Re: [tsvwg] draft-ietf-tsvwg-rfc6040update-shim:SuggestedFragmentation/Reassemblytext

"Black, David" <David.Black@dell.com> Tue, 09 March 2021 17:25 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3018C3A1448; Tue, 9 Mar 2021 09:25:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.347
X-Spam-Level:
X-Spam-Status: No, score=-2.347 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.248, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F4ob1qL3YK2X; Tue, 9 Mar 2021 09:25:48 -0800 (PST)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47DE23A0FFB; Tue, 9 Mar 2021 09:25:48 -0800 (PST)
Received: from pps.filterd (m0170398.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 129H2WNv029633; Tue, 9 Mar 2021 12:24:54 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=smtpout1; bh=6U4WXffKz4nkD4k38XfAk84BctyztTUiezfn6LpxSS0=; b=BNMzavRYF89QaQQBQtC7x2I0D26tjYGiZLAiCx7dX9LkJulDfKQbxai4f6BeiZEuHRG1 w3iZWKRiDNoj4zVPAvp8awcOf9RT726UGh77Oz9Y62Uo84jbm3uGe8xl4mgSGNMT5Q6n JVTsyLhqhFxiGB7PlpN1sMH5UEIcmb7zmlk9DSdRsKnWE3gLsS7MzPeF4O8BToOzVY3E Qg5LFQcLCjPv7s5Q82Itdjq4YN8lIro/NDfpp0xQvliwjb0XZLmPvCz2AuFgn042ZqBe sriFynuusRwEPEok+7p2Iuc3VEaLIcGh6u6rO+gJPii0XQWWLngQt9EejHO/kLpA+v4S 0g==
Received: from mx0a-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0b-00154904.pphosted.com with ESMTP id 3745uehqkb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 09 Mar 2021 12:24:53 -0500
Received: from pps.filterd (m0134746.ppops.net [127.0.0.1]) by mx0a-00154901.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 129HLbrW085995; Tue, 9 Mar 2021 12:24:51 -0500
Received: from nam02-cy1-obe.outbound.protection.outlook.com (mail-cys01nam02lp2051.outbound.protection.outlook.com [104.47.37.51]) by mx0a-00154901.pphosted.com with ESMTP id 374qn22k1m-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 09 Mar 2021 12:24:51 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gtbvgFbimwgmLYbQiP4OTPpVIQnquT508QtkQ9UosTyhxlduik2jfSHEogA1sLLwZHrD6DznsWoI6Q1/n07LfwpPxfNf9f5ZCHRQwwJz+35CH97H8xuNPaPyKq1uHFxBj1M8H+QTAIXA5cS4LzVsXdqb9+x60eARj98c1KwXaCjDDWL43FajX9tw+0B4eG8ku9WVRuEK1VINS5syMfEh/OqG4d2SpCdz4/uQdFqWl4PA6dnuxoDreV9iL4R3SvcsTM2ZHq/ChcKMiwlbg4WTw78gSPjPlRf0mBp7EoTualu6TRUrfw9WqgLqq4h2m+CZjtCV1R9tb96cqLWXCcgLLw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6U4WXffKz4nkD4k38XfAk84BctyztTUiezfn6LpxSS0=; b=ere7eGC6I2nGFtxPy86LczVLz4MoMjslWwkt0nNUeGL+f8mwhHnLwdW/jYDPmYZkeWkyFCiFNIFxIxuLuQG9YGPdiMth8JA7r/WBhdWhRYotYGzCtE0ZveV6wGSM4zdSdmRoim/QLiFwIGTBv94EpP16YhpZ3sxfUksl+3yle85gfoGlO4KPW+qLnnDdxuOVFOKigKb03/BRmEkLsrwqrSDEGxNgOU5xIiQGOcwyY/6nLaWLvdedl8b6BGHMMi/pdw0jx7DiavFu2Xh7jmoNswN63PWvm6dRcWy0RTXCZS90oBSV0ZbpDy8P9UOPVTpGXRBUzAFt3KSlKsK54M6Z0Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by BL0PR1901MB2052.namprd19.prod.outlook.com (2603:10b6:207:34::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.28; Tue, 9 Mar 2021 17:24:43 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::b1f3:f51d:c01c:2feb]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::b1f3:f51d:c01c:2feb%5]) with mapi id 15.20.3912.027; Tue, 9 Mar 2021 17:24:43 +0000
From: "Black, David" <David.Black@dell.com>
To: Bob Briscoe <ietf@bobbriscoe.net>, Markku Kojo <kojo@cs.helsinki.fi>
CC: Markku Kojo <kojo=40cs.helsinki.fi@dmarc.ietf.org>, Joe Touch <touch@strayalpha.com>, "tsvwg@ietf.org" <tsvwg@ietf.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: [tsvwg] draft-ietf-tsvwg-rfc6040update-shim:SuggestedFragmentation/Reassemblytext
Thread-Index: AQHXFCG2lV0R9l+vJkqgSUKr+U9VA6p6QFqAgAGoLlA=
Date: Tue, 09 Mar 2021 17:24:43 +0000
Message-ID: <MN2PR19MB4045AB273D353B3FF562E2F283929@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <CE03DB3D7B45C245BCA0D243277949363076629A@MX307CL04.corp.emc.com> <CE03DB3D7B45C245BCA0D24327794936307662EA@MX307CL04.corp.emc.com> <1920ABCD-6029-4E37-9A18-CC4FEBBFA486@gmail.com> <CE03DB3D7B45C245BCA0D2432779493630768173@MX307CL04.corp.emc.com> <6D176D4A-C0A7-41BA-807A-5478D28A0301@strayalpha.com> <CE03DB3D7B45C245BCA0D24327794936307688C5@MX307CL04.corp.emc.com> <alpine.DEB.2.21.1911171041020.5835@hp8x-60.cs.helsinki.fi> <9024d91a-bb08-fb45-84f8-ce89ba90648d@bobbriscoe.net> <alpine.DEB.2.21.2012141735030.5844@hp8x-60.cs.helsinki.fi> <1e038b64-8276-3515-ac45-e0fc84e1c413@bobbriscoe.net> <alpine.DEB.2.21.2103081540280.3820@hp8x-60.cs.helsinki.fi> <3c778eb9-56dc-3d58-0de4-c6373d1090ec@bobbriscoe.net>
In-Reply-To: <3c778eb9-56dc-3d58-0de4-c6373d1090ec@bobbriscoe.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Enabled=True; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Owner=david.black@emc.com; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SetDate=2021-03-09T17:24:06.5649484Z; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Name=External Public; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Application=Microsoft Azure Information Protection; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_ActionId=c4120904-70fb-4d18-bd59-2668fa40b35a; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Extended_MSFT_Method=Manual
authentication-results: bobbriscoe.net; dkim=none (message not signed) header.d=none;bobbriscoe.net; dmarc=none action=none header.from=dell.com;
x-originating-ip: [72.74.71.221]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b71190f0-dec9-44c2-d382-08d8e3203aa5
x-ms-traffictypediagnostic: BL0PR1901MB2052:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <BL0PR1901MB20527B2E4ED2BC42DFD5D4EB83929@BL0PR1901MB2052.namprd19.prod.outlook.com>
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(396003)(39860400002)(376002)(136003)(366004)(55016002)(8676002)(30864003)(316002)(186003)(4326008)(86362001)(8936002)(5660300002)(66476007)(64756008)(107886003)(9686003)(71200400001)(966005)(166002)(478600001)(76116006)(7696005)(6506007)(54906003)(66946007)(66556008)(53546011)(33656002)(110136005)(83380400001)(52536014)(786003)(66446008)(26005)(2906002)(559001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 8RcnZt6D0Z7pe6/kf0abSnTCX84VGYKdVsjYRFLYV/pSbs4DWqsK9WZWoW/mr8LL4qdrqOfFrxbISMtZ9gtOoz2hHQJLlRSwkVCaEpwwiCc5I5ie1CGpOBQSifHvclnumielRVUg7Zuw2eiWz3ttMRRXBHiBYYx+A3cXVZluSNwEmBA9mjUOrzghImgoK4nn6sZJCk4glA2h0L4o7dkNpr+bTUt9PI4/S+s2nT1lowIHC7hYjJNqGq0MMcJ2A1sDZpJIiHo1YLbNE0Hcr3IjsZrWRzwbLOY8iLb/fYZAXA53MFHvSDGKjWQFHBBoMFjKm+dkFNHr9Y5y/9qIndYjGfQCAMdV2RjV9uiXO9xCYtRop2mhrAquBG0DlbFnqWHOLtOp5uEP8AYvSw3OTjXKeNIK5FZhE0ZeyeHV/JBXbSAYdBGUi1pUV4IReMgS3GBFAAajv9oxFWvXsDiLu3GmqmY6xS7xnrH7+SVS//WfdVmYZa+/AvLf5SIht+hxvf1LCHrrbV+pTaAMaS3TPoZOUAaS/LhDfAuzBFILOarlIYJcmJ2r9TlwOe2m02ujOj8mj2G1Fm1Onu8M1AHuAqVpo7G6DD9QTkUqXYLs1fYHKPCk+6Wd7shubHwKVhPtSksZbbE0VaRJZ97vPsRebH9grEFyDEtIvjPhiWHV9LdBTQ7BkTJ1sZJP/5aEXt1fLZlh1JezJybv5UiuWs47+lUXikcq1IBOh0WC4gGdR6J7hgVSm6lWnmPZaLmUB7FJO85uyMymvK5h96fExNuwh4ECK/RqYBGMKP/FftrTUWrt6YpkHRyUcQ7dBCbh4IOg+rjoHmP9QtVjl0L7udqKUUy5SIZD67TZ+Tw8buxqpUYDAyg5RmZXUnOgDRBP3gDbd6lusdGPChbsgPr5fivyMbPwl9bLTzlikZ8A3D3Ky3nM+2d+n6g1mGk14bSdUkozAGDzh04Y/lEDlUD5ttddRbB6OhR78qd0o+7FVlqQLprt4ZyuV5eUcxKdqhfO2qU7YeaXdaUv1MlN2w68/aZbO/DTzvuhgXBVUyOkkB1dZToqExg6Q0kIhRKC/WWWDuJQgQtHJGmDfxl86ZbgOfSxYmsaqAevGaqFA0W3kU9K8/Kkxby8rR/Jd9LTgo6e7r3ybwpObdqHsQsmHp5sRYNyw3dc9mOi6fMQ+E6hcAXjsu8bbh+oNMeo2cAJpr6NWYiMPabHsoVodArI6V9ZnYUgdCJFOf6xN8vyswcTP+iWpDedkuS6+H4sCnQbUYesvc9vfkTB2wPaacgEKy2ClS6UzuweZ1qWPIVIrSExe1CrOIsqqXkfPyG1ePdPnw4fh9QcDOsZ
Content-Type: multipart/alternative; boundary="_000_MN2PR19MB4045AB273D353B3FF562E2F283929MN2PR19MB4045namp_"
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b71190f0-dec9-44c2-d382-08d8e3203aa5
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Mar 2021 17:24:43.4901 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: kdgknjCTqS7oLBpHotNig+nXZUvxCAcw34tFAORWNgnc11ustdwytPnGNtapHLpD5M5jrTtgCM5EO+UhaKwarw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR1901MB2052
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369, 18.0.761 definitions=2021-03-09_14:2021-03-08, 2021-03-09 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 suspectscore=0 mlxscore=0 clxscore=1011 lowpriorityscore=0 priorityscore=1501 adultscore=0 mlxlogscore=999 malwarescore=0 phishscore=0 impostorscore=0 spamscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2103090083
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 adultscore=0 suspectscore=0 bulkscore=0 mlxscore=0 malwarescore=0 phishscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2103090083
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/L2kHqqqlS7yPdkRVucdgufvdQlo>
Subject: Re: [tsvwg] draft-ietf-tsvwg-rfc6040update-shim:SuggestedFragmentation/Reassemblytext
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Mar 2021 17:25:52 -0000

Writing as shepherd for both of the ECN encapsulation drafts (ecn-encap-guidelines, rfc6040update-shim), my intent is to look at both drafts shortly after this IETF meeting week (next week if possible, definitely by end of the month), so there's time to resolve the tension between the two "SHOULD" statements.   After any text changes, I'll want to put my head together with Bob to come up with a summary of how we got here suitable for the shepherd write-up.

Thanks, --David

From: Bob Briscoe <ietf@bobbriscoe.net>
Sent: Monday, March 8, 2021 11:02 AM
To: Markku Kojo
Cc: Markku Kojo; tsvwg-chairs@ietf.org; Joe Touch; tsvwg@ietf.org
Subject: Re: [tsvwg] draft-ietf-tsvwg-rfc6040update-shim:SuggestedFragmentation/Reassemblytext


[EXTERNAL EMAIL]
Markku,

Thx. Unfortunately, this draft is coming up in the mtg this afternoon.
I take some of the blame -  only re-posting the draft a couple of hours ago, which presumably reminded you that you were going to think on this.

inline tagged [BB]
On 08/03/2021 13:48, Markku Kojo wrote:
Hi Bob,

this issue and text on it seems acceptable to me.

However, the other issue with the two contradictory SHOULD's - that I now notice I have never replied to - seems not ok, I think.

[BB] The question is whether we have to solve this now.

I have a solution to resolve the contradiction. At the risk of prolonging the progress of this draft, I'll say it now. But if we can't resolve this in the next couple of days, I think we should go ahead with the two contradictory SHOULDs.

For the list, here's the two contradictory paras:

   Congestion indications SHOULD be propagated on the basis that an

   encapsulator or decapsulator SHOULD approximately preserve the

   proportion of PDUs with congestion indications arriving and leaving.



   The mechanism for propagating congestion indications SHOULD ensure

   that any incoming congestion indication is propagated immediately,

   not held awaiting the possibility of further congestion indications

   to be sufficient to indicate congestion on an outgoing PDU.

Possible resolution of the contradiction: the "SHOULD approximately preserve the proportion" is a rough long term average goal while "SHOULD ensure that incoming congestion indication is propagated immediately" is a requirement for after there has been some period (TBD) without any marking.

The big question is where would an implementer set that timescale? It needs to be a "typical RTT in the deployment environment" or some such get-out clause. I guess this is best left to the implementer.



Bob



I'm now occupied for the next few hours, so I'll come back with more detailed reasoning after the tsvwg meeting today.

Cheers,

/Markku

On Mon, 8 Mar 2021, Bob Briscoe wrote:


Markku, chairs, all,

Having reached agreement on the text last Dec, I then went and dropped the ball and
forgot all about this draft,... and ecn-encap-guidelines.

== ECN-ENCAP-GUIDELINES ==

I shall upload a new rev shortly with the following single diff that I noticed
during the meeting last Nov, and said I would do at the next rev:

 4.6.  Reframing and Congestion Markings

    The guidance in this section is worded in terms of framing
    boundaries, but it applies equally whether the protocol data units
-   are frames, cells, packets or fragments.
+   are frames, cells or packets.

== RFC6040UPDATE-SHIM ==

I shall upload a new rev shortly, with the following 3 paras at the end of S.5 on
ECN fragmentation/reassembly:

Para 1 is just moved up from the end but otherwise unchanged.
Para 2 is unchanged.
Para 3 is the text agreed on this list last Dec subject to further checking, with
one exception: I removed the citation of RFC3168 after "equivalent".
    Reason: The citation of RFC6040 at the end is the relevant one, 'cos it
introduced the mechanism for ECT(0) and ECT(1) to be either equivalent or two
severity levels. In this respect it updated RFC3168. So it would not be appropriate
to cite RFC3168, which only said the two were equivalent. If we cited RFC3168 here,
it could be interpreted as if we're saying two RFC give conflicting definitions.

    Section 5.3 of [RFC3168] defines the process that a tunnel egress
    follows to reassemble sets of outer fragments
    [I-D.ietf-intarea-tunnels] into packets.

    During reassembly of outer fragments [I-D.ietf-intarea-tunnels], if
    the ECN fields of the outer headers being reassembled into a single
    packet consist of a mixture of Not-ECT and other ECN codepoints, the
    packet MUST be discarded.

+   If there is mix of ECT(0) and ECT(1) fragments, then the reassembled
+   packet MUST be set to either ECT(0) or ECT(1).  In this case,
+   reassembly SHOULD take into account that the RFC series has so far
+   ensured that ECT(0) and ECT(1) can either be considered equivalent,
+   or they can provide 2 levels of congestion severity, where the
+   ranking of severity from highest to lowest is CE, ECT(1), ECT(0)
+   [RFC6040].

If any of this isn't acceptable, I'll have to post another rev, but I think it's
what was agreed.

Cheers



Bob


On 14/12/2020 15:44, Markku Kojo wrote:
      Hi Bob, all,

      apologies for the delay, now catching up again.

      yes, handling mix of ECT(0)/ECT(1) like in the new proposed text below
      seems reasonable choice (for now).

      I'll come back shortly with the issue in the other thread. It seems
      less clear, actually seems quite difficult to handle correctly for all
      foreseen cases.

      /Markku

      On Thu, 3 Dec 2020, Bob Briscoe wrote:

            Markku, all,

            I am also only now catching up with the list...

            On 17/11/2019 08:46, Markku Kojo wrote:
                  Hi Dave, Joe, All,

                  Catching up ...

                  I agree with the modified new text as well as
            treatment of an ECT(0)/ECT(1)
                  mix as "any".


            [BB] Thanks. For the list, the current text that Markku is
            agreeing with is here:
            https://tools.ietf.org/html/draft-ietf-tsvwg-rfc6040update-shim-11#section-5

            Regarding reassembly of a mix of ECT(0)/ECT(1). I agree
            with David that the current text
            should handle this case that 3168 doesn't address.
            And I agree with Joe that an interim way of handling it is
            needed, not just punting until
            later.

            I see that all of Jonathan, David and you Markku are happy
            with reassembling a mix of
            ECT(0) and ECT(1) to result in either ECT(0) or ECT(1).
            (for now). I think we can go one
            better than that, still without precluding a more specific
            RFC later. Here's proposed
            text:

            After the following para:

               During reassembly of outer fragments
            [I-D.ietf-intarea-tunnels], if
               the ECN fields of the outer headers being reassembled
            into a single
               packet consist of a mixture of Not-ECT and other ECN
            codepoints, the
               packet MUST be discarded.

            Add:

                  If there is mix of ECT(0) and ECT(1) fragments, then
            the reassembled packet
                  MUST be set to either ECT(0) or ECT(1). In this case,
            reassembly SHOULD take
                  into account that the RFC series has so far ensured
            that ECT(0) and ECT(1)
                  can either be considered equivalent [RFC3168], or
            they can provide 2 levels
                  of congestion severity, where the ranking of severity
            from highest to lowest
                  is CE, ECT(1), ECT(0) [RFC6040].


            Rationale: This avoids constraining future RFCs, but at
            least lays out all the
            interoperabilityrequirements we already have for handling
            this mixture. Then if an
            implementer wants to just default to choosing one, it hints
            that they should choose
            ECT(1).



                  I also want to repeat my comment that

                   draft-ietf-tsvwg-ecn-encap-guidelines-13

                  added similar new text that alters RFC 3168, and it
            should be modified
                  accordingly.


            [BB] I'll start another thread for this, rather than make
            this thread too unweildy.



            Bob



                  Thanks,

                  /Markku

                  PS. I missed Bob's response to my comment at the
            time, but will reply it
                  separately at some point.


                  On Wed, 9 Oct 2019, David Black wrote:

                        At this juncture, for an ECT(0)/ECT(1) mix
            across a set of
                        fragments being reassembled, I would suggest
            using "any" (i.e.,
                        either is ok) at this juncture to avoid
            constraining what we may
                        do in the future; in particular, this allows
            use of the value in
                        the first or last fragment, both of which are
            likely to be
                        convenient approaches for some implementations.

                        Thanks, --David

                              -----Original Message-----
                              From: Joe Touch <touch@strayalpha.com><mailto:touch@strayalpha.com>
                              Sent: Wednesday, October 9, 2019 10:29 AM
                              To: Black, David
                              Cc: Jonathan Morton; tsvwg@ietf.org<mailto:tsvwg@ietf.org>
                              Subject: Re: [tsvwg]
                              draft-ietf-tsvwg-rfc6040update-shim:
            Suggested
                              Fragmentation/Reassembly text


                              [EXTERNAL EMAIL]

                              Hi, all,

                              I disagree with the suggestion below.

                              Pushing this “under the rug” for an
            indeterminate
                              later date only serves to
                              undermine the importance of this issue.

                              At a MINIMUM, there needs to be direct
            guidance in
                              place until a “better”
                              solution can be developed. For now, that
            would mean
                              one of the following:
                              - use the max of the frag code point
            values
                              - use the min of the frag code point
            values
                              - use “any” of the frag code point values
                              - pick some other way (first, the one in
            the initial
                              fragment i.e., offset 0), etc.

                              One of these needs to be *included at
            this time*.

                              If a clean up doc needs to be issued, it
            can override
                              individual “scattered”
                              recommendations later.

                              Joe

                                    On Oct 9, 2019, at 6:33 AM, Black,
            David
                                    <David.Black@dell.com><mailto:David.Black@dell.com> wrote:

                                          The one case this doesn't
                                          really cover is what happens
                                          when a fragment

                              set
                                          has a mixture of ECT(0) and
                                          ECT(1) codepoints.  This
                                          probably isn't very
                                          relevant to current ECN
                                          usage, but may become
                                          relevant with SCE, in

                              which
                                          middleboxes on the tunnel
                                          path may introduce such a
                                          mixture to formerly
                                          "pure" packets.  From my
                                          perspective, a likely
                                          RFC-3168 compliant
                                          implementation of arbitrarily
                                          choosing one fragment's ECN
                                          codepoint as
                                          authoritative (where it
                                          doesn't conflict with other
                                          rules) is acceptable, but
                                          this doesn't currently seem
                                          to be mandatory.

                                          With the above language, it
                                          should be sufficient to
                                          update RFC-3168 to

                              cover
                                          this case at an appropriate
                                          time, rather than scattering
                                          further

                              requirements
                                          in many documents.


                                    I would concur that using a
            separate
                                    draft to cover that case at the

                              appropriate time would be the better
            course of
                              action.

                                    Thanks, --David

                                          -----Original Message-----
                                          From: Jonathan Morton
                                          <chromatix99@gmail.com><mailto:chromatix99@gmail.com>
                                          Sent: Tuesday, October 8,
                                          2019 6:55 PM
                                          To: Black, David
                                          Cc: tsvwg@ietf.org<mailto:tsvwg@ietf.org>
                                          Subject: Re: [tsvwg]

            draft-ietf-tsvwg-rfc6040update-shim:
                                          Suggested
                                          Fragmentation/Reassembly text


                                          [EXTERNAL EMAIL]

                                                On 8 Oct, 2019,
                                                at 10:51 pm,
                                                Black, David
                                                <David.Black@dell.com><mailto:David.Black@dell.com>
                                                wrote:

                                                **NEW**: Beyond
                                                those first two
                                                paragraphs, I
                                                suggest deleting
                                                the

                              rest
                                          of Section 5 of the
                                          rfc6040update-shim draft and
                                          substituting the

                              following
                                          paragraph:

                                                  As a tunnel
                                                egress
                                                reassembles sets
                                                of outer
                                                fragments


            [I-D.ietf-intarea-tunnels]
                                                into packets, it
                                                MUST comply with
                                                  the reassembly
                                                requirements in
                                                Section 5.3 of
                                                RFC 3168 in
                                                  order to ensure
                                                that indications
                                                of congestion are
                                                not lost.

                                                It is certainly
                                                possible to
                                                continue from
                                                that text to
                                                paraphrase part
                                                or all

                              of
                                          Section 5.3 of RFC 3168, but
                                          I think the above text
                                          crisply addresses the
                                          problem, and avoids
                                          possibilities of subtle
                                          divergence.  I do like the
                                          “reassembles sets of outer
                                          fragments” lead-in text
                                          (which I copied from

                              the
                                          current rfc6040shim-update
                                          draft) because that text
                                          makes it clear that
                                          reassembly logically precedes
                                          decapsulation at the tunnel
                                          egress.

                                                Comments?


                                          Looks good to me.

                                          The one case this doesn't
                                          really cover is what happens
                                          when a fragment

                              set
                                          has a mixture of ECT(0) and
                                          ECT(1) codepoints.  This
                                          probably isn't very
                                          relevant to current ECN
                                          usage, but may become
                                          relevant with SCE, in

                              which
                                          middleboxes on the tunnel
                                          path may introduce such a
                                          mixture to formerly
                                          "pure" packets.  From my
                                          perspective, a likely
                                          RFC-3168 compliant
                                          implementation of arbitrarily
                                          choosing one fragment's ECN
                                          codepoint as
                                          authoritative (where it
                                          doesn't conflict with other
                                          rules) is acceptable, but
                                          this doesn't currently seem
                                          to be mandatory.

                                          With the above language, it
                                          should be sufficient to
                                          update RFC-3168 to

                              cover
                                          this case at an appropriate
                                          time, rather than scattering
                                          further

                              requirements
                                          in many documents.

                                          - Jonathan Morton





            --
            ________________________________________________________________
            Bob Briscoe
            http://bobbriscoe.net/
                           PRIVILEGED AND CONFIDENTIAL



--
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/




--

________________________________________________________________

Bob Briscoe                               http://bobbriscoe.net/