gmail.com>
Message-ID: <CACL_3VGQFhOpjwAMO7Ajh-5=pA7wz6witU6ZmiKNsnm0MYQCSA@mail.gmail.com>
To: Bob Briscoe <ietf@bobbriscoe.net>
Cc: tcpm <tcpm@ietf.org>, tcpm-chairs <tcpm-chairs@ietf.org>, tsvwg <tsvwg@ietf.org>, tsvwg-chairs <tsvwg-chairs@ietf.org>, tsv-ads <tsv-ads@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c0562f83addff05536dc9d9"
X-Pobox-Relay-ID: F0134318-601B-11E7-A3C9-61520C78B957-06080547!pb-smtp2.pobox.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/J5kWE_pgnbdwwDAh1PyA9KAElGU>
Subject: Re: [tsvwg] Process for re-assignment of NS TCP header flag to AccECN
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jul 2017 18:18:02 -0000

Bob,

I think that your option (f) is better than option (e) (what I suggested).
As an aside, either one patches up an apparent process violation committed
by RFC 3540, an experimental RFC that assigned bit 7 in contradiction to
the policy in RFC 2780.

Mike Heard

On Mon, Jul 3, 2017 at 11:05 AM, Bob Briscoe <ietf@bobbriscoe.net> wrote:

> Mike,
>
> Let's call this option:
> (e) ecn-experimentation alters the registry policy of bit 7 of the TCP
> header to "IETF Review".
>
> Having a different policy for certain bits within a registry might send
> IANA into a spin, but I am sure they could write suitable text into the
> registry policy if they had to.
>
> I quite like this one. Altho unorthodox, it's neat.
>
>
> Thank you.
>
>
> Bob
>
> PS. Strictly RFC3168 used the CWR and ECE flags (bits 8 & 9) as a 2-bit
> field during the 3-way hand-shake. While the ECN Nonce and AccECN use the
> three ECN flags (bits 7-9) as a 3-bit field during the 3WHS. AccECN uses
> the combinations that RFC3168 and the Nonce do not use. So to cover all
> bases:
>
> Option (f): ecn-experimentation alters the registry policy for bits 7-9 to
> "IETF Review".
>
>
> On 03/07/17 18:14, C. M. Heard wrote:
>
> Bob,
>
> Couldn't the text in the IANA considerations of ecn-experimentation (which
> needs to be updated in any case) both change the NS flag to Reserved for
> ECN Experimentation and change the allocation policy for that flag from
> Standards Action to IETF Review, thereby updating RFC 2780? That would
> avoid the churn needed to add motivating text for a 4th experiment to
> ecn-experimentation and would allow AccECN to assign the NS bit itself
> without a process exception.
>
> Mike Heard
>
> On Mon, 3 Jul 2017 10:28:25 +0100, Bob Briscoe wrote:
>
>> Michael*2, Yoshifumi, Gorry, David, Wes, Mirja, Spencer, tcpm list, tsvwg
>> list,
>>
>> There has been some offlist discussion (among different sub-groups) to
>> narrow down the options here. It is time to see opinions from the two
>> affected WGs (tcpm and tsvwg) on preferred process, esp. from the WG chairs
>> and ADs.
>>
>> *==Background to the Process Problem==*
>>
>> In tsvwg the process is in motion to make the ECN nonce [RFC 3540]
>> historic. So, in the most recent rev of draft-ietf-tcpm-accurate-ecn-03
>> , we could finally include IANA assignment of the NS flag
>>     (see https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ec
>> n-03#section-6 )
>>
>> However, AccECN is EXPerimental, whereas the registry policy for
>> assigning TCP flags is "Standards Action"
>>     https://www.iana.org/assignments/tcp-header-flags/tcp-
>> header-flags.xhtml
>> which means "Values are assigned only for Standards Track RFCs approved
>> by the IESG" [RFC2434].
>>
>> References:
>>     Process for designating RFCs as historic:
>>         https://www.ietf.org/iesg/statement/designating-rfcs-as-
>> historic.html
>>     Current draft text to make RFC 3540 historic:
>>         https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experim
>> entation-03#section-3
>>     My initial draft for the AD's status change note:
>>         https://github.com/bbriscoe/ecn-experimentation/blob/
>> master/status-change-ecn-nonce-rfc3540-to-historic-00.txt
>>
>> ecn-experimentation has just completed WGLC. It still has to go through
>> IETF LC (after Prague). it is deliberately PS in order to be able to relax
>> pre-existing constraints on ECN experiments in standards track RFCs.
>> However, if poss, we want to avoid adding motivating text for a 4th
>> experiment, which could require another cycle of WGLC and delay until Nov.
>>
>> RFC 3692 ("Assigning Experimental and Testing Numbers Considered Useful")
>> could also be relevant, although it doesn't seem to help here, because it
>> is primarily aimed at larger codepoint spaces, not single bits.
>>
>>
>> *==Process Options==*
>>
>> There need to be two parts to the process: 1) unassignment and 2)
>> reassignment. The first seems clear-cut. The second is less obvious.
>>
>> 1) Unassigning the NS flag from RFC 3540
>> a) add text to IANA considerations section of ecn-experientation making
>> the NS flag reserved
>>
>> 2) Assigning the NS flag to accurate-ecn (and renaming it the AE flag).
>> Process options:
>> a) ecn-experimentation assigns flag to itself as reserved for experiments
>> and says initially the AccECN experiment will use it exclusively
>> b) ecn-experimentation assigns NS flag exclusively to AccECN
>> c) AccECN assigns NS flag to itself, with a process exception proposed to
>> the IESG to allow an EXP doc to assign to a Standards Action registry
>> d) the NS flag is reassigned by "AD review comment" or "IETF Last Call
>> comment" (quoted from David's suggestions)
>> e) other?...
>>
>> The difference between (a) and (b) is in the document that ends up being
>> referenced from the IANA registry:
>> a)  ecn-experimentation
>> b) accurate-ecn
>>
>> *==My own preferences==*
>>
>> During discussions, I didn't prefer (c) cos I thought the IESG might
>> question why they are being asked to make a process exception for an ECN
>> experiment at the same time as a draft is going through that avoids raising
>> process exceptions for ECN experiments.
>>
>> Nonetheless, since then, Mirja has said...
>>
>> On 02/07/17 23:40, Mirja Kühlewind wrote:
>>
>> I actually prefer option (c). I don’t think a process exception is a bad thing. If it’s the right thing to do, then that the reason why we have such exceptions. Also I think it’d be the right thing to change the registry policy… but that probably a longer story.
>>
>> I agree that it is outdated that the registry requires a standards
>> action, because it has become normal tcpm practice for any change to TCP to
>> have to start on the experimental track. So this would justify a process
>> exception.
>>
>> So, in summary, I don't mind (a), (b) or (c). I think (d) is not
>> sufficiently open and recorded for assignment of a flag in the main TCP
>> header.
>>
>>
>> Bob
>>
>>
> --
> ________________________________________________________________
> Bob Briscoe                               http://bobbriscoe.net/
>
>